[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Emerald Onion's new relays
- To: tor-relays@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-relays] Emerald Onion's new relays
- From: nusenu <nusenu-lists@xxxxxxxxxx>
- Date: Mon, 12 Aug 2019 20:28:00 +0000
- Autocrypt: addr=nusenu-lists@xxxxxxxxxx; prefer-encrypt=mutual; keydata= xsFNBFj53gUBEADYKwT0pW1yiqt6UReZW8T2nXVCyeVT2G6z7AvW69afp82uthRH237pQ7Qs 5vq91DivN6fGN6cVksp0N9Yv+5HEQAwUxpLfcNDcGzmHMd0JMItEtozGv3a4FuiUoHAqeGXM 6Kzi3v5F2PZGF+U4QaGKEZq6u50gO/ZFy4GfC9z9tsO6Cm7s7KldVHMGx/a0MEGMwh6ZI9x2 hGXSSAKu58KRUkEpHzDiQTj+/j58ndNfZRQv6P5BLppHADRPqwEOm4RQcQYskyM0FdKXbJ8E 5GW268meflfv2BASsl3X/Xqxp+LNrstXIbFZ+38hVlQDDmdvaASpPTzIAxf8FxMYZqI+K1UE kP5nU45q84KiZoXwT6YYJDKToLSDnYkKlsrCSnLkE3Nb/IexgNoYO4nE6lT9BDV3athQCWw1 FwB5idRYWnIqbVgUFgYZDUdZBJmeTEeI+Wn5hFz6HvFVc/+haMVTcoEKSkG/tsSGsKOc2mp6 z+71io9JWrVQGmw7OeZeE4TvkF9GhwS8jrKO4E0crfcT/zT6368PZCO6Wpir8+po/ZfOWbbh 1hi3MxmXn4Fki55Zrvhy3sf28U+H/nByQV4CssYv/xVhIZsN/wNQLcDLgVs4JTBUik8eQR0Y Qrq9lG3ZVtbpEi7ZTJ6BOGIn2TKHsVIVGSQA0PdKpKYV45Lc4QARAQABzSBudXNlbnUgPG51 c2VudS1saXN0c0ByaXNldXAubmV0PsLBfQQTAQgAJwUCWPneBQIbAwUJBaOagAULCQgHAgYV CAkKCwIEFgIDAQIeAQIXgAAKCRCtYTjCRc1Cfq/kD/sHx+mnL6OLwJvBj1rVTyoHJYJARajz Go0yRlbrZSH6Z05OD3SDR9UVpWOZeY8JyFoTyCFQjAbIVjKifj0uSmi0j1iahrAgGGfik0cN XUkCxrW6jcJQ37EbvYWu4PryqLuC7IeQW1wCcB1ioyGYKkm2K6LZ9rzZPVYSmPohJ+gVI0Jt EdlNZl4JuZot9eA5w/22uvcStQHzXDsUxfqK8OAJpU8E3iBBdNpLPMDWpFz4g2yw5PD6jZ+K Q39PYMUFULaKe4YCw1O+0MFhZJI4KEcRYHuVy1b3cJjxzgVfEyFctLDsO1sh07vBhoVKUi8W e00pvGtv8QYxxMYIA3iACbsjGEr69GvvZ2pAnu9vT9OUCaES4riDCxbkMxK/Cbwk8F6mo0eq HDQ7sOZWQv81ncdG9ovlA7Pj96cEXgdtbbllF1aUZ8sAmT14YjGzhArGv7kyJ1imH5tX3OXk hBGA9JTk2mDNjEpFaTEajSvDiKyeEhWNTLm15siWkpg1124yjUkhQ3OCkw7aUDMiVn8+DQHo J2pP/84uUvngbhm1jV7nk8mxTUFgppUePkb5hhnRRzeK72QY00EwRdn7qnpNgijMJ3Fpjfy2 EeCEl3nNdcB7U0F+0ijA6P/+DROldxNr4eiP50RvV8XiW/yi2IkKBk50GNB87yYnDETxxx/c 2i00AM7BTQRY+d4FARAAwJZ6U7UT8uB1WCfLK3AOR1Wa9bzOAghlTR4WXbHB4ajQKG7/Fzud 99bnwD0V3/AOVz/SbGDyHe+7HMvd1A0Ll4NgyH6OpxY7wOwCXAYTAbcXLpM7eKTjjsb9A9XG 3FcIGvjcy76OkaewqhiABaShlStEYcPkRusHZuecXtCnfCjJKihU/kinWpBO9gY6SrF2KFCw aeS4r37brXQ9y8uy3gZ168QFuIa5AKfL0r5YN3k4StNSA2p5Z/pufWXMN3B03QC+3fireiz3 dinlHK6XjUW8oWSdNxJhexT/lUw+episNuWTQruy7PD+HeohYGXqjggmPUiWc171Sewb2f8H CHViHMee8QXqo/LSRkYVrtsx0HUSMKsVQOma/u2By03ucroIkQJQQfqX3YpK1i3EpUO2L0/m E8UpBvUm1vrst54EFym4tYNJTj9reVffFKh2cczmPVN5o8v3RrdTF96mGtcb9EJbGV4277ZE LqUspviEBXynqU3yZ48JhIWHj22/ha6TeBpapYZDOJ8lePed8E34J/GYE2YXl65LhpXAKvWz O3KiByGMysb9Li6zqZ9/BYQtg5CA6Q8Oo7pBxK4iiDH3GX2WvymmLoaOBpOaIYdvKr39fajE mzfbg7TdZKXxqp2KDrbw7vUJLDyrmPWpxHyhKHItzoi1Y59wzYSq3h0AEQEAAcLBZQQYAQgA DwUCWPneBQIbDAUJBaOagAAKCRCtYTjCRc1CfpfgEAC3tXZzhgKbF6fx5gMNDp/9MBpialvu k69UaGL3HUqM0/ytiT4FjYUmOK2mk37iop46GivsOC50PykG9gjbg9/QKUqgsZzJ8LJ+ldY4 /GKtiP5JoO59Obj8MJJ5Ta8yPfZiiNx/I8ydqd18E4PmQUCPlEKhett81t3+8R/mGwG72TaA hHwDjZAEjiXdnXh+z0AKpflCnYQafq0V73ofzuw4KovpJWMk/WPs5oSHhuV4TZ8nRkF6BR4y rEvs1kq8Y6DuNqQGwY3yilpnmqfMzzlWo7MlY657domU54bhGOsvNuZZsFDlcBczQo6h9OKq ckkVHUMAw38pX+EghzEfhYVWYmLNv5G9TA/M2s3frO3aN7ukNDq7CKIwfVz71/VfPaLQMY7/ jirzp9yIBZEi4E+PwP38FAGiD+nxzuUJv1rvxf6koqUGoHRvdppju2JLrC2nKW0La7RX7uZJ esCVkamT/XaXPROBTrZZqwbIXh2uSMzgXkC2mE1dsBf2rdsJ4y73+0DYq7YE52OV9MNoCYLH vpkapmD00svsP4sskRsrquPHkBBVCJa22lTaS8Oow9hGQe7BDjEhsVoPol889F0mbTRb3klv mGQ6/B/HA0pGWR9wISY8a7D40/qz6eE6+Yg22mtN1T8FFlNbyVmtBj0R/2HfJYhGBElLPefH jhF0TA==
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Mon, 12 Aug 2019 16:28:59 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak; t=1565641725; bh=s4Oeedqpq98vffA4cHDMYiTnfEb8RTzoLaHM4Fno7nk=; h=To:References:From:Subject:Date:In-Reply-To:From; b=GKtw8Atn3C4HJFjD9dt1CEG4b36SIJ/ivsAbEvIFLClZ5s8xzWZ0h65LxI1Co51e/ ULkwn7zovH6dm7zEN+TO7GkctHalNRsFYgxapLmCiq7Dvzn+rEEN2MuhhFD+F1JXBg MUrxi67HZA2+vJniIXTFr5GRcGgDPKpwtXf931ns=
- In-reply-to: <MWHPR19MB01602B374DF0C739E78C0D68C5D30@MWHPR19MB0160.namprd19.prod.outlook.com>
- List-archive: <http://lists.torproject.org/pipermail/tor-relays/>
- List-help: <mailto:tor-relays-request@lists.torproject.org?subject=help>
- List-id: "support and questions about running Tor relays \(exit, non-exit, bridge\)" <tor-relays.lists.torproject.org>
- List-post: <mailto:tor-relays@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>, <mailto:tor-relays-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-relays>, <mailto:tor-relays-request@lists.torproject.org?subject=unsubscribe>
- Openpgp: preference=signencrypt
- References: <BN8PR19MB275621999383793C67E71923C5560@BN8PR19MB2756.namprd19.prod.outlook.com> <4a09597e-6004-2904-3778-4fca260086d8@riseup.net> <CACiAZpgXcAwiCZq7y099YHSxc66fm_xYBWakUfwXpetUqcU8og@mail.gmail.com> <CAD2Ti29nACAi43b6esmMM-HdRyGBsw_=_QXWt-HyvUr34rg97g@mail.gmail.com> <MWHPR19MB01602B374DF0C739E78C0D68C5D30@MWHPR19MB0160.namprd19.prod.outlook.com>
- Reply-to: tor-relays@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-relays" <tor-relays-bounces@xxxxxxxxxxxxxxxxxxxx>
> When we originally deployed many new relays using Ansible-Relayor, we
> used a second IP per process. However, due to routing troubleshooting
> and relays not showing up on Relay Search, we removed the second IPs.
was this an onionoo issue or did they not show up in the tor consensus either?
Making use of OutboundBindAddressExit should not actually affect the reachability/visiblity on
Relay Search.
> We are still using only one per relay. We also found it challenging
> to manage this many relay IPs with Ansible-Relayor. Ansible-Relayor
> uses sequential IPs based on the listing from ifconfig.
yes, that is the default behavior. You can also set it manually (which ) using the vars:
tor_v4ips
tor_available_public_ipv4s
These role variables are not actually documented in the README because I aimed for automation
(no need to set them manually out of the box), but yes, there might be rare cases where you
want to set them manually.
> This presents
> a challenge because it is difficult to setup forward and reverse DNS
> in a predictable way.
Ideally you would automate that if your DNS provider has an API since the
behavior should be deterministic.
One other IP usage strategy that I had in mind to make increasing and decreasing
the instance count less painful for DNS changes is the following:
current behavior when 4 IPs are available and tor_dedicatedExitIP is used:
.1 OR IP#1
.2 OR IP#2
.3 exit IP #1
.4 exit IP #2
potentially new strategy:
.1 OR IP #1
.2 exit IP #1
.3 OR IP #2
.4 exit IP #2
but that would actually be counterproductive is you want to use two distinct /24 prefixes for in and outbound
IPs (but still possible via manually setting above vars).
> The second issue we have with running a secondary IP per Tor process
> is system load. Having more IPs opens more sockets,
I'm not sure I understood you there. Running multiple instances increases
the amount of sockets but using OutboundBindAddressExit should not actually
increase the amount of TCP connections/sockets used (when compared to not using that tor feature)
since exit connections are always new TCP connections, no matter whether it uses the same or
a distinct IP address for the exit connection.
Maybe you can elaborate?
If you worry about load/sockets you could decrease the amount of tor instances
since you can probably do your current exit probability with a lot less instances.
> The third
> issue is that when people block our IPs, they block the scope.
Some will, but most automated blocking mechanisms probably just block the source
IP they observed or the IP address as seen in the tor consensus.
Maybe it is even enough to have just distinct (smaller) inetnum objects
instead of distinct /24 prefixes.
> Should
> we use a secondary IP per relay if the IP is in the same scope?
I do believe it is still valuable to use OutboundBindAddressExit even
if they reside in the same /24 prefix.
That said, that feature is aimed at operators that have the IPs available, you probably should
not use it if you are short on IP addresses.
> If we were to use a second /24 for relays, how will
> Ansible-Relayor know to use a second IP scope for exiting?
by using the vars mentioned above.
to illustrate that:
In combination with tor_dedicatedExitIP
ansible-relayor would make use of 198.51.100.x for exiting
while using 192.0.2.x for OR ports this way:
tor_v4ips:
- 192.0.2.1
- 192.0.2.2
tor_available_public_ipv4s:
- 192.0.2.1
- 192.0.2.2
- 198.51.100.1
- 198.51.100.2
> Tor Project, please
> increase your #IPv6 awareness/outreach similar to how ARIN and the
> other RIRs try very hard to do.
+1
--
https://twitter.com/nusenu_
https://mastodon.social/@nusenu
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays