Hi,
want to help shape the future of the Tor network?
Here is a poll for you:
https://cryptpad.fr/form/#/2/form/view/VE-b3bd-IS1P17Povh0ryIHYhqGqEiA7sJMRE...
It is open until 2023-05-30.
Only operators that did run relays/bridges before 2023-04-01 (and are still running) may participate. An AROI or a relay fingerprint (or hashed bridge fingerprint) is required to participate.
This poll happens in the context of working on a network health proposal.
The goal of this poll is
* to gather input from non-malicious relay operators * to help make pragmatical design decisions for an upcoming network health proposal * to ensure it remains practical to implement for relay operators * to get a feeling on whether it has a chance to see actual real world adoption * to get a feeling on whether relay operators would participate in a web of trust * to get a feeling on what type of rules relay operators would find acceptable
In the light of malicious entities this poll has been send to large relay operators a few days ago so they can claim their submission first.
Their feedback was also used to improve and extend the poll, if you submitted it already once you can submit it again but ensure to submit the same random string at the end as you did the first time so they can be linked.
kind regards, nusenu
Thanks for this initiative.
I am working on adding my AROI but ran into a minor snag.
The torrc man page (which btw i could not find on the torproject website) says the ContactInfo line can only contain an email address, though by example we have known for years it also can have a GPG key fingerprint. Now the guide for setting up AROI says add these things:
|url:example.com proof:uri-rsa ciissversion:2 |
Maybe the whole line is arbitrary text. Anyway is there an updated torrc spec somewhere?
On 2023-05-11 15:57, nusenu wrote:
Hi,
want to help shape the future of the Tor network?
Here is a poll for you:
https://cryptpad.fr/form/#/2/form/view/VE-b3bd-IS1P17Povh0ryIHYhqGqEiA7sJMRE...
It is open until 2023-05-30.
Only operators that did run relays/bridges before 2023-04-01 (and are still running) may participate. An AROI or a relay fingerprint (or hashed bridge fingerprint) is required to participate.
This poll happens in the context of working on a network health proposal.
The goal of this poll is
- to gather input from non-malicious relay operators
- to help make pragmatical design decisions for an upcoming network
health proposal
- to ensure it remains practical to implement for relay operators
- to get a feeling on whether it has a chance to see actual real world
adoption
- to get a feeling on whether relay operators would participate in a
web of trust
- to get a feeling on what type of rules relay operators would find
acceptable
In the light of malicious entities this poll has been send to large relay operators a few days ago so they can claim their submission first.
Their feedback was also used to improve and extend the poll, if you submitted it already once you can submit it again but ensure to submit the same random string at the end as you did the first time so they can be linked.
kind regards, nusenu
Hi,
|url:example.com proof:uri-rsa ciissversion:2 |
Maybe the whole line is arbitrary text. Anyway is there an updated torrc spec somewhere?
Correct, the ContactInfo is basically an arbitrary string. tor's man page does not strictly define the ContactInfo string either.
https://gitlab.torproject.org/tpo/core/tor/-/blob/aef76beccc6b7422613d1fddc0...
kind regards, nusenu
Hi skankhunt42,
I replied to your email, I received on 2023-05-21 on the same day but your DANE configuration appears broken so mail servers implementing DANE will fail to deliver emails to you
https://www.hardenize.com/report/skankhunt42.pw/1685185601#email_dane
Undelivered Mail Returned to Sender:
The mail system
admin@skankhunt42.pw: Server certificate not verified
kind regards, nusenu
tor-relays@lists.torproject.org