[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Planning a relay
Is it possible that your relay can be online for those 22-25 days 
straight and then hibernate for the rest of the month instead, or must 
it be the case of every few days? If it could be online for that 
period as a single block that would be far better.
Also you are correct on the physical safety of the device, which is 
why running it at home or in a secure environment (ie a good 
datacenter) is the best approach. However, physical and even server 
security isn't the threat to anonymity, the intelligence agencies can 
gather almost as much information from tapping the backbone cables and 
IXP's as they would running their own or hijacking yours. Generally 
datacenters are recommended rather than running it at home as it is 
usually cheaper, lower risk of your door being busted down (of which I 
have experience in being the target of raids) and it more stable.
I would not at all recommend you use a VPN to route your relay traffic 
through as this merely passes the burden onto somebody else who may 
not be entirely comfortable with you doing this without asking in 
advance. Furthermore, it offers no more security to the circuits your 
relay is a part of and I would argue it could actually hurt anonymity 
since you are giving a third party access to the traffic information 
of your server.
Also, Tor Project only really recommends bridges be run in the Amazon 
cloud due to the small deployment and low cost, with the IP included 
in that and for bridges the IP is the real resource as opposed to disk 
space, bandwidth or CPU power. Therefore it enables lots of new 
bridges to be brought online easily, cheaply and without the 
complications or additional considerations that would be required in 
bringing online an exit relay for example.
-T
Hi, i might have explained the scenario a bit poorly. The machine 
doesn't go offline every few days but every few weeks, and then for a 
few days at a time. Nothing to be done about that.
Busting down doors is pretty much spot on about the reason i am 
unwilling to run the relay on my own IP address: i've read enough news 
about overzealous law enforcement in my country (non-Tor related, but 
still), and i'm certainly not going to face the public harassment and 
general fuss of an unnecessary and very embarrassing seizure.
Regarding the VPN provider's consent - i have asked for permission and 
they fully endorse running a Tor relay through their services, which 
means they are ready and willing to handle any and all abuse issues. I'm 
not sure about the anonymity side of things, which is exactly why i came 
here asking for opinions, experiences and general advice. All input is 
very much appreciated.
In the end, in my case, it comes down to either contributing a 
VPN-tunneled machine for ~25 days a month to the Tor network, or keeping 
it away from it. If the VPN part is too compromising i'll have to put 
the thought on hold, but i'll keep on reading in the meantime.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays