[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] AS awareness



Hey folks!

How about trying it with /8 and if that fails falling back to /16. 

Is it possible to set the limit to /14 /12 or maybe /10?

And Conrad, the main concern is mostly like in my case to get kicked out while you still have production systems running or the worst case a police raid. 

Best Regards
Tobias

> Am 02.08.2018 um 08:05 schrieb <conrad@xxxxxxxxxxxxxx> <conrad@xxxxxxxxxxxxxx>:
> 
> I did want to note one thing about these big ASes... sure, they may be big ASes, but they are still lacking in one major area - Exits.
> 
> OVH has almost 4.5 Gbit/s of relay bandwidth available within the AS. However, if you search for exits, that rapidly drops to just under 750 mbit/s.
> 
> I'm more than positive all of the other big ASes are the same way.
> 
> A little off topic, but it just amazes me how much exit capacity these sites actually have, but people aren't willing to sign up for services whose TOS permits running an exit (or can't afford it), so they run a relay at an overly saturated site.
> 
> Thanks,
> 
> Conrad
> 
> --
> Conrad Rockenhaus
> Fingerprint: 8049 CDBA C385 C451 3348 776D 0F72 F2B5 26DA E93F
> Public Key: https://pgp.key-server.io/pks/lookup?op=get&search=0x0F72F2B526DAE93F
> https://www.rockenhaus.com
> ------
> Get started with GreyPony Anonymization Today!
> https://www.greyponyit.com
> 
> -----Original Message-----
> From: tor-relays <tor-relays-bounces@xxxxxxxxxxxxxxxxxxxx> On Behalf Of nusenu
> Sent: Sunday, July 29, 2018 4:43 PM
> To: tor-relays@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-relays] AS awareness
> 
> 
> 
> Mirimir:
>> On 07/29/2018 02:26 PM, nusenu wrote:
>>>>> If I know the relays IP I could give you the probabilities of your 
>>>>> relay relaying traffic to others in the same AS (since a relay will 
>>>>> usually not be used with others in the same /16 netblock)
>>>> 
>>>> It'd be better for relays to avoid connecting within an AS, right?
>>> 
>>> better according to what metric?
>> 
>> Risk of coordinated compromise.
> 
> that is a very generic and short description
> 
> 
> 
> --
> https://twitter.com/nusenu_
> https://mastodon.social/@nusenu
> 
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays