Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on *2023-02-15* (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, which means roughly 9% of the advertised bridges bandwidth).
Please make sure you have upgraded to the 0.4.7.x series by then.
Supported releases in general can be found on the network team wiki.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorRelea...
Asked this before, but no one answered, so I'll try adding on this thread.
What are the Tor signing keys? What key is being used here:
https://dist.torproject.org/tor-0.4.7.13.tar.gz.sha256sum.asc
On Mon, January 23, 2023 3:59 pm, Georg Koppen wrote:
Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on *2023-02-15* (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, which means roughly 9% of the advertised bridges bandwidth).
Please make sure you have upgraded to the 0.4.7.x series by then.
Supported releases in general can be found on the network team wiki.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorRelea... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I'm running a relay on Debian (flavor) - all software is up-to-date and the tor version installed is 4.5.16. So I think it's up the Debian admins to update tor on their repositories (?); that way at least the Debian relays would get a proper update I assume.
------- Original Message ------- Georg Koppen gk@torproject.org schrieb am Montag, 23. Januar 2023 um 16:59:
Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on 2023-02-15 (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, which means roughly 9% of the advertised bridges bandwidth).
Please make sure you have upgraded to the 0.4.7.x series by then.
Supported releases in general can be found on the network team wiki.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorRelea... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hello,
Searching on Debian repositories of the different versions I see no existence of a 0.4.5.16 version but I do see 0.3.5.16 on buster.
On bullseye you have 0.4.5.10 and you have 0.4.7.13 in backports. Anyways, it seems[1] it is recommended to use the deb.torproject.org repo which provides the latest version (0.4.7.13) from oldoldstable (stretch) to unstable (sid).
On Tue, Jan 24, 2023 at 08:41:39AM +0000, Petrarca via tor-relays wrote:
I'm running a relay on Debian (flavor) - all software is up-to-date and the tor version installed is 4.5.16. So I think it's up the Debian admins to update tor on their repositories (?); that way at least the Debian relays would get a proper update I assume.
Hello, thank you for running a relay! Relays on Debian should add Tor's repository to their sources.list. You can find the information you need in the third answer at https://support.torproject.org/apt/.
-- Eldalië My private key is attached. Please, use it and provide me yours!
Hi,
Tortilla: The keys being used on this signature are the keys of DGoulet and Ahf (two members of the network team). You can find links to their keys on this page https://www.torproject.org/about/people/ . You can also read this thread on the forum: https://forum.torproject.net/t/release-0-4-5-12-and-0-4-6-10/2024/6 .
Petrarca: For Debian (and Ubuntu and alike), it's recommended to use TorProject repository as it is often more up to date than what Debian provides. You can see how to enable this repository on this page https://support.torproject.org/apt/tor-deb-repo/ .
Regards,
trinity-1686a
On Tue, 24 Jan 2023 at 11:04, Petrarca via tor-relays tor-relays@lists.torproject.org wrote:
I'm running a relay on Debian (flavor) - all software is up-to-date and the tor version installed is 4.5.16. So I think it's up the Debian admins to update tor on their repositories (?); that way at least the Debian relays would get a proper update I assume.
------- Original Message ------- Georg Koppen gk@torproject.org schrieb am Montag, 23. Januar 2023 um 16:59:
Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on 2023-02-15 (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, which means roughly 9% of the advertised bridges bandwidth).
Please make sure you have upgraded to the 0.4.7.x series by then.
Supported releases in general can be found on the network team wiki.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorRelea... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
My CPU architecture is 'armhf' (hardware is Raspberry pi). So the post referenced below starts with pointing out that this setup is not supported. So any other way on how to upgrade easily on a new version of Tor ?
------- Original Message ------- trinity pointard trinity.pointard@gmail.com schrieb am Dienstag, 24. Januar 2023 um 13:07:
Hi,
Tortilla: The keys being used on this signature are the keys of DGoulet and Ahf (two members of the network team). You can find links to their keys on this page https://www.torproject.org/about/people/ . You can also read this thread on the forum: https://forum.torproject.net/t/release-0-4-5-12-and-0-4-6-10/2024/6 .
Petrarca: For Debian (and Ubuntu and alike), it's recommended to use TorProject repository as it is often more up to date than what Debian provides. You can see how to enable this repository on this page https://support.torproject.org/apt/tor-deb-repo/ .
Regards,
trinity-1686a
On Tue, 24 Jan 2023 at 11:04, Petrarca via tor-relays tor-relays@lists.torproject.org wrote:
I'm running a relay on Debian (flavor) - all software is up-to-date and the tor version installed is 4.5.16. So I think it's up the Debian admins to update tor on their repositories (?); that way at least the Debian relays would get a proper update I assume.
------- Original Message ------- Georg Koppen gk@torproject.org schrieb am Montag, 23. Januar 2023 um 16:59:
Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on 2023-02-15 (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, which means roughly 9% of the advertised bridges bandwidth).
Please make sure you have upgraded to the 0.4.7.x series by then.
Supported releases in general can be found on the network team wiki.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorRelea... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Petrarca via tor-relays:
My CPU architecture is 'armhf' (hardware is Raspberry pi). So the post referenced below starts with pointing out that this setup is not supported. So any other way on how to upgrade easily on a new version of Tor ?
I believe there is a thread from last year on this mailing list[1] that should provide you with the information you are looking for.
Georg
[1] https://lists.torproject.org/pipermail/tor-relays/2022-August/020729.html ff.
------- Original Message ------- trinity pointard trinity.pointard@gmail.com schrieb am Dienstag, 24. Januar 2023 um 13:07:
Hi,
Tortilla: The keys being used on this signature are the keys of DGoulet and Ahf (two members of the network team). You can find links to their keys on this page https://www.torproject.org/about/people/ . You can also read this thread on the forum: https://forum.torproject.net/t/release-0-4-5-12-and-0-4-6-10/2024/6 .
Petrarca: For Debian (and Ubuntu and alike), it's recommended to use TorProject repository as it is often more up to date than what Debian provides. You can see how to enable this repository on this page https://support.torproject.org/apt/tor-deb-repo/ .
Regards,
trinity-1686a
On Tue, 24 Jan 2023 at 11:04, Petrarca via tor-relays tor-relays@lists.torproject.org wrote:
I'm running a relay on Debian (flavor) - all software is up-to-date and the tor version installed is 4.5.16. So I think it's up the Debian admins to update tor on their repositories (?); that way at least the Debian relays would get a proper update I assume.
------- Original Message ------- Georg Koppen gk@torproject.org schrieb am Montag, 23. Januar 2023 um 16:59:
Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on 2023-02-15 (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, which means roughly 9% of the advertised bridges bandwidth).
Please make sure you have upgraded to the 0.4.7.x series by then.
Supported releases in general can be found on the network team wiki.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/CoreTorRelea... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Georg Koppen:
Hello!
In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on *2023-02-15* (roughly in 3 weeks from now).
That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network
Alright, it's time now to reject the remaining relays on 0.4.5 at least (bridges, due to their scarcity, are allowed a bit longer on 0.4.5). We cut the number down to 344 relays affected, which translates to roughly 2% of the advertised bandwidth of the network. That's still sad but in line with results we had in past EOL rejection rounds.
So, if you see a sharp drop of relays in the network in the next couple of hours then it's likely due to that mass-rejection.
The fingerprints affected are linked to, as usual, from our EOL rejection wiki page.[1]
Thanks, Georg
[1] https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Relay-EOL-poli...
tor-relays@lists.torproject.org