Hi,
I have started to make changes to the Torservers.net website to reflect that we have grown from "professional Tor Exit hosting" to a state where growth of a single organization is not useful any more. We have refrained from ramping up more exit capacity for quite some time because of that.
With the help of TorProject Inc., and by being an example for others to follow, we can now refer to multiple organizations, and become an "umbrella organization" that distributes funds across these organizations.
Legally, we might be able to offer "abuse handling services" for exit operators. I will discuss this with our lawyer, and keep you updated.
With the German charitable Wau Holland Foundation, we have found a first great partner for the "new" Torservers.net. Instead of donating directly to us, you can now donate to the project account at Wau Holland Foundation. Hopefully, we can find even more partners in the future.
All partner organizations have been chosen carefully. We will iron out details on how we distribute funds so we get a more diverse Tor network. Please, talk to us if you want to set up a similar organization.
https://www.torservers.net/partners.html https://www.torservers.net/donate.html
The next step is to also professionalize bridges hosting. It is quite a shame that we only have a few hundred bridges in total. The situation got worse now that regular bridges are blocked in several countries, and in China only obfs3 bridges work -- of which we only have a few. We are actively on the lookout for sponsors interested in funding bridges.
This is excellent news! Thanks for your contribution so far!
"abuse handling services" sounds like a great idea to me, I currently run a relay rather than an exit, but if there was more assistance with abuse handling, Id seriously consider becoming an exit.
Thanks again,
Matthew
On Wed, Apr 3, 2013 at 8:47 AM, Moritz Bartl moritz@torservers.net wrote:
Hi,
I have started to make changes to the Torservers.net website to reflect that we have grown from "professional Tor Exit hosting" to a state where growth of a single organization is not useful any more. We have refrained from ramping up more exit capacity for quite some time because of that.
With the help of TorProject Inc., and by being an example for others to follow, we can now refer to multiple organizations, and become an "umbrella organization" that distributes funds across these organizations.
Legally, we might be able to offer "abuse handling services" for exit operators. I will discuss this with our lawyer, and keep you updated.
With the German charitable Wau Holland Foundation, we have found a first great partner for the "new" Torservers.net. Instead of donating directly to us, you can now donate to the project account at Wau Holland Foundation. Hopefully, we can find even more partners in the future.
All partner organizations have been chosen carefully. We will iron out details on how we distribute funds so we get a more diverse Tor network. Please, talk to us if you want to set up a similar organization.
https://www.torservers.net/partners.html https://www.torservers.net/donate.html
The next step is to also professionalize bridges hosting. It is quite a shame that we only have a few hundred bridges in total. The situation got worse now that regular bridges are blocked in several countries, and in China only obfs3 bridges work -- of which we only have a few. We are actively on the lookout for sponsors interested in funding bridges.
-- Moritz Bartl https://www.torservers.net/ _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Moritz,
If you put up a full "start to finish" tutorial (ie sample config file, etc) page on torservers.net for setting up a bridge node and installing/configuring obfsproxy, I'll set up another ~1gbps server to serve as one. No funding needed.
Thanks,
S
On 4/2/2013 9:47 PM, Moritz Bartl wrote:
Hi,
I have started to make changes to the Torservers.net website to reflect that we have grown from "professional Tor Exit hosting" to a state where growth of a single organization is not useful any more. We have refrained from ramping up more exit capacity for quite some time because of that.
With the help of TorProject Inc., and by being an example for others to follow, we can now refer to multiple organizations, and become an "umbrella organization" that distributes funds across these organizations.
Legally, we might be able to offer "abuse handling services" for exit operators. I will discuss this with our lawyer, and keep you updated.
With the German charitable Wau Holland Foundation, we have found a first great partner for the "new" Torservers.net. Instead of donating directly to us, you can now donate to the project account at Wau Holland Foundation. Hopefully, we can find even more partners in the future.
All partner organizations have been chosen carefully. We will iron out details on how we distribute funds so we get a more diverse Tor network. Please, talk to us if you want to set up a similar organization.
https://www.torservers.net/partners.html https://www.torservers.net/donate.html
The next step is to also professionalize bridges hosting. It is quite a shame that we only have a few hundred bridges in total. The situation got worse now that regular bridges are blocked in several countries, and in China only obfs3 bridges work -- of which we only have a few. We are actively on the lookout for sponsors interested in funding bridges.
On 04.04.2013 03:06, survivd wrote:
If you put up a full "start to finish" tutorial (ie sample config file, etc) page on torservers.net for setting up a bridge node and installing/configuring obfsproxy, I'll set up another ~1gbps server to serve as one. No funding needed.
We will definitely have that, similar to the Tor exit setup (which will also receive some overhaul).
On Wed, 03 Apr 2013 09:47:06 +0000, Moritz Bartl wrote: ...
The next step is to also professionalize bridges hosting. It is quite a shame that we only have a few hundred bridges in total. The situation got worse now that regular bridges are blocked in several countries, and in China only obfs3 bridges work -- of which we only have a few.
How much traffic is expected on a obfs3 bridge? (I guess it heavily depends on how and where they are announced, esp. as bundle defauls... I have some dozen GB/month to spare.)
And do obfs3 bridge help that are run on IPs also used for regular relays?
Andreas
Hi,
On 04.04.2013 06:37, Andreas Krey wrote:
How much traffic is expected on a obfs3 bridge? (I guess it heavily depends on how and where they are announced, esp. as bundle defauls... I have some dozen GB/month to spare.)
Usage patterns differ a lot from bridge to bridge, even if they are distributed via the same channel: Some bridges reach heavy users, others reach people who try out Tor for some minutes...
You can configure the bridge (like any other Tor relay) to hibernate as soon as your traffic limit is reached.
And do obfs3 bridge help that are run on IPs also used for regular relays?
I would guess that countries that block Tor block all public Tor relay IPs.
On Thu, Apr 04, 2013 at 06:37:51AM +0200, Andreas Krey wrote:
And do obfs3 bridge help that are run on IPs also used for regular relays?
Right now, it is important to get more obfs3 bridges for China since obfs2 no longer works [0]. In general, it would be better to run bridges and relays on separate IP addresses to defend against censors who simply blacklist all IP addresses listed in the consensus. At least in China, however, it is currently possible to run both on just one IP address since the GFW blocks Tor relays based on IP:port tuples.
Cheers, Philipp
On 05/04/13 12:34, Philipp Winter wrote:
On Thu, Apr 04, 2013 at 06:37:51AM +0200, Andreas Krey wrote:
And do obfs3 bridge help that are run on IPs also used for regular relays?
Right now, it is important to get more obfs3 bridges for China since obfs2 no longer works [0]. In general, it would be better to run bridges and relays on separate IP addresses to defend against censors who simply blacklist all IP addresses listed in the consensus. At least in China, however, it is currently possible to run both on just one IP address since the GFW blocks Tor relays based on IP:port tuples.
Cheers, Philipp
[0] https://trac.torproject.org/projects/tor/ticket/8591 _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I don't really know much about obsfproxy only heard about it a bit on here but if the above is correct perhaps someone could direct me to some useful info on how to go about setting up such, I'd be happy to add the service on my 1Gbps relay at least to trial it out and then if demand is high enough I'll look to acquire another address.
On 05/04/13 12:34, Philipp Winter wrote:
On Thu, Apr 04, 2013 at 06:37:51AM +0200, Andreas Krey wrote:
And do obfs3 bridge help that are run on IPs also used for regular relays?
Right now, it is important to get more obfs3 bridges for China since obfs2 no longer works [0]. In general, it would be better to run bridges and relays on separate IP addresses to defend against censors who simply blacklist all IP addresses listed in the consensus. At least in China, however, it is currently possible to run both on just one IP address since the GFW blocks Tor relays based on IP:port tuples.
I thinking the sticking point is documentation.
From what repository do I get the obfs3 code? How do I build obfs3? How do I specify its use in my Tor config file (i.e. config syntax)?
If obfs3 use is so important, then why is there so little documentation for it on Tor's website?
On 12.04.2013 19:40, Steve Snyder wrote:
I thinking the sticking point is documentation.
From what repository do I get the obfs3 code? How do I build obfs3? How do I specify its use in my Tor config file (i.e. config syntax)?
If obfs3 use is so important, then why is there so little documentation for it on Tor's website?
There will be a time when obfs4 or something else that isn't even defined or on the horizon yet will become important. Especially with Internet censorship, things like that can change quickly. The obfs2 blocking of China only happened recently.
obfs3 needed to be designed, specified, implemented, tested, and is now in the latest obfsproxy release available on Debian testing (and looks like it is now also available from deb.torproject.org, but I'm not certain about that).
Documentation is linked from the main Obfsproxy website, https://www.torproject.org/projects/obfsproxy.html.en ("Installation Instructions"). If you have suggestions on what to improve on the website, in general or about obfsproxy, file a ticket. In the end, this is a community effort!
tor-relays@lists.torproject.org