[tor-relays] Please unsubscribe me
Joshua Norvell
joshuanorvell at yahoo.com
Fri Apr 15 21:11:24 UTC 2016
Please unsubscribe me
--------------------------------------------
On Fri, 4/15/16, tor-relays-request at lists.torproject.org <tor-relays-request at lists.torproject.org> wrote:
Subject: tor-relays Digest, Vol 63, Issue 26
To: tor-relays at lists.torproject.org
Date: Friday, April 15, 2016, 1:07 AM
Send tor-relays mailing list
submissions to
tor-relays at lists.torproject.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
or, via email, send a message with subject or body 'help'
to
tor-relays-request at lists.torproject.org
You can reach the person managing the list at
tor-relays-owner at lists.torproject.org
When replying, please edit your Subject line so it is more
specific
than "Re: Contents of tor-relays digest..."
Today's Topics:
1. Using your own Relay as Entry Node
(fr33d0m4all)
2. Re: Using your own Relay as Entry Node
(Yawning Angel)
3. Re: Using your own Relay as Entry Node
(Tristan)
4. Re: Using your own Relay as Entry Node
(starlight.2016q1 at binnacle.cx)
5. Hiding or masking running tor process..
(rush23 at gmx.net)
6. Re: Hiding or masking running tor
process.. (dawuud)
7. Re: Hiding or masking running tor
process.. (k0nsl)
----------------------------------------------------------------------
Message: 1
Date: Thu, 14 Apr 2016 21:38:15 +0000
From: fr33d0m4all <fr33d0m4all at riseup.net>
To: tor-relays at lists.torproject.org
Subject: [tor-relays] Using your own Relay as Entry Node
Message-ID: <57100DC7.9080905 at riseup.net>
Content-Type: text/plain; charset=utf-8
Hi,
I've seen some time ago a discussion about using your own
Tor Relay as
an Entry Node, but I'd like to have your opinion in the
following two
scenarios (if it makes any difference switching from 1 to
2):
1) You point at your node when you're in the same network
where the node
resides (I mean always by setting EntryNodes in torrc, not
by using it
as a SOCKS proxy)
2) You point at your node from a different network than the
one in which
the relay is
I think that if your node is being used by others, you would
simply be
one of the lots of users passing through it, with the
advantage of
removing the risk of a bad Entry node, what do you think
about that?
And about using it as a SOCKS proxy to enter the Tor
network? Do the
same considerations apply or is it even worse to use a relay
as a SOCKS
proxy?
I'm sure that I've read about reasons to avoid using your
own node, but
I don't remember the considerations about this argument...
Best regards,
Fr33d0m4All
--
_____________________________________________________________
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E
ECB4
IRC Nick: fr33d0m4all (OFTC & Freenode)
_____________________________________________________________
------------------------------
Message: 2
Date: Thu, 14 Apr 2016 22:24:30 +0000
From: Yawning Angel <yawning at schwanenlied.me>
To: tor-relays at lists.torproject.org
Subject: Re: [tor-relays] Using your own Relay as Entry
Node
Message-ID: <20160414222430.78b9255e at schwanenlied.me>
Content-Type: text/plain; charset="us-ascii"
On Thu, 14 Apr 2016 21:38:15 +0000
fr33d0m4all <fr33d0m4all at riseup.net>
wrote:
> And about using it as a SOCKS proxy to enter the Tor
network? Do the
> same considerations apply or is it even worse to use a
relay as a
> SOCKS proxy?
This is horrible and should *NEVER* be done, assuming any
network not
physically controlled by you is between you and the SOCKS
proxy
server[0], simply based on the request (and authentication
if you
chose to use such things) being in the clear.
Regards,
--
Yawning Angel
[0]: So, SOCKS over an internal network to a VM/magical
anonymity box
may be ok (depending on your threat model). SOCKS to a
VPS somewhere
is essentially always a bad idea.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160414/20b5b36b/attachment-0001.sig>
------------------------------
Message: 3
Date: Thu, 14 Apr 2016 17:31:13 -0500
From: Tristan <supersluether at gmail.com>
To: tor-relays at lists.torproject.org
Subject: Re: [tor-relays] Using your own Relay as Entry
Node
Message-ID:
<CAKkV4FFxzEDuXoXeyFOpaYj-krUMWWrzOOg6_oJxUFMNFcpLMg at mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Using a relay as a SOCKS proxy is fine for the local
network, just don't
open it to the outside world.
Using your relay as an entry uses it as part of the
circuit.
Using your relay as a local proxy creates a new circuit
(without using your
node in the circuit)
On Apr 14, 2016 5:26 PM, "Yawning Angel" <yawning at schwanenlied.me>
wrote:
> On Thu, 14 Apr 2016 21:38:15 +0000
> fr33d0m4all <fr33d0m4all at riseup.net>
wrote:
> > And about using it as a SOCKS proxy to enter the
Tor network? Do the
> > same considerations apply or is it even worse to
use a relay as a
> > SOCKS proxy?
>
> This is horrible and should *NEVER* be done, assuming
any network not
> physically controlled by you is between you and the
SOCKS proxy
> server[0], simply based on the request (and
authentication if you
> chose to use such things) being in the clear.
>
> Regards,
>
> --
> Yawning Angel
>
> [0]: So, SOCKS over an internal network to a VM/magical
anonymity box
> may be ok (depending on your threat model). SOCKS
to a VPS somewhere
> is essentially always a bad idea.
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160414/85cea375/attachment-0001.html>
------------------------------
Message: 4
Date: Thu, 14 Apr 2016 21:39:44 -0400
From: starlight.2016q1 at binnacle.cx
To: tor-relays at lists.torproject.org
Subject: Re: [tor-relays] Using your own Relay as Entry
Node
Message-ID: <6.2.5.6.2.20160414213758.04b31638 at binnacle.cx>
Content-Type: text/plain; charset="us-ascii"
You may find the information in this ticket
of interest, particularly the cited comment:
https://trac.torproject.org/projects/tor/ticket/16824#comment:23
------------------------------
Message: 5
Date: Fri, 15 Apr 2016 07:48:25 +0200
From: rush23 at gmx.net
To: tor-relays at lists.torproject.org
Subject: [tor-relays] Hiding or masking running tor
process..
Message-ID: <5D345D5E-316B-4BD9-8B3C-76C50DE7E46E at gmx.net>
Content-Type: text/plain; charset=UTF-8
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Hey everybody,
is there any way to hide running a tor process on a
server??
My vps hoster monitors which processes consume most of the
resources, so just hiding would be best especially when it
looks like a 'not tor' process..?
I appreciate any helpful hints...
Cheers
0x23
- --
-----BEGIN PGP SIGNATURE-----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=Ovl+
-----END PGP SIGNATURE-----
------------------------------
Message: 6
Date: Fri, 15 Apr 2016 09:36:30 +0000
From: dawuud <dawuud at riseup.net>
To: tor-relays at lists.torproject.org
Subject: Re: [tor-relays] Hiding or masking running tor
process..
Message-ID: <20160415093630.GA6712 at riseup.net>
Content-Type: text/plain; charset="utf-8"
Dear 0x23,
This is a totally rediculous question... but Oh yes you can
certainly replace top, ps etc.
with your own customized versions that exclude the tor
process. You have root access, yes?
Why would you even want to do this? I don't understand.
Don't you know that society praises tor relay operators for
contributing?
Sincerely,
david
On Fri, Apr 15, 2016 at 07:48:25AM +0200, rush23 at gmx.net wrote:
> Hey everybody,
>
> is there any way to hide running a tor process on a
server??
> My vps hoster monitors which processes consume most of
the resources, so just hiding would be best especially when
it looks like a 'not tor' process..?
>
> I appreciate any helpful hints...
>
> Cheers
> 0x23
> --
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160415/4fa155b4/attachment-0001.sig>
------------------------------
Message: 7
Date: Fri, 15 Apr 2016 09:58:49 +0200
From: k0nsl <i.am at k0nsl.org>
To: tor-relays at lists.torproject.org
Subject: Re: [tor-relays] Hiding or masking running tor
process..
Message-ID: <987970e3-3563-79db-f02f-6b2c70704fe2 at k0nsl.org>
Content-Type: text/plain; charset="utf-8"; Format="flowed"
David,
I'm assuming he wants to hide the process due to provider
killing the
tor process. There are hosts whom are using incredibly lame
methods for
detecting the tor process ? so simply renaming it can
often bypass.
At any rate, if my assumption is correct, well, I don't
suggest engaging
in that practice. It's better to find a host which allows
one to operate
tor.
Best wishes,
-k0nsl
On 2016-04-15 11:36, dawuud wrote:
> Dear 0x23,
>
> This is a totally rediculous question... but Oh yes you
can certainly replace top, ps etc.
> with your own customized versions that exclude the tor
process. You have root access, yes?
>
> Why would you even want to do this? I don't
understand.
> Don't you know that society praises tor relay operators
for contributing?
>
> Sincerely,
> david
>
> On Fri, Apr 15, 2016 at 07:48:25AM +0200, rush23 at gmx.net wrote:
>> Hey everybody,
>>
>> is there any way to hide running a tor process on a
server??
>> My vps hoster monitors which processes consume most
of the resources, so just hiding would be best especially
when it looks like a 'not tor' process..?
>>
>> I appreciate any helpful hints...
>>
>> Cheers
>> 0x23
>> --
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160415/d735d94c/attachment.html>
------------------------------
Subject: Digest Footer
_______________________________________________
tor-relays mailing list
tor-relays at lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
------------------------------
End of tor-relays Digest, Vol 63, Issue 26
******************************************
More information about the tor-relays
mailing list