[tor-project] Relay operator meetup notes - November 20 2021

gus gus at torproject.org
Tue Nov 23 12:21:33 UTC 2021


Hi,

Notes for relay operator meetup, Nov 20 2021, via BBB.

- Torservers.net reanimation
  - Chat says "we're in":
      - Nos Oignons
      - DFRI
      - Digitalcourage
      - applied-privacy.net (would like to learn more about it/discuss
        more)
  - Discussion about what the purpose of TN was/should be (see below)
  - One main goal of torservers umbrella is to separate the network of
    Tor from the development of Tor, so having something like torservers
is important.
  - One useful thing about torservers, from Tor's perspective, is that
    when excited new people show up wanting to run a relay, we can ask
if they're nearby any of the orgs on the partner list and send them
there to get connected.
  - Torservers has RIPE membership, so there's value in being able to
    get/keep/move network blocks too?
  - One of the original features of torservers was to take in funding
    money, and divide it up across organizations that run exits.
  - We could apply for funding to torservers.net -- or apply as any
    other org, and then use the torservers infrastructure for dividing
it properly.
  - torservers also in the past was useful at helping people find
    lawyers in various European countries

- Next Tor activities in CCC rc3
  - https://events.ccc.de/2021/11/10/rc3-2021-meta-cfp/
  - Leibi really wants to see some more Tor *talks* at CCC this year. We
    used to do great talks and it's been years since we did.
  - Roger is not excited to try to do a speech into a webcam -- good Tor
    talks need an actual audience. But discussions, like relay operator
meetups, work a lot better.
  - We could drum up some talk ideas from core Tor people, and also from
    other orgs in the Tor ecosystem. We could even glue together several
Tor mini-talks, starting from the state-of-the-onion content.
  - Talk proposal deadline is *real soon now*.

- Announcements
    - New Tor Forum! https://forum.torproject.net/
    - Removing EOL relays and our EOL policy:
      https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Relay-EOL-policy
    - v2 onion services deprecation:
      https://forum.torproject.net/t/release-0-3-5-17-0-4-5-11-0-4-6-8-and-0-4-7-2-alpha/148
       - I found it surprising that a tor service containing a single v2
         onion (next to a number of v3 onions) refused to start after
upgrading to a new stable tor release.
          - ^ The user experience in these situations is always tough --
            if your Tor had started, but quietly not actually published
any v2 stuff, you would have been differently surprised. At least this
way you learned that it wasn't going to work.
    - Run a bridge campaign
    https://blog.torproject.org/run-a-bridge-campaign/
    (there's a link to the community portal already, on "how to setup
bridges")
    
- Q&A and open topics:
  - Internship to map and understand the relay operator world, values,
    etc.
    - As a precursor to a gamification project, or improving diversity,
      etc. Read the project: https://gitlab.torproject.org/tpo/community/team/-/issues/46
    - The internship is starting on December 2021.

  - Debian stable package release process?
    - deb.tpo stable package gets updated when it is included in a
      Debian release
    - The general policy that weasel has is: things only go onto
      deb.torproject.org if they are already in some Debian. So that's
why there's a delay for new stable releases: they need to bake in Debian
sid before they're really in a Debian.
  - Gman999 and others are reviving the TorBSD project, which includes
    making sure relays work well on all of the BSD platforms.

- Activities in 2022
  - Should we do irc meetings, or video calls and chat like this, or
    other?
    - some people like the video angle, because we see real people.
    - next meetup is at CCC r3C.

- RPM packages
- kushal wonders: do any relay operator orgs use the tor rpm?
    - no-one present is using it

Relay orgs present include:
- applied-privacy.net
- artikel10
- Calyx
- CCC Stuttgart
- dfri
- digitalcourage
- f3 netze
- nifty
- nos oignons
- torservers.net
-- 
The Tor Project
Community Team Lead
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20211123/dc1ba640/attachment.sig>


More information about the tor-project mailing list