[tor-relays] Please unsubscribe me

Joshua Norvell joshuanorvell at yahoo.com
Fri Apr 15 21:11:24 UTC 2016


Please unsubscribe me
--------------------------------------------
On Fri, 4/15/16, tor-relays-request at lists.torproject.org <tor-relays-request at lists.torproject.org> wrote:

 Subject: tor-relays Digest, Vol 63, Issue 26
 To: tor-relays at lists.torproject.org
 Date: Friday, April 15, 2016, 1:07 AM
 
 Send tor-relays mailing list
 submissions to
     tor-relays at lists.torproject.org
 
 To subscribe or unsubscribe via the World Wide Web, visit
     https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 or, via email, send a message with subject or body 'help'
 to
     tor-relays-request at lists.torproject.org
 
 You can reach the person managing the list at
     tor-relays-owner at lists.torproject.org
 
 When replying, please edit your Subject line so it is more
 specific
 than "Re: Contents of tor-relays digest..."
 
 
 Today's Topics:
 
    1. Using your own Relay as Entry Node
 (fr33d0m4all)
    2. Re: Using your own Relay as Entry Node
 (Yawning Angel)
    3. Re: Using your own Relay as Entry Node
 (Tristan)
    4. Re: Using your own Relay as Entry Node
       (starlight.2016q1 at binnacle.cx)
    5. Hiding or masking running tor process..
 (rush23 at gmx.net)
    6. Re: Hiding or masking running tor
 process.. (dawuud)
    7. Re: Hiding or masking running tor
 process.. (k0nsl)
 
 
 ----------------------------------------------------------------------
 
 Message: 1
 Date: Thu, 14 Apr 2016 21:38:15 +0000
 From: fr33d0m4all <fr33d0m4all at riseup.net>
 To: tor-relays at lists.torproject.org
 Subject: [tor-relays] Using your own Relay as Entry Node
 Message-ID: <57100DC7.9080905 at riseup.net>
 Content-Type: text/plain; charset=utf-8
 
 Hi,
 I've seen some time ago a discussion about using your own
 Tor Relay as
 an Entry Node, but I'd like to have your opinion in the
 following two
 scenarios (if it makes any difference switching from 1 to
 2):
 
 1) You point at your node when you're in the same network
 where the node
 resides (I mean always by setting EntryNodes in torrc, not
 by using it
 as a SOCKS proxy)
 
 2) You point at your node from a different network than the
 one in which
 the relay is
 
 I think that if your node is being used by others, you would
 simply be
 one of the lots of users passing through it, with the
 advantage of
 removing the risk of a bad Entry node, what do you think
 about that?
 
 And about using it as a SOCKS proxy to enter the Tor
 network? Do the
 same considerations apply or is it even worse to use a relay
 as a SOCKS
 proxy?
 
 I'm sure that I've read about reasons to avoid using your
 own node, but
 I don't remember the considerations about this argument...
 
 Best regards,
    Fr33d0m4All
 
 -- 
 
 _____________________________________________________________
 
  PGP Key: 0DA8 7293 D561 3AEE A3C0  7F63 101F 316A F30E
 ECB4
  IRC Nick: fr33d0m4all (OFTC & Freenode)
 _____________________________________________________________
 
 
 ------------------------------
 
 Message: 2
 Date: Thu, 14 Apr 2016 22:24:30 +0000
 From: Yawning Angel <yawning at schwanenlied.me>
 To: tor-relays at lists.torproject.org
 Subject: Re: [tor-relays] Using your own Relay as Entry
 Node
 Message-ID: <20160414222430.78b9255e at schwanenlied.me>
 Content-Type: text/plain; charset="us-ascii"
 
 On Thu, 14 Apr 2016 21:38:15 +0000
 fr33d0m4all <fr33d0m4all at riseup.net>
 wrote:
 > And about using it as a SOCKS proxy to enter the Tor
 network? Do the
 > same considerations apply or is it even worse to use a
 relay as a
 > SOCKS proxy?
 
 This is horrible and should *NEVER* be done, assuming any
 network not
 physically controlled by you is between you and the SOCKS
 proxy
 server[0], simply based on the request (and authentication
 if you
 chose to use such things) being in the clear.
 
 Regards,
 
 -- 
 Yawning Angel
 
 [0]: So, SOCKS over an internal network to a VM/magical
 anonymity box
 may be ok (depending on your threat model).  SOCKS to a
 VPS somewhere
 is essentially always a bad idea.
 -------------- next part --------------
 A non-text attachment was scrubbed...
 Name: not available
 Type: application/pgp-signature
 Size: 819 bytes
 Desc: OpenPGP digital signature
 URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160414/20b5b36b/attachment-0001.sig>
 
 ------------------------------
 
 Message: 3
 Date: Thu, 14 Apr 2016 17:31:13 -0500
 From: Tristan <supersluether at gmail.com>
 To: tor-relays at lists.torproject.org
 Subject: Re: [tor-relays] Using your own Relay as Entry
 Node
 Message-ID:
     <CAKkV4FFxzEDuXoXeyFOpaYj-krUMWWrzOOg6_oJxUFMNFcpLMg at mail.gmail.com>
 Content-Type: text/plain; charset="utf-8"
 
 Using a relay as a SOCKS proxy is fine for the local
 network, just don't
 open it to the outside world.
 
 Using your relay as an entry uses it as part of the
 circuit.
 
 Using your relay as a local proxy creates a new circuit
 (without using your
 node in the circuit)
 On Apr 14, 2016 5:26 PM, "Yawning Angel" <yawning at schwanenlied.me>
 wrote:
 
 > On Thu, 14 Apr 2016 21:38:15 +0000
 > fr33d0m4all <fr33d0m4all at riseup.net>
 wrote:
 > > And about using it as a SOCKS proxy to enter the
 Tor network? Do the
 > > same considerations apply or is it even worse to
 use a relay as a
 > > SOCKS proxy?
 >
 > This is horrible and should *NEVER* be done, assuming
 any network not
 > physically controlled by you is between you and the
 SOCKS proxy
 > server[0], simply based on the request (and
 authentication if you
 > chose to use such things) being in the clear.
 >
 > Regards,
 >
 > --
 > Yawning Angel
 >
 > [0]: So, SOCKS over an internal network to a VM/magical
 anonymity box
 > may be ok (depending on your threat model).  SOCKS
 to a VPS somewhere
 > is essentially always a bad idea.
 >
 > _______________________________________________
 > tor-relays mailing list
 > tor-relays at lists.torproject.org
 > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 >
 >
 -------------- next part --------------
 An HTML attachment was scrubbed...
 URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160414/85cea375/attachment-0001.html>
 
 ------------------------------
 
 Message: 4
 Date: Thu, 14 Apr 2016 21:39:44 -0400
 From: starlight.2016q1 at binnacle.cx
 To: tor-relays at lists.torproject.org
 Subject: Re: [tor-relays] Using your own Relay as Entry
 Node
 Message-ID: <6.2.5.6.2.20160414213758.04b31638 at binnacle.cx>
 Content-Type: text/plain; charset="us-ascii"
 
 You may find the information in this ticket
 of interest, particularly the cited comment:
 
 https://trac.torproject.org/projects/tor/ticket/16824#comment:23
 
 
 
 ------------------------------
 
 Message: 5
 Date: Fri, 15 Apr 2016 07:48:25 +0200
 From: rush23 at gmx.net
 To: tor-relays at lists.torproject.org
 Subject: [tor-relays] Hiding or masking running tor
 process..
 Message-ID: <5D345D5E-316B-4BD9-8B3C-76C50DE7E46E at gmx.net>
 Content-Type: text/plain; charset=UTF-8
 
 -----BEGIN PGP SIGNED MESSAGE-----
 Hash: SHA512
 
 Hey everybody,
 
 is there any way to hide running a tor process on a
 server??
 My vps hoster monitors which processes consume most of the
 resources, so just hiding would be best especially when it
 looks like a 'not tor' process..?
 
 I appreciate any helpful hints...
 
 Cheers
 0x23
 - --
 -----BEGIN PGP SIGNATURE-----
 
 iQIzBAEBCgAdFhwweDIzIDxydXNoMjNAZ214Lm5ldD4FAlcQgJkACgkQOKD1ON7f
 MNhrpA/+KH3CXchdIH5ZpXsYe4rDUO2bCAo0lAtZHOogzngmqtJg22Tb9aKnSLBQ
 sLrtRLHgvGS17Ru3bzSqcSh7SE5vlKi3fFuRqB4f7aWHBreBKLCuOXOsp8YLjf2n
 f/KZxa0h9lATtjvhG8dKNUVZ7pBEX1awQPO56fkapbArqAg/dKPgggAlmcAhLgO+
 4jjPuk8B+fUlgVtRPaK3Igq4YTyRTkrQmiozM0q7A/4Jj1Sw2Bi8QBoUk1vCOR9y
 CBbrH7t/kkvts7DhmngjJX6Dc1bPCMkHAAisu+NhUXMVH6SMRrfVzJNR1sgD6BYO
 oq8J35xYQKCmppLrHRCQ/6YMqDnX27rk3z672AD8EiqZz4uynlrljsNnodmzIzbe
 eFog7KXaOjIcVH+EUpU1wAXIb0klg3mI9GfA6CYq342xPnNXVoyVqZOTdt3BlZpx
 rbF6M6ihF1YH2/RQluckCyUkxaO6sG9zPbtCY1LVLvppOHCRjNIPVxJ/pWhBbyQz
 Q4SH7VSJwS8KVtxa/yZe4sX4+h0lY/Opkg0F20Rsmf4522YCsn2rEYk5VveNj1yd
 NJ7mHqldfghp4IRROhneLX9tXz2S/hZtcibsWpnuaVC6n83yosAiErSEUbCHHmDI
 ZCFlfCO1UhvFGFiGanpLez62b1GGn/KHq0BeUzuIpHkXVK6mxRg=
 =Ovl+
 -----END PGP SIGNATURE-----
 
 
 
 ------------------------------
 
 Message: 6
 Date: Fri, 15 Apr 2016 09:36:30 +0000
 From: dawuud <dawuud at riseup.net>
 To: tor-relays at lists.torproject.org
 Subject: Re: [tor-relays] Hiding or masking running tor
 process..
 Message-ID: <20160415093630.GA6712 at riseup.net>
 Content-Type: text/plain; charset="utf-8"
 
 
 Dear 0x23,
 
 This is a totally rediculous question... but Oh yes you can
 certainly replace top, ps etc.
 with your own customized versions that exclude the tor
 process. You have root access, yes?
 
 Why would you even want to do this? I don't understand.
 Don't you know that society praises tor relay operators for
 contributing?
 
 Sincerely,
 david
 
 On Fri, Apr 15, 2016 at 07:48:25AM +0200, rush23 at gmx.net wrote:
 > Hey everybody,
 > 
 > is there any way to hide running a tor process on a
 server??
 > My vps hoster monitors which processes consume most of
 the resources, so just hiding would be best especially when
 it looks like a 'not tor' process..?
 > 
 > I appreciate any helpful hints...
 > 
 > Cheers
 > 0x23
 > --
 > 
 > _______________________________________________
 > tor-relays mailing list
 > tor-relays at lists.torproject.org
 > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 -------------- next part --------------
 A non-text attachment was scrubbed...
 Name: signature.asc
 Type: application/pgp-signature
 Size: 801 bytes
 Desc: not available
 URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160415/4fa155b4/attachment-0001.sig>
 
 ------------------------------
 
 Message: 7
 Date: Fri, 15 Apr 2016 09:58:49 +0200
 From: k0nsl <i.am at k0nsl.org>
 To: tor-relays at lists.torproject.org
 Subject: Re: [tor-relays] Hiding or masking running tor
 process..
 Message-ID: <987970e3-3563-79db-f02f-6b2c70704fe2 at k0nsl.org>
 Content-Type: text/plain; charset="utf-8"; Format="flowed"
 
 David,
 
 I'm assuming he wants to hide the process due to provider
 killing the 
 tor process. There are hosts whom are using incredibly lame
 methods for 
 detecting the tor process ?  so simply renaming it can
 often bypass.
 
 At any rate, if my assumption is correct, well, I don't
 suggest engaging 
 in that practice. It's better to find a host which allows
 one to operate 
 tor.
 
 Best wishes,
 
 -k0nsl
 
 On 2016-04-15 11:36, dawuud wrote:
 > Dear 0x23,
 >
 > This is a totally rediculous question... but Oh yes you
 can certainly replace top, ps etc.
 > with your own customized versions that exclude the tor
 process. You have root access, yes?
 >
 > Why would you even want to do this? I don't
 understand.
 > Don't you know that society praises tor relay operators
 for contributing?
 >
 > Sincerely,
 > david
 >
 > On Fri, Apr 15, 2016 at 07:48:25AM +0200, rush23 at gmx.net wrote:
 >> Hey everybody,
 >>
 >> is there any way to hide running a tor process on a
 server??
 >> My vps hoster monitors which processes consume most
 of the resources, so just hiding would be best especially
 when it looks like a 'not tor' process..?
 >>
 >> I appreciate any helpful hints...
 >>
 >> Cheers
 >> 0x23
 >> --
 >>
 >> _______________________________________________
 >> tor-relays mailing list
 >> tor-relays at lists.torproject.org
 >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 >>
 >>
 >> _______________________________________________
 >> tor-relays mailing list
 >> tor-relays at lists.torproject.org
 >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 -------------- next part --------------
 An HTML attachment was scrubbed...
 URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160415/d735d94c/attachment.html>
 
 ------------------------------
 
 Subject: Digest Footer
 
 _______________________________________________
 tor-relays mailing list
 tor-relays at lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 ------------------------------
 
 End of tor-relays Digest, Vol 63, Issue 26
 ******************************************


More information about the tor-relays mailing list