Relays try very hard to have at most one connection to each other relay. (And only two relays are allowed in the consensus per IPv4 address.) Clients try to make one connection to one or two guards. So it's far more likely to be a collection of Tor clients in a network with only a few public IPv4 addresses. (There are entire countries and large networks that only have a few allocated IPv4 addresses.) Or, it might be a bug in Tor, a misconfiguration, or a denial of service attack. We'd like to know more, so we can find out and fix it.
Outbound addresses aren't secret, because they are used for connections. Anyone is free to volunteer to create and maintain a list of outbound relay addresses. It is technically feasible: it requires a few thousand Tor connections per day, one via each relay, to a relay that reports the remote address of each inbound relay connection. It just needs to be done safely, in a way that doesn't collect client addresses, and avoids attaching a timestamp or order to relay connections.
If someone created a list, and showed that it had value to other relay operators, then it might gain support, and be supported by Tor, just like other features have: There is an exit_addresses field for relays in Onionoo and Relay Search that gives the outbound exit addresses of every exit (when they differ from the relay address). It gathers addresses using exitmap. (Rather than relays self-reporting, which is unreliable.) There is also a torrc option that has the side effect of making every address on the machine public, even unused addresses, because it blocks them in the exit policy. (ExitPolicyRejectLocalInterfaces, off by default.) Here's how someone could work on this feature: Create a scanner, publish a list, and show that it has value. Or start with a proposal, ask for advice, then create the scanner. Try for something independent of Tor, like exitmap, because it will be more accurate. (Tor doesn't always know what its outbound address is.) And try to have list downloads rely on existing Tor features, like onion services. They'll be faster to deploy that way. Here's a description of the proposal process:
I sketched a proposal like this in another thread just a few days ago. I'm happy to work with others to include inbound or outbound connection limits in the draft proposal. (My initial proposal had outbound circuit and stream limits.)
If you set the connection limit at or above 512 connections per /24, it will be impossible for well-behaved consensus relays to go above the limit: 2 relays per IPv4 * 256 IPv4 addresses per /24 = 512 connections Or you could check how many relays are in the most popular /24, and use that to work out a limit. (Snip)
Tor source is distributed with an asciidoc man page. It might not be on your system because the packager left it out, or left out asciidoc as a build dependency.
It was removed in 0.2.7 along with the authority option VoteOnHidServDirectoriesV2. There's not much information on the ticket: In general, we try to remove options that very few people use, because it reduces the cost of testing and maintaining Tor.
T |
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays