Dear Tor-Relays Mailing List Members,
I hope this email finds you well. I'm reaching out to share some observations and pose some questions regarding the management of relay node updates, particularly concerning their impact on stability and security of the service provided.
Recently, I've noticed an interesting pattern with my relay node (ID: 47B72187844C00AA5D524415E52E3BE81E63056B [1]). I've followed TorProject's recommendations [2] and configured automatic updates, which has led to frequent restarts of the node to keep the Tor software up-to-date. While this practice ensures high security by keeping the software updated, it seems to compromise the stability of the node itself. The Uptime value of my node has remained at a maximum of a few hours.
This situation has prompted me to reflect on what might be the best strategy to adopt. On one hand, frequent updates ensure optimal security, while on the other hand, continuous restarts may affect the user experience for those relying on the node's stability for their Tor activities.
As such, I'd like to pose some questions to the community to gather feedback and assess best practices:
1. In your opinion, is it preferable to maintain automatic updates to ensure maximum security, even if frequent restarts may compromise the node's stability?
2. Or would it be more sensible to adjust the update frequency, perhaps performing them once or twice a week, to ensure greater stability of the node without excessively compromising security?
3. Have you had similar experiences with your relay nodes? How have you addressed this challenge and what were the outcomes?
Thank you in advance for your time and cooperation.
Best regards,
Aleff.
[1] https://metrics.torproject.org/rs.html#details/47B72187844C00AA5D524415E52E…
[2] https://community.torproject.org/relay/setup/guard/debian-ubuntu/updates/
---
Browse my WebSite: aleff-gitlab.gitlab.io
Use my PGP Public Key: pgp.mit.edu/pks/lookup?op=get&search=0x7CFCE404A2168C85
Join to support:
- Free Software Foundation! (my.fsf.org/join?referrer=6202114)
- Electronic Frontier Foundation! (eff.org)
- Tor-Project (torproject.org)
- Signal (signal.org)
Hi,
lacking competence or support to build bridges under DEBIAN 12, I tried
FEDORA and this feeeeeels cool.
Yep yet this worry some message :
Errors during downloading metadata for repository 'tor':
- Status code: 404 for
https://rpm.torproject.org/fedora/repodata/repomd.xml (IP:
2620:7:6002:0:466:39ff:fe7f:1826)
Error: Failed to download metadata for repo 'tor': Cannot download
repomd.xml: Cannot download repodata/repomd.xml: All mirrors were tried
here is my bash script before the error that I find absolutely fine...
kindly prove me wrong, please.
Carlos.
(would PGP encryption make sense when sending these types of emails to
tor-relays(a)lists.torproject.org ? can't see the mailing list PGP
publicly)
dnf update
dnf install dnf-automatic -y
systemctl enable --now dnf-automatic-install.timer
echo "[tor]" > /etc/yum.repos.d/Tor.repo
echo "name=Tor for Fedora $releasever - $basearch" >>
/etc/yum.repos.d/Tor.repo
echo "baseurl=https://rpm.torproject.org/fedora/$releasever/$basearch"
>> /etc/yum.repos.d/Tor.repo
echo "enabled=1" >> /etc/yum.repos.d/Tor.repo
echo "gpgcheck=1" >> /etc/yum.repos.d/Tor.repo
echo "gpgkey=https://rpm.torproject.org/fedora/public_gpg.key" >>
/etc/yum.repos.d/Tor.repo
echo "cost=100" >> /etc/yum.repos.d/Tor.repo
dnf install tor -y
dnf install obfs4 -y
--
PGP updated every second week : please actualize our communication every time.
Hi all,
our node sacco.osservatorionessuno.org[1] has been marked down for more
than a couple of days. It is at the latest version from Tor's Debian
repository and I tried to restart both the service and the server. The
process is running, and the 9001 and 9030 ports are open and succesfully
reachable from the outside. The notice log I temporarily enabled to look
for the issue apparently does not show any warning signs.
Here is an anonymized output of the log:
[notice] Tor 0.4.8.10 opening new log file.
[notice] We compiled with OpenSSL XXX and we are running with OpenSSL
XXX. These two versions should be binary compatible.
[notice] Tor 0.4.8.10 running on Linux with Libevent XXX, OpenSSL XXX,
Zlib XXX, Liblzma XXX, Libzstd XXX and Glibc XXX as libc.
[notice] Tor can't help you if you use it wrong! Learn how to be safe at
https://support.torproject.org/faq/staying-anonymous/
[notice] Read configuration file "/etc/tor/torrc".
[notice] Based on detected system memory, MaxMemInQueues is set to 720
MB. You can override this by setting MaxMemInQueues by hand.
[notice] Opening Socks listener on 127.0.0.1:9050
[notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
[notice] Opening OR listener on XXX:9001
[notice] Opened OR listener connection (ready) on XXX:9001
[notice] Opening OR listener on [XXX]:9001
[notice] Opened OR listener connection (ready) on [XXX]:9001
[notice] Opening Directory listener on XXX:9030
[notice] Opened Directory listener connection (ready) on XXX:9030
[notice] Opening Directory listener on [XXX]:9030
[notice] Opened Directory listener connection (ready) on [XXX]:9030
[notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
[notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
[notice] Configured to measure statistics. Look for the *-stats files
that will first be written to the data directory in 24 hours from now.
[notice] Your Tor server's identity key fingerprint is 'sacco XXX'
[notice] Your Tor server's identity key ed25519 fingerprint is 'sacco XXX'
[notice] Bootstrapped 0% (starting): Starting
[notice] Starting with guard context "default"
[notice] Bootstrapped 5% (conn): Connecting to a relay
[notice] Unable to find IPv4 address for ORPort 9001. You might want to
specify IPv6Only to it or set an explicit address or set Address.
[notice] Bootstrapped 10% (conn_done): Connected to a relay
[notice] Bootstrapped 14% (handshake): Handshaking with a relay
[notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
[notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info
to build circuits
[notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a
relay to build circuits
[notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
[notice] External address seen and suggested by a directory authority: XXX
[notice] Bootstrapped 100% (done): Done
[notice] Now checking whether IPv4 ORPort XXX:9001 is reachable... (this
may take up to 20 minutes -- look for log messages indicating success)
[notice] Now checking whether IPv6 ORPort [XXX]:9001 is reachable...
(this may take up to 20 minutes -- look for log messages indicating success)
[notice] Self-testing indicates your ORPort XXX:9001 is reachable from
the outside. Excellent.
[notice] Performing bandwidth self-test...done.
[notice] Self-testing indicates your ORPort [XXX]:9001 is reachable from
the outside. Excellent. Publishing server descriptor.
[notice] Heartbeat: It seems like we are not in the cached consensus.
[notice] Heartbeat: Tor's uptime is XX hours, with XX circuits open.
I've sent XX and received XX. I've received XXX connections on IPv4 and
XXX on IPv6. I've made XXX connections with IPv4 and XXX with IPv6.
[notice] While bootstrapping, fetched this many bytes: XXX
(microdescriptor fetch)
[notice] While not bootstrapping, fetched this many bytes: XXX (server
descriptor fetch); XXX (server descriptor upload); XXX (consensus
network-status fetch); XXX (microdescriptor fetch)
[notice] Circuit handshake stats since last time: X/X TAP, X/X NTor.
[notice] Since startup we initiated XXX and received XXX v1 connections;
initiated 0 and received 0 v2 connections; initiated XXX and received
XXX v3 connections; initiated XXX and received XXX v4 connections;
initiated XXX and received XXX v5 connections.
[notice] Heartbeat: DoS mitigation since startup: 0 circuits killed with
too many cells, 0 circuits rejected, 0 marked addresses, 0 marked
addresses for max queue, 0 same address concurrent connections rejected,
0 connections rejected, 0 single hop clients refused, 0 INTRODUCE2 rejected.
[notice] Your network connection speed appears to have changed.
Resetting timeout to XXXms after XXX timeouts and XXX buildtimes.
We would appreciate any hint on how to proceed to debug the issue in
order to keep the server useful.
Thank you
Giuio
[1] -
https://metrics.torproject.org/rs.html#details/6E02FDEA15122A492A799A58C4C1…
You should tweak your web server as presented in this section:
https://github.com/Enkidu-6/tor-ddos?tab=readme-ov-file#first-step-prep
aring-your-system-for-high-number-of-connections
This would most likely solve Out-Of-Memory problems I suspect you are
experiencing.
Denny
On 04/02/2024 10:06 AM Alessandro Greco via tor-relays wrote ..
My computer has:
- 1 vCore CPU
- 1 GB RAM
- Maximum bandwidth: 1 GB/s
So if I understand correctly, the problem should not be at the hardware
level, right?
Il mar, apr 2, 2024 alle 12:14, Frank Lý via tor-relays
<[1]tor-relays(a)lists.torproject.org> ha scritto:
Hello Aleff,
That is up to you. I strongly suspect that the hardware is the
bottleneck, but detailed specifications are required in order to
determine a conclusion. Tor is currently bounded by single-thread
CPU performance, with a minimum recommendation of 1 GB of RAM for
non-exit relays faster than 40 Mbit/s. If your hardware does not
meet these RAM requirements, upgrade it, then adjust the relay
bandwidth rate limit as necessary.
Frank
Mar 27, 2024, 7:00 AM by tor-relays(a)lists.torproject.org:
> I want to thank you for all the support replies you sent in
response to my previous communication. I have carefully read through
all your insights and appreciate your efforts in trying to find a
solution to the issue.
>
> After thorough consideration of the matter, I have concluded that
the problem may not be due to configuration errors in the automatic
updates, as initially speculated. Rather, it seems that the issue
could be hardware-related, with my VPS computer potentially unable
to handle a certain amount of traffic.
>
> It's worth noting that there are no bandwidth issues, and the
connection speed is high. However, I have set a RelayBandwidthRate
limit of 250 Mbits. Interestingly, despite this configuration, the
Tor Metrics site detects a speed of approximately 10/13 MBytes,
equivalent to about 90/110 Mbits. This led me to speculate that the
machine might experience an overload of operations or connections,
causing it to crash temporarily. As a result, at the time of
restart, Tor Statistics records the maximum speed reached up to that
point (without ever reaching the set limit). Subsequently, following
this theory, the Tor service restarts automatically without causing
any anomalies in the service.
>
> To address this situation, I have decided to reduce the
RelayBandwidthRate limit from 250 Mbits to 100 Mbits, which falls
within the minimum limits proposed by torproject. If this is the
case, however, it is also true that it would be best to impose an
upper limit of 80% when considering the bandwidth magnitude
involving the crash event as the maximum point. I honestly don't
know how I would be able to verify this and acquire this kind of
data, probably doing trial and error is the way. Perhaps the ideal
would be to lower the maximum bandwidth further to verify for sure
that this is what it is?
>
> Currently, I am closely monitoring the situation to assess whether
this modification has a positive impact on the issue.
>
> I will keep you updated on any progress, and I thank you once
again for your support and understanding.
>
> Best regards,
>
> Aleff.
>
> ---
>
> Browse my WebSite: aleff-gitlab.gitlab.io
> Use my PGP Public Key:
pgp.mit.edu/pks/lookup?op=get&search=0x7CFCE404A2168C85
> Join to support:
> - Free Software Foundation! (my.fsf.org/join?referrer=6202114)
> - Electronic Frontier Foundation! (eff.org)
> - Tor-Project (torproject.org)
> - Signal (signal.org)
>
> martedì 26 marzo 2024 11:21, torrelay.9puwh--- via tor-relays ha
scritto:
>
>> Hi Alessandro,
>>
>> It's good to hear from you. I have a relay in a somewhat similar
situation[1], although I've only just clocked it. If you're using
Debian or one of its derivatives, then you can configure the
unattended-upgrades package to perform a restart at a specific time
if required. This means that your relay won't restart every time an
upgrade is required, but will keep itself up to date. I think
configuring a time for a daily restart (if upgrade required) would
be a fairly good balance between stability and reliability.
>>
>> See what other people say or from your own experience, as Tor
circuits are generally quite resilient and as long as you aren't a
guard node I believe connections won't die because your relay is
restarting.
>>
>> I would also note that Tor recommends [2] an uptime or 24/7 is
nice, but not required and that restarts to the daemon or node are
fine. Because of this, it might not be worth worrying too much about
this issue.
>>
>> I hope you find some of this useful,
>> Seth
>>
>>
>>
>> [1]
https://metrics.torproject.org/rs.html#details/5FEB80D4DCC63180CB4D8
7C1222177BB099E55AE
>> [2] https://community.torproject.org/relay/relays-requirements/
>> -------- Original Message --------
>> On 26/03/2024 08:54, Alessandro Greco via tor-relays
tor-relays(a)lists.torproject.org wrote:
>>
>> > Dear Tor-Relays Mailing List Members,
>> >
>>
>> > I hope this email finds you well. I'm reaching out to share
some observations and pose some questions regarding the management
of relay node updates, particularly concerning their impact on
stability and security of the service provided.
>> >
>>
>> > Recently, I've noticed an interesting pattern with my relay
node (ID: 47B72187844C00AA5D524415E52E3BE81E63056B [1]). I've
followed TorProject's recommendations [2] and configured automatic
updates, which has led to frequent restarts of the node to keep the
Tor software up-to-date. While this practice ensures high security
by keeping the software updated, it seems to compromise the
stability of the node itself. The Uptime value of my node has
remained at a maximum of a few hours.
>> >
>>
>> > This situation has prompted me to reflect on what might be the
best strategy to adopt. On one hand, frequent updates ensure optimal
security, while on the other hand, continuous restarts may affect
the user experience for those relying on the node's stability for
their Tor activities.
>> >
>>
>> > As such, I'd like to pose some questions to the community to
gather feedback and assess best practices:
>> >
>>
>> > 1. In your opinion, is it preferable to maintain automatic
updates to ensure maximum security, even if frequent restarts may
compromise the node's stability?
>> > 2. Or would it be more sensible to adjust the update frequency,
perhaps performing them once or twice a week, to ensure greater
stability of the node without excessively compromising security?
>> > 3. Have you had similar experiences with your relay nodes? How
have you addressed this challenge and what were the outcomes?
>> >
>>
>> > Thank you in advance for your time and cooperation.
>> >
>>
>> > Best regards,
>> > Aleff.
>> >
>>
>> > [1]
https://metrics.torproject.org/rs.html#details/47B72187844C00AA5D524
415E52E3BE81E63056B
>> > [2]
https://community.torproject.org/relay/setup/guard/debian-ubuntu/upd
ates/
>> >
>>
>> > ---
>> >
>>
>> > Browse my WebSite: aleff-gitlab.gitlab.io
>> > Use my PGP Public Key:
pgp.mit.edu/pks/lookup?op=get&search=0x7CFCE404A2168C85
>> > Join to support:
>> > - Free Software Foundation! (my.fsf.org/join?referrer=6202114)
>> > - Electronic Frontier Foundation! (eff.org)
>> > - Tor-Project (torproject.org)
>> > - Signal
(signal.org)_______________________________________________
>> > tor-relays mailing list
>> > tor-relays(a)lists.torproject.org
>> >
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>>
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays(a)lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
_______________________________________________
tor-relays mailing list
tor-relays(a)lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
1. file:///tmp/.webmin/reply_mail.cgi?new=1&to=Il
Greetings,
I do not normally use mailing lists such as this one to inform subscribers of security notices, but this issue is extreme enough where it may benefit the anonymity of Tor users if relay operators are aware of it sooner.
The near-universally used 'xz' compression library has been found to contain a backdoor in certain code branches. This backdoor has made it into some systems such as Debian Sid.
Details regarding this backdoor are available here.
https://www.openwall.com/lists/oss-security/2024/03/29/4
It is suspected that if your OpenSSH server links to the xz library, which Debian appears to do so, then this backdoor is remotely exploitable. If your OpenSSH server does not link to this library, then your system still contains many processes that run xz actions as the root user, some input of which may be less than trusted.
For those needing a patch, I recommend you research your distribution's security advisory page for further information.
References:
Debian Sid Advisory: https://security-tracker.debian.org/tracker/CVE-2024-3094