Recent comments in /f/Tor

Rambler OP wrote

Thanks!

~$ torsocks curl -s https://check.torproject.org/ | grep Congratulations.
 Congratulations. This browser is configured to use Tor.
 Congratulations. This browser is configured to use Tor.

Still no go in Thunderbird with setting up the proxy. I'll dig into it more, because I think that's the ticket. The TorBirdy plugin is outdated and has been for a while, which is what seems to be used previously. I may boot up in Tails or something similar to see if the issue persists.

1

Rambler wrote

Reply to comment by boobs in Requirement for a exit node? by Jogger

the primary requirement for an exit node that no one tells you about:

balls of steel.

Has anyone ever been arrested or held legally liable for running an exit node (in a modern country, like the US/CA/UK/Etc)?

I've thought about running one as well since my server provider is okay with it as long as I handle the abuse complaints which is basically copy/pasting a cookie cutter response on how it's an exit-node and not possible to tell the origin of whatever it is the complaint is about.

1

Rambler wrote

Per https://community.torproject.org/relay/relays-requirements/

A <40 Mbit/s non-exit relay should have at least 512 MB of RAM available.
A non-exit relay faster than 40 Mbit/s should have at least 1 GB of RAM.
On an exit relay we recommend at least 1.5 GB of RAM per tor instance.

Not sure about the control panel to manage it, but that'd add overhead to the RAM requirement. Hopefully someone will correct me if I'm wrong, but I'm pretty sure it's "set it and forget it". What are you wanting to do with a control panel? See network graphs and stats and stuff? Observium or Librenms will collect pretty much any server related stat that you could ever need. Those will chart and graph things like CPU, RAM, Disk IO, Network Graphs, uptime, etc all over time. From very recent to multiple years if you keep it running long enough.

1

RichardButte wrote

That's basically it, all those request clogs up them internet pipes.

Regular sites often use CDN's (server networks to share the load), and a clearnet solution would have one server sort out illegitimate requests and serve CAPTCHA's while a different server that doesn't see any of the unwanted traffic host the site.

3

MrBlack OP wrote

Oh okay I guess that makes a bit more sense. I always thought a DDOS attack had to have a specific port or webpage as a target. But I don't know how one would be sent through the tor network and I dont even really know how they're sent through the regular internet other than it's just a bunch of requests from different locations.

2

self wrote

From my understanding, the CAPTCHA is a very low intensity operation that barely takes any server load, while logging in ot registration or making purchases or even browsing like a script would do repeatedly to complete a DDoS attack. Having a CAPTCHA effectively prevents scripts from doing these high intensity operations multiple times per second.

For clear web sites this is an awful approach, but since you can’t really block IPs on Tor, it’s the best and most effective tool market owners have.

2

not_bob wrote

Reply to comment by Rambler in A IRC chat room on Tor by piamie

Would it be possible to require a time delay for upvotes and posts for new accounts? Even an hour or two would be enough to make it a pain to do this sort of thing.

2

Rambler wrote (edited )

Just so members know, someone has created dozens of accounts just to upvote this one submission.

Not saying it was /u/piamie but obviously I'd be suspicious and weary of any link that gets upvoted in such a dishonest and manipulative way.

Src: New user log with a bunch of new users using the format: [same-name][random-letters] all with 1 submission vote. Not hard to figure out what they're voting for when this is the highest voted submission on the site and when the amount of created accounts is within a few numbers of a 'normal' submission upvote. (Most things get 2 or 3 upvotes, so if there are 29 new accounts all with the same name, all that have only upvoted 1 submission... It's safe to say it's likely this one. I can't see what people vote for but I can see how many votes people have given out, but nothing specific.)

4

santorihelix wrote

Just be sure to check (and know beforehand) the signing key of your server so the exit node can't MitM. At first connect you'll get something like

The authenticity of host omecha.info (89.234.176.136)' can't be established.
ECDSA key fingerprint is SHA256:v7u4albDUtGH1EXWEwlt0KnzY9GDY5EqodUymKSbiSw
Are you sure you want to continue connecting (yes/no)?

When you say yes the server will be added to ~/.ssh/known_hosts so from then on ssh has you covered; that is, it'll error if the pubkey doesn't match the one saved in your file.

1

MrBlack OP wrote

I tried it on this website and the images download as images but on reddit if you're using tor they're downloading as .webp weird!

https://file.org/extension/webp

The WEBP file format was developed by Google, Inc. This is an image file format that aims to provide users with around 34% smaller file sizes for storing digital graphics and images. Google developed the .webp file format to make photo and image sharing on the Web faster, more efficient and easier for users. The data stored in these WEBP files may include digital graphics, vector images, photos and metadata details. This file format allows users to store digital images and photos in lossy or lossless formats. These .webp files can be opened using Adobe Photoshop, which is an image development and photo editing application. Google Chrome can also be used to open and view the graphics stored in these WEBP files.

2

santorihelix wrote (edited )

3