[tor-relays] relay monitoring

mpan tor-1qnuaylp at mpan.pl
Wed May 5 14:02:33 UTC 2021


>    How would I continuously monitor the incoming traffic to my relay,
>    both what's supposed to be there and what isn't.
   I’m don’t know, what do you mean by “supposed to be there and what 
isn’t”, but in general you can use nyx⁽¹⁾ to monitor your Tor node.

   If that’s for some research and finer control is needed, Tor nodes 
expose a control socket, which is what nyx uses. Available either 
directly⁽²⁾ or through a Python library — Stem⁽³⁾. If conducting 
research, please respect users’ privacy. In particular see the 
“Expectations for Relay Operators” draft⁽⁴⁾.

   Finally, all incoming connections arrive at the same port, so under 
Linux they are traceable using common tools: auditd, 
libcap/tcpdump/Wireshark, iproute2’s `ss` and so on.
____
  ¹ https://nyx.torproject.org/
  ² https://gitweb.torproject.org/torspec.git/tree/control-spec.txt
  ³ https://stem.torproject.org/https://gitlab.torproject.org/tpo/community/team/-/wikis/Expectations-for-Relay-Operators

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20210505/7f524e6d/attachment.sig>


More information about the tor-relays mailing list