[tor-relays] Heartfelt gratitude from censored region

Matthew Glennon matthew at glennon.online
Wed Apr 4 12:06:47 UTC 2018


I'll be your Middle any time. (Since you probably can't reach me for your
Guard.) Good luck, friend.


On Wed, Apr 4, 2018, 00:05 <jackoreamnos at tutanota.com> wrote:

> For those who may skip emails by the subject line, I resend my own email.
>
> There is a sinking feel in general over here, where a bunch of us learn
> more about Tor.  We learnt we cannot run our own relays because here
> censorship is very strong; at the same time, we realize we have many relay
> operators in other countries to thank, for giving us a window into the
> world.
>
> Thank you.  And I write this email over Tor.
>
> - Jack
>
>
> Date: 4. Apr 2018 03:55
> From: jackoreamnos at tutanota.com
> To: tor-relays at lists.torproject.org
> Cc: tor-relays at lists.torproject.org
> Subject: Re: [tor-relays] tor-relays Digest, Vol 87, Issue 4
>
> We had some more discussions over here, and someone pointed out a key fact
> which we novices did not get at first - the Tor network does not REALLY
> trust the relay operators until the directory authorities DAs (whose IPs
> are hardcoded into the source code) can check them out and then vote about
> what they have learnt about these relays.  If relays pass that test, they
> get onto a live document called the "Consensus" (between the DAs).  So new
> clients to the network trust these DAs and they trust the consensus reached
> by the DAs.  That is how new clients learn the network topology and find
> relays to connect to.
>
> So we were wrong on a few points:
> (1) we thought we can contribute to the relay networks without being
> detected, but basically no - you cannot contribute to the relay network
> unless you are in the consensus, and if you are in the consensus, your IP
> address is world readable.
> (2) a private bridge is providing relay WITHOUT publishing descriptors to
> the consensus, so it is a hybrid creature: (a) it appears as a client to
> the Tor network proper, being hidden from the consensus, and therefore
> cannot help relay traffic; (b) it appears as a relay server to connecting
> clients but unlike relays already on the consensus certain clients trust it
> because they know about the private bridge from channels they trust outside
> the Tor consensus; and these clients gain a extra measure of security from
> whatever obfuscation the bridge can offer.
>
> So by design, Tor does not trust and cannot completely trust a relay that
> just pops up one day.  There is no way for Tor DAs to work with a relay
> node that hides itself behind a VPN.
>
> So in the area where we live, if we run a relay, we will be caught, plain
> and simple.  No way around it.  No way for us to contribute by running a
> relay.  Zero, nada.  We utterly depend on bridges hosted outside our
> geography, to have any hope of accessing Tor.  Some of us who have
> facilities in another country might help, but for us that is comparatively
> difficult and expensive.
>
> The only reason I can access the "outside world" is due to people who
> hosts bridges for us.  If you guys pack and go home, nothing we can do.
> Zero, nada.  I am writing this email over Tor.
>
> - Jack
>
> 3. Apr 2018 16:02 by development at jivanamara.net:
>
> Hey Jack,
>
> Here's my understanding of your concerns, anyone else please chime in if
> I'm mistaken anywhere.
>
> For running a normal relay compared to a client connecting to a relay
> via obfs4, it's less likely to be discovered by examining the content of
> traffic.  The obfs4 protocol is designed to disguise the connection
> between a client (i.e. torbrowser).  Once the traffic hits a relay, the
> interaction between relays contains less opportunities to identify it as
> tor traffic as opposed to any other encrypted traffic.
>
> That being said, there are a couple of other things that would make it
> very easy to identify a TOR relay.  First, by default, relays are listed
> for anyone to examine.
>
> Second, if the authorities are watching, the change in traffic to/from
> your home computer will be pretty obvious.
>
> Regarding your concerns about children being inappropriately exposed to
> the dark web, running a relay will make very little difference compared
> to not running one.  For your children to see the content of the dark
> web they'll need to install torbrowser (or equivalent) and that's going
> to be the same whether or not you're running a relay.  The only
> potential difference is that if in your area it's very difficult to
> connect to the tor network and your children know you're running a
> relay, with some knowledge they could configure torbrowser to connect
> first to your relay.  In some sense, if the authorities are successful
> in blocking access to the tor network, you could be enabling their romps
> on the dark web.
>
> HTH
>
> Jivan
>
>
> On 04/03/2018 02:38 AM, tor-relays-request at lists.torproject.org wrote:
>
> Send tor-relays mailing list submissions to
> tor-relays at lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> or, via email, send a message with subject or body 'help' to
> tor-relays-request at lists.torproject.org
>
> You can reach the person managing the list at
> tor-relays-owner at lists.torproject.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-relays digest..."
>
>
> Today's Topics:
>
> 1. Re: failed setup of obfs4 on relay (jackoreamnos at tutanota.com)
> 2. Re: failed setup of obfs4 on relay (jackoreamnos at tutanota.com)
> 3. Re: Estimation of bridge traffic / Bridge or relay needed?
> (jackoreamnos at tutanota.com)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Tue, 3 Apr 2018 05:00:18 +0200 (CEST)
> From: <jackoreamnos at tutanota.com>
> To: <tor-relays at lists.torproject.org>
> Cc: <tor-relays at lists.torproject.org>
> Subject: Re: [tor-relays] failed setup of obfs4 on relay
> Message-ID: <L98Ret7--3-0 at tutanota.com>
> Content-Type: text/plain; charset="utf-8"
>
> Thank you all, that was very helpful. - Jack
>
> 30. Mar 2018 20:53 by arma at mit.edu <mailto:arma at mit.edu>:
>
> On Fri, Mar 30, 2018 at 04:52:23PM -0400, Roger Dingledine wrote:
>
> For obfs4, the active prober doesn't know the secret "cert" parameter,
>
> For far far more detail on the various pluggable transports and how
> they look on the wire, check out this awesome page that David Fifield
> put together:
>
>
> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
> <
> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
> >
>
> --Roger
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org <mailto:tor-relays at lists.torproject.org>
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays <
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/1e860483/attachment-0002.html
> >
>
> ------------------------------
>
> Message: 2
> Date: Tue, 3 Apr 2018 05:00:18 +0200 (CEST)
> From: <jackoreamnos at tutanota.com>
> To: <tor-relays at lists.torproject.org>
> Cc: <tor-relays at lists.torproject.org>
> Subject: Re: [tor-relays] failed setup of obfs4 on relay
> Message-ID: <L98Ret7--3-0 at tutanota.com>
> Content-Type: text/plain; charset="utf-8"
>
> Thank you all, that was very helpful. - Jack
>
> 30. Mar 2018 20:53 by arma at mit.edu <mailto:arma at mit.edu>:
>
> On Fri, Mar 30, 2018 at 04:52:23PM -0400, Roger Dingledine wrote:
>
> For obfs4, the active prober doesn't know the secret "cert" parameter,
>
> For far far more detail on the various pluggable transports and how
> they look on the wire, check out this awesome page that David Fifield
> put together:
>
>
> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
> <
> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
> >
>
> --Roger
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org <mailto:tor-relays at lists.torproject.org>
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays <
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/1e860483/attachment-0003.html
> >
>
> ------------------------------
>
> Message: 3
> Date: Tue, 3 Apr 2018 10:38:38 +0200 (CEST)
> From: <jackoreamnos at tutanota.com>
> To: <tor-relays at lists.torproject.org>
> Cc: <tor-relays at lists.torproject.org>
> Subject: Re: [tor-relays] Estimation of bridge traffic / Bridge or
> relay needed?
> Message-ID: <L99e63k--3-0 at tutanota.com>
> Content-Type: text/plain; charset="utf-8"
>
> Want to follow up the discussion on encouraging people to run relays.
>
> The powers that be where I live now heavily frowns upon VPN and Tor.  And
> a fair number in our community is sensing further tightening in the air.
>
> Today we had a discussion, we had a lot of questions.  I try to summarize
> below and see if we can fact-check and learn more.
>
> (1) Advocacy: Background - Someone raised the idea that we should each run
> a Tor relay in each of our house.  Someone said the powers that be cannot
> put all of us in jail if we get enough people to host Tor.  A parent among
> us said, "I never before had an urge to run a VPN or Tor.  But when running
> encryption and sharing a VPN tunnel with a criminal on the next packet is
> required to ensure your freedom to read BBC, you feel queasy and you worry
> what your underage kids might stumble on, things they are too young to deal
> with on the dark web.  But loosing the freedom to read BBC makes me feel
> beyond queasy, beyond nauseated, and bilious, and sick..."  He used a few
> more adjectives that I cannot spell.  There were non technical users who
> expressed interest to run a non-exit relay, but only if they will be able
> to run an installer and click the next button and only use default
> options.  And only if they can feel assured they understand the risks.
>
>   (1.a) Their underage kids will not stumble on the dark web before they
> are old enough to know they are doing.  Underage kids should not be able to
> stumble on the dark web on the computer the Tor relay is run (and what must
> be done to assure that).  And underage kids should not be able to stumble
> on the dark web by being on the same WIFI network in the house.
>
>   (1.b) There are different degrees of fear of risks.  Some are brave
> enough to run a non-relay in the house where they live.  We think they need
> to assume they can be detected.  Some were only willing to consider if the
> non-exit Tor cannot be easily detected.  The definition of not easily
> varies:
>   - as difficult to detect as the obfs4 bridge protocol (but someone said
> the bridge protocol only works between a Tor client and a Tor relay, but
> not between a Tor relay and another Tor relay; we have not been able to
> confirm this by our own efforts)
>  - as difficult as the meek protocol (someone said the idea of meek is to
> encrypt Tor packets and send it to a unblocked IP/domain, where the traffic
> is decrypted and copied to a proper Tor network); someone said he is
> willing to run a meek server to accept incoming connections, but only if
> the outgoing connections are at least obfs4.  Someone said if we have many
> thousands of these tiny meek nodes hosted at our home address, we offload
> the official meek proxies run on amazon and azure.  And even if we
> contribute only 1kb/s each, it is going to be more than sharing the cost -
> the idea is we want a high level of household penetration so that the
> powers that be find it hard to clamp us down.
>   - as difficult to detect as protected by a VPN.  Someone said he would
> pay for a VPN package, run a relay on a machine which only talks to the
> world through the VPN.  But someone said that works for a Tor client, but
> not for a relay because a relay would need to have its own IP and listen on
> certain ports on that IP, and so because you VPN exit point will not let
> you listen on any port numbers, even if he is willing to pay for a
> commercial VPN that exits in another country, his tor relay cannot accepts
> incoming connections.  Some people would give up running a non-exit if this
> cannot be done.  The only IP they can access is where they sleep, and they
> want to be able to sleep well.  Not just them, but their wife and their
> children needs to sleep well too.  Is the ability to accept incoming
> connections a requirement to running a non-exit relay?
>
> (2) There is a sentiment that we should get "every household to run a Tor"
> so that the powers that be will find it much harder to clamp down.  Someone
> said he would install a Tor relay on every single computer he controls, to
> support journalism and news reporting, if what he contributes ONLY goes
> towards beating censorship against the media.  He said he feels it is a
> much easier sell if the sole function of that node is to allow people
> living under censorship to read newspaper.  He said if there is a funding
> campaign to deploy the onion enterprise toolkit for news media, he will
> want to direct his donation specifically to those.  Or if he can run an
> exit relay ONLY for for the BBC news domain.  He said, then running Tor is
> a much easier sell to his family and friends.  If the police brings him in,
> the back and forth will not be "we observed spams and hacks and viruses and
> copyright infringements on your IP", but the back and forth will just be
> "you are reading something you should not read on the web" and we can have
> a much better chance of advocating for "Tor relay in every home".  We know
> in general Tor supports more network access than reading the news.  But
> compared to countries where the freedom to run Tor exits are protected by
> law, living where we live we want to make it a much easier sell, and
> eventually to get a higher penetration so that the penetration itself
> becomes a barrier for the powers that be to clamp us down.
>
> And as we are not experts, and as we run real risks, and as we want our
> family to sleep well, we have framed our "requirements" or "prerequisites"
> to run Tor relays almost beyond the reasonable.  You might want to call us
> paranoid.  If there is a way for us paranoid people to run relays and to
> advocate, please help us.
>
> Jack
>
> 2. Apr 2018 07:36 by arma at mit.edu <mailto:arma at mit.edu>:
>
>     On Mon, Apr 02, 2018 at 03:32:00AM -0400, grarpamp wrote:
>
>         > https://www.torproject.org/docs/faq#RelayOrBridge <
> https://www.torproject.org/docs/faq#RelayOrBridge>
>         >
>         > "If you have lots of bandwidth, you should definitely run a
> normal relay.
>         > If you're willing to be an exit, you should definitely run a
> normal
>         > relay, since we need more exits. If you can't be an exit and
> only have a
>         > little bit of bandwidth, be a bridge. Thanks for volunteering!"
>
>         The 'normal's above are ambiguous and conflicting.
>         Replace them with 'non-exit' and 'exit'.
>
>
>     Ah, actually no, replace them with "relay" and "relay".
>
>     In that text, "normal relay" is as opposed to "bridge relay".
>
>     The FAQ text sure needs some updating.
>
>     --Roger
>
>     _______________________________________________
>     tor-relays mailing list
>     tor-relays at lists.torproject.org <
> mailto:tor-relays at lists.torproject.org>
>     https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays <
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/ead69030/attachment.html
> >
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
> ------------------------------
>
> End of tor-relays Digest, Vol 87, Issue 4
> *****************************************
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
-- 
Matthew Glennon
matthew at glennon.online
PGP Signing Available Upon Request
https://keybase.io/crazysane
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20180404/3ef1f459/attachment-0001.html>


More information about the tor-relays mailing list