[tor-relays] relay monitoring
mpan
tor-1qnuaylp at mpan.pl
Wed May 5 14:02:33 UTC 2021
> How would I continuously monitor the incoming traffic to my relay,
> both what's supposed to be there and what isn't.
I’m don’t know, what do you mean by “supposed to be there and what
isn’t”, but in general you can use nyx⁽¹⁾ to monitor your Tor node.
If that’s for some research and finer control is needed, Tor nodes
expose a control socket, which is what nyx uses. Available either
directly⁽²⁾ or through a Python library — Stem⁽³⁾. If conducting
research, please respect users’ privacy. In particular see the
“Expectations for Relay Operators” draft⁽⁴⁾.
Finally, all incoming connections arrive at the same port, so under
Linux they are traceable using common tools: auditd,
libcap/tcpdump/Wireshark, iproute2’s `ss` and so on.
____
¹ https://nyx.torproject.org/
² https://gitweb.torproject.org/torspec.git/tree/control-spec.txt
³ https://stem.torproject.org/
⁴
https://gitlab.torproject.org/tpo/community/team/-/wikis/Expectations-for-Relay-Operators
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20210505/7f524e6d/attachment.sig>
More information about the tor-relays
mailing list