Who controls #Tor's DNS traffic?
An Analysis of the @torproject DNS Landscape.
https://medium.com/@nusenu/who-controls-tors-dns-traffic-a74a7632e8ca
I'd like to have #DNSSEC indicators (among other new items) on the TorAtlas page of exit relays, lets see what the tor-metrics team thinks about it
Dear @torproject exit relay operators,
only 74% of the tor exit capacity does #DNSSEC validation, let's increase that figure to >90%. Please look into your DNS setup if your ContactInfo string is mentioned on this page:
Want to help grow the torproject network by adding #Tor relays? This guide will help you get going:
https://blog.torproject.org/new-guide-running-tor-relay
(joined blog post with flexlibris)
If you need help the tor-relays mailing list is happy to answer your questions
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I just released relayor v0.3.1 - the ansible role for #Tor relay operators.
It comes with support for:
#FreeBSD / #HardenedBSD
#Debian / #Ubuntu
#CentOS / #Fedora
#OpenBSD
https://github.com/nusenu/ansible-relayor/releases
This is an important new #Tor feature for relays and the entire network: The new denial of service mitigation got merged into the MASTER branch.
If you can't wait for the next alpha release to try it out, you might be able to use provided nightly builds if you use a debian-based OS.
https://deb.torproject.org/torproject.org/dists/
#privacy infrastructure
#Tor alpha releases will soon have some Denial-of-Service mitigation mechanisms build into it - to help with the current issues on the tor network. https://mastodon.social/media/QmzFuNf5bFcWAIFJShE
The effects of the ongoing heavy load on the #Tor network are most noticeable when looking at the decreasing amount of available guard and HSDir relays. This affects the stability and performance of .onion addresses. https://mastodon.social/media/Vxrz5JMvk1R1vom9LyI
This is a quick reminder that in one week , #Tor 0.3.0.x will reach its end of life date (2018-02-01).
>300 relays are still running that major version.
https://nusenu.github.io/OrNetStats/#major-versions
Consider enabling auto-updates to keep your relays safe
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#AutomaticSoftwareUpdates
Dear #Tor relay operators, please ensure you set a proper MyFamily and ContactInfo when running multiple relays. It is required now. Thanks for running relays!
The #Tor relay documentation has shown its age, some of us have been working on writing something new. Currently it lives on trac but will move eventually.
The Tor Relay Guide
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide
Feedback welcome!
#Tor users are increasingly blocked from even trying to solve #Google #Recaptcha's (they don't get to see CAPTCHAs to solve) - this is a worrisome trend. #privacy https://mastodon.social/media/HdXXRUS7R4-DcjMJm5U
The @torproject is inviting you to a #Tor #relay #meetup in #NYC on 2017-12-07 @ 6:45PM on the 20th floor of 150 Broadway LMHQ
Lots of new #Tor releases fixing 5 #vulnerabilities: -Replay-cache ineffective for v2 onion services -Remote DoS attack against directory authorities -An attacker can make Tor ask for a password -Relays can pick themselves in a circuit path -Use-after-free in onion service v2
https://lists.torproject.org/pipermail/tor-talk/2017-December/043818.html
#OrNetRadar has a new check that detects #Tor exit relays that route their traffic back into the #tornetwork (so they can perform man in the middle attacks without exiting any traffic) first detected #badexits
https://lists.riseup.net/www/arc/ornetradar/2017-11/msg00116.html
Dear #Tor exit relay operators please have a look at this list by #torbrowser developer arthur edelstein - it tells you whether your exit relays fail to resolve hostnames https://arthuredelstein.net/exits/ mitigation if you are affected:
upgrade to the latest tor releases
Since #tor 0.3.2.1-alpha you can display the expiry date of your online signing keys (I overlooked that)
https://www.torproject.org/docs/tor-manual-dev.html.en#opt-key-expiration
If you need a reason why you should use a @whonix like setup to prevent your real IP from leaking in case of #tor browser bugs and exploits:
https://blog.torproject.org/tor-browser-709-released
Important upcoming fix for #tor exit relays addressing DNS related timeouts.
https://trac.torproject.org/projects/tor/ticket/21394
Workaround via resolv.conf
https://trac.torproject.org/projects/tor/wiki/doc/DnsResolver#TuningeventdnscomponentofTorDaemon