Good evening,
After many months of running a relay, I'm planning to establish up a family of exit nodes with geographically diverse VPS providers, shying away from the list of the most heavily used Tor friendly providers.
Several questions: - Does establishing a family increase the risk of the nodes being taken down en masse? - Do you suggest providing ample contact information for the node directory, as opposed to little or none? - I'm being very upfront with sales@ regarding my purpose before signing up, and making sure they're okay with it. What questions should I be asking to be sure they'll be Tor friendly before shutting down my exit nodes?
Make your day great, Isaac Grover, Senior I.T. Consultant Aileron I.T. - "Practical & Proactive I.T. Solutions"
O: 715-377-0440, F:715-690-1029, W: www.aileronit.com
Hi Isaac,
After many months of running a relay, I'm planning to establish up a family of exit nodes with geographically diverse VPS providers,
thanks for caring about geo-diversity!
Several questions: - Does establishing a family increase the risk of the nodes being taken down en masse?
I don't think so (if you are not using a single provider).
- Do you suggest providing ample contact information for the node
directory, as opposed to little or none?
Please provide a ContactInfo via your torrc so we can reach you in case of problems with your relays.
- I'm being very upfront with sales@ regarding my purpose before
signing up, and making sure they're okay with it.
That is great.
What questions should I be asking to be sure they'll be Tor friendly before shutting down my exit nodes?
Often you will find out only after they see the actual abuses coming in, but another fine method is to ask for custom WHOIS so the abuse emails go to your email address directly. (you will not get that from VPS hosters)
please update this wiki page with your ISP results/answers: https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs
thanks, nusenu
On 27 May 2017, at 11:10, nusenu nusenu-lists@riseup.net wrote:
What questions should I be asking to be sure they'll be Tor friendly before shutting down my exit nodes?
Often you will find out only after they see the actual abuses coming in, but another fine method is to ask for custom WHOIS so the abuse emails go to your email address directly. (you will not get that from VPS hosters)
One way of getting a custom WHOIS with a VPS hoster is to register a domain, put yourself as the domain contact, and then make the reverse DNS of your VPS IP addresses point to that domain.
This only works if: * the VPS provider lets you set reverse DNS, and * the abuse notice software checks the owner of the domain as well as the IP address (many do).
T
-- Tim Wilson-Brown (teor)
teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org ------------------------------------------------------------------------
On 27/05/2017 03:10, nusenu wrote:
- I'm being very upfront with sales@ regarding my purpose before
signing up, and making sure they're okay with it.
That is great.
I think this is a best practice, see also: https://blog.torproject.org/running-exit-node
What questions should I be asking to be sure they'll be Tor friendly before shutting down my exit nodes?
Often you will find out only after they see the actual abuses coming in, but another fine method is to ask for custom WHOIS so the abuse emails go to your email address directly. (you will not get that from VPS hosters)
please update this wiki page with your ISP results/answers: https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs
Here's my experience: * it's good read all the documents related to the service: in particular, the contract and Terms of Service (ToS). Look out for what they say about abuse handling, for example the contract may say that you have X hours to respond to an abuse complaint and if you are not responsive after that time they may be entitled to shut down your server or close your account. * If the contract/ToS state there that Tor is not allowed, then there is very little you can do. You can run the node (at your own risk), but you will be in breach of the contract and they will likely shut the server down as soon as they notice the node. Furthermore, they may ban you from their service and you may lose the money you put there. * If there are generic provision about "running services for third parties" (which probably there will be), then you should tell them that you want to run a Tor exit node using their service and ask if this is within their contract/ToS. Use the most "official" channel available to you for this request (e.g. opening an issue in their ticketing system, if they provide one), so that they can't ignore you and/or they can't claim that they didn't know about this request after. The information that a provider stated from its support that Tor is allowed, not explicitly banned, or banned is a very useful information to put in the "Good Bad ISPs" page (see link above). * as nusenu said, custom abuse handling is usually offered with bigger and more complex packages of services (e.g. dedicated network/dedicated physical servers) that cost much more than a VPS. You can try, anyway.
I recounted my experience here: https://balist.es/blog/2016/04/18/running-a-tor-exit-node-on-aruba-arubaclou...
Ciao,
C
Hi Isaac,
Am 27.05.2017 um 02:45 schrieb Isaac Grover, Aileron I.T.:
Good evening,
After many months of running a relay, I'm planning to establish up a family of exit nodes with geographically diverse VPS providers, shying away from the list of the most heavily used Tor friendly providers.
Please also consider running a Linux different OS like BSD, if your ISP is capable
Several questions:
- Does establishing a family increase the risk of the nodes being taken down en masse?
No, I haven’t made this experience
- Do you suggest providing ample contact information for the node directory, as opposed to little or none?
Please have a look on the ongoing dialogue about this in here in the list
Regards
Paul
tor-relays@lists.torproject.org