Hi, A few weeks ago I setup a tor exit relay, using this documentation: https://www.torproject.org/docs/tor-relay-debian.html.en I have somewhat experience, so I kinda knew what I was doing, and I got the message "Self-testing indicates your ORPort is reachable from the outside. Excellent." in the log file. But my server doesn't seem to appear in any tor relay lists such as https://globe.torproject.org, even after a few weeks. What could I have done wrong?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 6/23/2014 3:00 AM, Sander Bongers wrote:
Hi,
A few weeks ago I setup a tor exit relay, using this documentation: https://www.torproject.org/docs/tor-relay-debian.html.en
I have somewhat experience, so I kinda knew what I was doing, and I got the message "Self-testing indicates your ORPort is reachable from the outside. Excellent." in the log file.
But my server doesn't seem to appear in any tor relay lists such as https://globe.torproject.org https://globe.torproject.org/, even after a few weeks. What could I have done wrong?
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
How could we know if you have done anything wrong given the information you provided?
Please copy / paste your torrc file to a paste bin and send us the link please copy / paste your tor log file to a pastebin and send us the link please type ifconfig, pastebin the output and send us the link please let us know as much as you can about your current configuration so we may identify the problem please let us know what tor version are you using and how did you install it (from deian repositories, tor repo, compiled source-code, etc)
So we may help you in a professional manner.
- -- s7r PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11 PGP Pubkey: http://www.sky-ip.org/s7r@sky-ip.org.asc
I would like to see that become the standard for checking newboys's relays. It makes a lot of sense to collect the whole set of data and save tentative questions and possibly wrong answers on this list (by well meaning people nonetheless). No one knows what security weaknesses exist by accident or omission. This would be a good way to do it thoroughly.
Robert
Please copy / paste your torrc file to a paste bin and send us the link please copy / paste your tor log file to a pastebin and send us the link please type ifconfig, pastebin the output and send us the link please let us know as much as you can about your current configuration so we may identify the problem please let us know what tor version are you using and how did you install it (from deian repositories, tor repo, compiled source-code, etc)
So we may help you in a professional manner.
On Mon, 23 Jun 2014 17:37:31 -0800 I beatthebastards@inbox.com wrote:
I would like to see that become the standard for checking newboys's relays. It makes a lot of sense to collect the whole set of data and save tentative questions and possibly wrong answers on this list (by well meaning people nonetheless). No one knows what security weaknesses exist by accident or omission. This would be a good way to do it thoroughly.
Robert
I'm guessing you are referring to people who ask about their configuration as opposed to checking every "newboy's" relay? :)
--Matt
Matt,
No, I mean every ab initio Tor relay operator.
From my experience getting into Tor and from watching the list it is obvious that there is quite often a chasm between those with the goodwill to run a relay and those confident with Linux and Tor jargon/lexicon.
Even asking questions on the list is not very useful because it is not really possible to either ask all you need to or to depend on the answers completely if you don't know who's who. The repetitive questions are annoying to some as well.
So why not offer reassurance for the security of the Tor network, and confidence and encouragement to the people who might give up? In my case it has been by accident that I have come across some important aspects of torrc settings and now ARM use.
It is better to shepherd people consciously than to keep pointing them bluntly to look at the web of links which depends on them understanding.
Robert
I would like to see that become the standard for checking newboys's relays. It makes a lot of sense to collect the whole set of data and save tentative questions and possibly wrong answers on this list (by well meaning people nonetheless). No one knows what security weaknesses exist by accident or omission. This would be a good way to do it thoroughly.
Robert
I'm guessing you are referring to people who ask about their configuration as opposed to checking every "newboy's" relay? :)
On Wed, 25 Jun 2014 16:26:14 -0800 I beatthebastards@inbox.com wrote:
Matt,
No, I mean every ab initio Tor relay operator.
From my experience getting into Tor and from watching the list it is obvious that there is quite often a chasm between those with the goodwill to run a relay and those confident with Linux and Tor jargon/lexicon.
Even asking questions on the list is not very useful because it is not really possible to either ask all you need to or to depend on the answers completely if you don't know who's who. The repetitive questions are annoying to some as well.
So why not offer reassurance for the security of the Tor network, and confidence and encouragement to the people who might give up? In my case it has been by accident that I have come across some important aspects of torrc settings and now ARM use.
It is better to shepherd people consciously than to keep pointing them bluntly to look at the web of links which depends on them understanding.
Robert
It might be that I'm completely misunderstanding what you are saying. Unless (somehow) automated, I don't think checking with every Tor relay operator 'scales'. How would you go about being a shepherd to every new Tor relay operator?
--Matt
tor-relays@lists.torproject.org