/g/ - Technology

install openbsd

[Make a Post]
[X]





Tor Relays Nanonymous No.7907 [D][U][F][S][L][A][C] >>7924
File: e7466c6d6b4e766258cbcc8115003fde4694dcc0ef3823e75a3f2687471804b7.png (dl) (78.83 KiB)
Do you care about internet anonymity anon?
Concerned about avoiding the botnet?
Concerned about helping others avoid the botnet?
Why not run a Tor relay at home?
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide
No more speculating that all nodes are run by glowers. Get off your asses and make it better!

Nanonymous No.7909 [D]
b-b-b but if i send money to a VPN shill i am figthing the system!!11Tor is botnet

Nanonymous No.7924 [D] >>7925
>>7907
>Why not run a Tor relay at home?
I run one on a VPS because my bandwidth at home is shit.

Nanonymous No.7925 [D] >>7946 >>9691
>>7924
Another option can be to run a bridge at home. Even small amounts of bandwidth can help those, plus your IP doesn't end up on blacklists like running a relay can.

Nanonymous No.7926 [D][U][F]
File: 9400ee347aa19f78c50552b38ac5b86c21851308fe7c60c4df87ab1a481fd098.png (dl) (34.80 KiB)
Since Tor is a mixnet, it would be wise to check what it needs more and if you can provide that. Use https://metrics.torproject.org/networksize.html to get a reading.

Pic related is a graph of relays and bridges. While you can simply connect straight to a relay, using bridges gives you a better chance of your traffic not being pinged as explicitly Tor. And, as it shows, the number of bridges ticked up a little (because of a post on their blog advocating to run them), but it is still lacking. Not shown is the gigantic gap between IPv6 and IPv4 resolving relays and bridges, or ones running BSD instead of Linux.

So you have the safe option of running
>relay
for general traffic, lots of them
>bridge
censorship circumvention, a lot less of them. Exit relays are a different topic entirely and I hope you don't need a random nanon to tell you about them.

A future option to consider when it comes out is a Snowflake bridge, which uses WebRTC. Right now it's only available from an Alpha version of TBB and there are only a handful of nodes running. It has the potential to make bridges a lot more numerous, so something to look forward to. Read the docs here: https://trac.torproject.org/projects/tor/wiki/doc/Snowflake

Nanonymous No.7927 [D] >>7946
I'm wary of it because all tor nodes are public.
It would be cool if middle (non-guard, non-exit) nodes were not exposed. This is a concern because some fagits could block my clearnet access judging by the fact I'm a Tor node. I know that I shouldn't care that much, but this is actually annoying.

Nanonymous No.7929 [D] >>7932
https://torbsd.github.io/blog.html

Nanonymous No.7932 [D] >>7941
>>7929
Looks like that project died, anon.

Nanonymous No.7936 [D] >>7942 >>7945
Too difficult, just install i2pd and use i2p for a better experience with less effort.

Nanonymous No.7941 [D] >>7942
>>7932
There's still tutorials on how to run Tor relays over OpenBSD. Worth reading.
Also, not sure it's dead. I think they are active on openbsd ports (tbb and tor).

Nanonymous No.7942 [D] >>7943
>>7936
If you think following that guide is hard you do not belong here.
>>7941
Looking at the Tor metrics site, there are only a few hundred BSD relays. I imagine there are very few relays that are specifically OpenBSD. Are you one of them?

Nanonymous No.7943 [D] >>7960
>>7942
>Are you one of them?
No... but it's not hard to make a relay on openbsd (in fact I think it's easier than Debian). More people should do it. I would like to buy a PC Engines APU2 to use as OpenBSD Tor node some day.

Nanonymous No.7944 [D]
*BSDs are even more ded than they were in the 2000s. No wonder there is little of Tor relays with them.

Nanonymous No.7945 [D]
>>7936
>too difficult
So you're a pussy. You like getting raped by old men, yeah you're in the wrong place, niglet.

Nanonymous No.7946 [D] >>7952
>>7925
>Another option can be to run a bridge at home. Even small amounts of bandwidth can help those, plus your IP doesn't end up on blacklists like running a relay can.
>>7927
>I'm wary of it because all tor nodes are public.
>It would be cool if middle (non-guard, non-exit) nodes were not exposed. This is a concern because some fagits could block my clearnet access judging by the fact I'm a Tor node.
I ran a Tor relay from my home internet connection for over a year. I was never (D)DoSed and never experienced any network security issues (that I was able to detect, at least, though I keep my OpenWRT up to date and only had the port for the relay open). However, I did experience the blocking that anon alluded to. After I'd been running a relay for a few weeks, I was no longer able to access my bank's website, Hulu, and a number of other sites. Hulu has openly admitted that they have a philosophical objection to Tor because it can be used to trade copyrighted materials secretly, and that they blacklist IPs associated with Tor relays for that reason. My bank pretended like they had no idea what I was talking about, even after I got past the front-line tech who can't help anyone but retarded Boomers and got the ticket escalated to an actual network guy. They're probably using some WebScale™ Enterprise-ready™ 365 Super Network Security Solution™™™™ that just blacklists all Tor relays, and the guy didn't know about it. Or they have a policy of not commenting about it and playing dumb.

In the end, even though only a handful of sites were blocked for me, not being able to access my bank from home was a dealbreaker, and I stopped running a Tor relay. After a few months (and a major network outage at my ISP), I got a new IP address and was able to access whatever I wanted again.

I run a Tor relay from a VPS now.

sage No.7952 [D] >>7958
>>7946
You gave plenty of information here. I'm just warning you that they may know you're here now.

Nanonymous No.7958 [D]
>>7952
They probably do.

Nanonymous No.7960 [D] >>7964
>>7943
why would it be easier than debian? pretty sure most relays are debian relays anyways

Nanonymous No.7964 [D] >>7976 >>9687
>>7960
OpenBSD has good documentation.
Almost everything always runs as expected, with no big surprises. The pf firewall is easier to setup, in contrast with iptables.
Debian always fucks something. You ask to install one package and 400MB of binaries comes together. You don't know how many processes are running, because the are too many. On OpenBSD I can manage every single thing, because it runs nearly nothing (I have only 15 processes running right now as I post it).

There's many advantages when you learn to use a simpler system like openbsd.

Nanonymous No.7976 [D] >>9687
>>7964
Isn't iptables defunct in favor of nftables now?

Nanonymous No.8013 [D] >>8064
And to make a local impact, you can run an open AP at home that dumps all traffic into a Tor transparent proxy. Don't keep any client connection logs longer than you need. In addition to being neighborly, this provides some plausible deniability if something ever gets traced back to your IP.

Nanonymous No.8064 [D]
>>8013
You'd have to worry about some retard connecting with their botnet glower device and having it transmit geographically identifiable information over the Tor connection. Doors should not be left open for the tards.

Nanonymous No.9682 [D] >>9685 >>9692
>Why not run a Tor relay at home?
not fbi at all

Nanonymous No.9685 [D]
>>9682
It is safe to run non-exit relays anywhere.

Nanonymous No.9687 [D]
>>7964
>>7976
I prefer nftables to pf, tbh

Nanonymous No.9691 [D]
>>7925
Even you run a Tor node, just entry or middle nodes are okay.
>Only exit nodes are listed on blacklists.

Nanonymous No.9692 [D] >>9738
>>9682
Running an exit node can be punished by the law. Some guys living in Austria and Russia went to prison because of running exit nodes.

Nanonymous No.9738 [D]
>>9692
Russia and Austria are both peculiar, with the latter's stance on encryption all the more bizarre given that it isn't supposed to be China.

It is probably better to consider running an exit node a hobby only for those in saner legal climates who are ready to make the commitment of their time and more resources (e.g., to consult legal experts, change providers) than your typical underemployed person can afford/manage.