Posts by nusenu@mastodon.social
 (DIR) Post #9tevPu7aePtOdSyf7g by nusenu@mastodon.social
       2019-07-11T22:35:00Z
       
       0 likes, 1 repeats
       
       Over a year ago I looked into who controls Tor's DNS traffic, this is how things changed since then:https://medium.com/@nusenu/what-fraction-of-tors-dns-traffic-goes-to-google-and-cloudflare-492229ccfd42
       
 (DIR) Post #9zWULZhJ3Mbb5CPYYa by nusenu@mastodon.social
       2020-08-09T04:20:16Z
       
       0 likes, 1 repeats
       
       a story about a huge malicious tor exit operation:Blog: "How Malicious Tor Relays are Exploiting Users in 2020 (Part I)>23% of the Tor network’s exit capacity has been attacking Tor users"https://medium.com/@nusenu/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac
       
 (DIR) Post #A6ulabkjdOybZTNwfo by nusenu@mastodon.social
       2021-04-19T22:15:06Z
       
       0 likes, 1 repeats
       
       Want to help unmasking malicious tor relays that perform impersonation attacks?use a non-spoofable contactinfo  on your tor relay: 1) add the protected fields to your torrc ContactInfo:"url:<your domain> proof:uri-rsa ciissversion:2"2) publish your set of relay fingerprints under https:// your domain/.well-known/tor-relay/rsa-fingerprint.txtDon't have a domain? use github pages or similar instead.Thanks to over 320 tor relays for using non-spoofable contactInfos already.
       
 (DIR) Post #A6uladJroGfmQipW4W by nusenu@mastodon.social
       2021-04-19T22:16:45Z
       
       0 likes, 0 repeats
       
       website to generate contactInfo string:https://torcontactinfogenerator.netlify.appspec:https://nusenu.github.io/ContactInfo-Information-Sharing-Specification/
       
 (DIR) Post #A6w0lCEeXba85OqVoe by nusenu@mastodon.social
       2021-05-04T17:25:48Z
       
       0 likes, 0 repeats
       
       The Tor network has seen over 1000 new exit relays at OVH. Not that kind of relays that you want to use.https://lists.torproject.org/pipermail/tor-relays/2021-May/019644.html
       
 (DIR) Post #A75AZ8EgKiTWAfNung by nusenu@mastodon.social
       2021-05-09T19:19:23Z
       
       0 likes, 0 repeats
       
       @octalish here is a blog post about it:https://nusenu.medium.com/
       
 (DIR) Post #A75AbxENhnDUuPae80 by nusenu@mastodon.social
       2021-05-09T19:19:55Z
       
       0 likes, 0 repeats
       
       @octalish here is a blog post about it:https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-relay-activities-part-ii-85c80875c5df
       
 (DIR) Post #AC08aILcsGsjFVR4lM by nusenu@mastodon.social
       2021-10-03T16:21:17Z
       
       0 likes, 1 repeats
       
       I wrote down a spec for a simple web of trust for relay operator IDs:the spec makes use of DNSSEC-signed TXT records and simple text files served via HTTPS to publish trusted relay operator IDshttps://gitlab.torproject.org/nusenu/torspec/-/blob/simple-wot-for-relay-operator-ids/proposals/ideas/xxx-simple-relay-operator-wot.md#a-simple-web-of-trust-for-tor-relay-operator-ids
       
 (DIR) Post #AEQAAn0yIbrra6mF2e by nusenu@mastodon.social
       2021-12-11T22:12:02Z
       
       0 likes, 1 repeats
       
       The largest tor exit relay operator on the network - a long term contributor - joined the effort towards a more trustworthy tor network and has linked his relays to his domain using the CIISS v2 specification.Over >65% of the network's exit capacity can now be attributed to proven operator domains.This leaves us with a single (obscure) top 10 exit operator that has not implemented the proof.
       
 (DIR) Post #AETbJKpZjffB0ucquG by nusenu@mastodon.social
       2021-12-16T23:06:45Z
       
       0 likes, 1 repeats
       
       some (fake) Windows tor relays pretending to have done >2Gbit/s on their first day 😉https://nusenu.github.io/OrNetStats/w/
       
 (DIR) Post #AEV70oB3nEf4DfqQNs by nusenu@mastodon.social
       2021-12-17T15:03:08Z
       
       0 likes, 0 repeats
       
       I wonder when the first tor relay with a log4j payload in it's ContactInfo shows up.
       
 (DIR) Post #AEqTb4O8f5fhAvtfdI by nusenu@mastodon.social
       2021-12-27T18:59:11Z
       
       0 likes, 1 repeats
       
       Upcoming #rC3 Presentation:Towards a more Trustworthy Tor Networkwhen: 2021-12-28, 17:00 CETwhere: Chaosstudio Hamburg https://streaming.media.ccc.de/rc3/cshprimary target audience: - Tor users- Tor relay operators- onion service operators- and everyone that cares about Tor#rc3csh
       
 (DIR) Post #AFGdhEofqQaGoJ4G3s by nusenu@mastodon.social
       2022-01-09T14:54:34Z
       
       0 likes, 1 repeats
       
       You can find the recording of my rC3 talk "Towards a more Trustworthy Tor Network"  in English and German (interpreted) and subtitles at https://media.ccc.de/v/rc3-2021-chaosstudiohamburg-475-towards-a-more-trustworthy-tor-network
       
 (DIR) Post #AFVg5dGLmX8kOr0GjA by nusenu@mastodon.social
       2022-01-16T21:01:51Z
       
       1 likes, 2 repeats
       
       Someone triggered a Tor Sybil attack detection today, but thanks to their properly configured Authenticated Relay Operator ID we know it is CCC Stuttgart setting up their 48 shiny new tor exit instances - and NOT someone impersonating them 👍 Congratulations @cccs and thanks for using a state of the art secure OfflineMasterKey setup to protect your relay keys!
       
 (DIR) Post #AFWXbIkGtaRZbTz7UO by nusenu@mastodon.social
       2022-01-16T23:34:18Z
       
       0 likes, 1 repeats
       
       If you are operating tor relays using ansible-relayor you should monitor your relay's key expiry to avoid outages due to expired keys.Here is a tor MetricsPort feature request I just submitted for you, so it should be easier to monitor key expiry in the future:https://gitlab.torproject.org/tpo/core/tor/-/issues/40546Reminder: when you forget to renew the online keys, tor will shutdown eventually.And an older related MetricsPort feature request:https://gitlab.torproject.org/tpo/core/tor/-/issues/40194
       
 (DIR) Post #AFXbXaLc6QXE0ptX4C by nusenu@mastodon.social
       2022-01-17T19:30:08Z
       
       0 likes, 0 repeats
       
       @selea @rince @cccs if you also want to run a tor relay without exposing your master keys to your relay (aka OfflineMasterKeys), I recommend automation, even if you only run a single relayansible-relayor can help you with automation
       
 (DIR) Post #AFbwSi1F1otO1iinZ2 by nusenu@mastodon.social
       2022-01-19T21:43:20Z
       
       0 likes, 0 repeats
       
       @selea are these yours?https://metrics.torproject.org/rs.html#search/contact:selea
       
 (DIR) Post #AFc1qoY4u13SzzOVZQ by nusenu@mastodon.social
       2022-01-19T22:43:45Z
       
       0 likes, 0 repeats
       
       @selea SunOS, a rare species :)if you also also want to setup the Authenticated Relay Operator ID we previously mention you can:(1)  add this to your torrc ContactInfo:url:linux.pizza proof:uri-rsa ciissversion:2 and (2) publish your relay fingerprints at:https://linux.pizza/.well-known/tor-relay/rsa-fingerprint.txt
       
 (DIR) Post #AFdsye1fOoDZPNoSps by nusenu@mastodon.social
       2022-01-20T20:13:47Z
       
       0 likes, 0 repeats
       
       @selea tor does not know anything about this spec.That is why you should also set MyFamily correctly.
       
 (DIR) Post #B31HXgThhVbR91Ikm8 by nusenu@mastodon.social
       2026-02-05T18:35:45Z
       
       0 likes, 1 repeats
       
       Large ongoing tor network Sybil attack with over 8400 relays started 2026-02-04 04:49.Currently over 900 relays are still on the tor network.https://metrics.torproject.org/rs.html#search/contact:printerexpert@mail2tor.com%20running:true%20https://nusenu.github.io/OrNetStats/w/contact/32cb0861adc94fe7853fb21328e94596.htmlhttps://nusenu.github.io/OrNetStats/w/contact/7bc6e288b32929b0bce0857f5e80481f.html