Posts by nusenu@mastodon.social
(DIR) Post #9tevPu7aePtOdSyf7g by nusenu@mastodon.social
2019-07-11T22:35:00Z
0 likes, 1 repeats
Over a year ago I looked into who controls Tor's DNS traffic, this is how things changed since then:https://medium.com/@nusenu/what-fraction-of-tors-dns-traffic-goes-to-google-and-cloudflare-492229ccfd42
(DIR) Post #9zWULZhJ3Mbb5CPYYa by nusenu@mastodon.social
2020-08-09T04:20:16Z
0 likes, 1 repeats
a story about a huge malicious tor exit operation:Blog: "How Malicious Tor Relays are Exploiting Users in 2020 (Part I)>23% of the Tor network’s exit capacity has been attacking Tor users"https://medium.com/@nusenu/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac
(DIR) Post #A6ulabkjdOybZTNwfo by nusenu@mastodon.social
2021-04-19T22:15:06Z
0 likes, 1 repeats
Want to help unmasking malicious tor relays that perform impersonation attacks?use a non-spoofable contactinfo on your tor relay: 1) add the protected fields to your torrc ContactInfo:"url:<your domain> proof:uri-rsa ciissversion:2"2) publish your set of relay fingerprints under https:// your domain/.well-known/tor-relay/rsa-fingerprint.txtDon't have a domain? use github pages or similar instead.Thanks to over 320 tor relays for using non-spoofable contactInfos already.
(DIR) Post #A6uladJroGfmQipW4W by nusenu@mastodon.social
2021-04-19T22:16:45Z
0 likes, 0 repeats
website to generate contactInfo string:https://torcontactinfogenerator.netlify.appspec:https://nusenu.github.io/ContactInfo-Information-Sharing-Specification/
(DIR) Post #A6w0lCEeXba85OqVoe by nusenu@mastodon.social
2021-05-04T17:25:48Z
0 likes, 0 repeats
The Tor network has seen over 1000 new exit relays at OVH. Not that kind of relays that you want to use.https://lists.torproject.org/pipermail/tor-relays/2021-May/019644.html
(DIR) Post #A75AZ8EgKiTWAfNung by nusenu@mastodon.social
2021-05-09T19:19:23Z
0 likes, 0 repeats
@octalish here is a blog post about it:https://nusenu.medium.com/
(DIR) Post #A75AbxENhnDUuPae80 by nusenu@mastodon.social
2021-05-09T19:19:55Z
0 likes, 0 repeats
@octalish here is a blog post about it:https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-relay-activities-part-ii-85c80875c5df
(DIR) Post #AC08aILcsGsjFVR4lM by nusenu@mastodon.social
2021-10-03T16:21:17Z
0 likes, 1 repeats
I wrote down a spec for a simple web of trust for relay operator IDs:the spec makes use of DNSSEC-signed TXT records and simple text files served via HTTPS to publish trusted relay operator IDshttps://gitlab.torproject.org/nusenu/torspec/-/blob/simple-wot-for-relay-operator-ids/proposals/ideas/xxx-simple-relay-operator-wot.md#a-simple-web-of-trust-for-tor-relay-operator-ids
(DIR) Post #AEQAAn0yIbrra6mF2e by nusenu@mastodon.social
2021-12-11T22:12:02Z
0 likes, 1 repeats
The largest tor exit relay operator on the network - a long term contributor - joined the effort towards a more trustworthy tor network and has linked his relays to his domain using the CIISS v2 specification.Over >65% of the network's exit capacity can now be attributed to proven operator domains.This leaves us with a single (obscure) top 10 exit operator that has not implemented the proof.
(DIR) Post #AETbJKpZjffB0ucquG by nusenu@mastodon.social
2021-12-16T23:06:45Z
0 likes, 1 repeats
some (fake) Windows tor relays pretending to have done >2Gbit/s on their first day 😉https://nusenu.github.io/OrNetStats/w/
(DIR) Post #AEV70oB3nEf4DfqQNs by nusenu@mastodon.social
2021-12-17T15:03:08Z
0 likes, 0 repeats
I wonder when the first tor relay with a log4j payload in it's ContactInfo shows up.
(DIR) Post #AEqTb4O8f5fhAvtfdI by nusenu@mastodon.social
2021-12-27T18:59:11Z
0 likes, 1 repeats
Upcoming #rC3 Presentation:Towards a more Trustworthy Tor Networkwhen: 2021-12-28, 17:00 CETwhere: Chaosstudio Hamburg https://streaming.media.ccc.de/rc3/cshprimary target audience: - Tor users- Tor relay operators- onion service operators- and everyone that cares about Tor#rc3csh
(DIR) Post #AFGdhEofqQaGoJ4G3s by nusenu@mastodon.social
2022-01-09T14:54:34Z
0 likes, 1 repeats
You can find the recording of my rC3 talk "Towards a more Trustworthy Tor Network" in English and German (interpreted) and subtitles at https://media.ccc.de/v/rc3-2021-chaosstudiohamburg-475-towards-a-more-trustworthy-tor-network
(DIR) Post #AFVg5dGLmX8kOr0GjA by nusenu@mastodon.social
2022-01-16T21:01:51Z
1 likes, 2 repeats
Someone triggered a Tor Sybil attack detection today, but thanks to their properly configured Authenticated Relay Operator ID we know it is CCC Stuttgart setting up their 48 shiny new tor exit instances - and NOT someone impersonating them 👍 Congratulations @cccs and thanks for using a state of the art secure OfflineMasterKey setup to protect your relay keys!
(DIR) Post #AFWXbIkGtaRZbTz7UO by nusenu@mastodon.social
2022-01-16T23:34:18Z
0 likes, 1 repeats
If you are operating tor relays using ansible-relayor you should monitor your relay's key expiry to avoid outages due to expired keys.Here is a tor MetricsPort feature request I just submitted for you, so it should be easier to monitor key expiry in the future:https://gitlab.torproject.org/tpo/core/tor/-/issues/40546Reminder: when you forget to renew the online keys, tor will shutdown eventually.And an older related MetricsPort feature request:https://gitlab.torproject.org/tpo/core/tor/-/issues/40194
(DIR) Post #AFXbXaLc6QXE0ptX4C by nusenu@mastodon.social
2022-01-17T19:30:08Z
0 likes, 0 repeats
@selea @rince @cccs if you also want to run a tor relay without exposing your master keys to your relay (aka OfflineMasterKeys), I recommend automation, even if you only run a single relayansible-relayor can help you with automation
(DIR) Post #AFbwSi1F1otO1iinZ2 by nusenu@mastodon.social
2022-01-19T21:43:20Z
0 likes, 0 repeats
@selea are these yours?https://metrics.torproject.org/rs.html#search/contact:selea
(DIR) Post #AFc1qoY4u13SzzOVZQ by nusenu@mastodon.social
2022-01-19T22:43:45Z
0 likes, 0 repeats
@selea SunOS, a rare species :)if you also also want to setup the Authenticated Relay Operator ID we previously mention you can:(1) add this to your torrc ContactInfo:url:linux.pizza proof:uri-rsa ciissversion:2 and (2) publish your relay fingerprints at:https://linux.pizza/.well-known/tor-relay/rsa-fingerprint.txt
(DIR) Post #AFdsye1fOoDZPNoSps by nusenu@mastodon.social
2022-01-20T20:13:47Z
0 likes, 0 repeats
@selea tor does not know anything about this spec.That is why you should also set MyFamily correctly.
(DIR) Post #B31HXgThhVbR91Ikm8 by nusenu@mastodon.social
2026-02-05T18:35:45Z
0 likes, 1 repeats
Large ongoing tor network Sybil attack with over 8400 relays started 2026-02-04 04:49.Currently over 900 relays are still on the tor network.https://metrics.torproject.org/rs.html#search/contact:printerexpert@mail2tor.com%20running:true%20https://nusenu.github.io/OrNetStats/w/contact/32cb0861adc94fe7853fb21328e94596.htmlhttps://nusenu.github.io/OrNetStats/w/contact/7bc6e288b32929b0bce0857f5e80481f.html