[tor-relays] AS awareness

Tobias Sachs tobias at tobiassachs.de
Thu Aug 2 06:56:41 UTC 2018


Hey folks!

How about trying it with /8 and if that fails falling back to /16. 

Is it possible to set the limit to /14 /12 or maybe /10?

And Conrad, the main concern is mostly like in my case to get kicked out while you still have production systems running or the worst case a police raid. 

Best Regards
Tobias

> Am 02.08.2018 um 08:05 schrieb <conrad at rockenhaus.com> <conrad at rockenhaus.com>:
> 
> I did want to note one thing about these big ASes... sure, they may be big ASes, but they are still lacking in one major area - Exits.
> 
> OVH has almost 4.5 Gbit/s of relay bandwidth available within the AS. However, if you search for exits, that rapidly drops to just under 750 mbit/s.
> 
> I'm more than positive all of the other big ASes are the same way.
> 
> A little off topic, but it just amazes me how much exit capacity these sites actually have, but people aren't willing to sign up for services whose TOS permits running an exit (or can't afford it), so they run a relay at an overly saturated site.
> 
> Thanks,
> 
> Conrad
> 
> --
> Conrad Rockenhaus
> Fingerprint: 8049 CDBA C385 C451 3348 776D 0F72 F2B5 26DA E93F
> Public Key: https://pgp.key-server.io/pks/lookup?op=get&search=0x0F72F2B526DAE93F
> https://www.rockenhaus.com
> ------
> Get started with GreyPony Anonymization Today!
> https://www.greyponyit.com
> 
> -----Original Message-----
> From: tor-relays <tor-relays-bounces at lists.torproject.org> On Behalf Of nusenu
> Sent: Sunday, July 29, 2018 4:43 PM
> To: tor-relays at lists.torproject.org
> Subject: Re: [tor-relays] AS awareness
> 
> 
> 
> Mirimir:
>> On 07/29/2018 02:26 PM, nusenu wrote:
>>>>> If I know the relays IP I could give you the probabilities of your 
>>>>> relay relaying traffic to others in the same AS (since a relay will 
>>>>> usually not be used with others in the same /16 netblock)
>>>> 
>>>> It'd be better for relays to avoid connecting within an AS, right?
>>> 
>>> better according to what metric?
>> 
>> Risk of coordinated compromise.
> 
> that is a very generic and short description
> 
> 
> 
> --
> https://twitter.com/nusenu_
> https://mastodon.social/@nusenu
> 
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



More information about the tor-relays mailing list