From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on gnuweeb.org X-Spam-Level: X-Spam-Status: No, score=-1.8 required=5.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,NO_DNS_FOR_FROM, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from [192.168.210.80] (unknown [182.2.39.249]) by gnuweeb.org (Postfix) with ESMTPSA id 482CE80927; Wed, 31 Aug 2022 14:07:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gnuweeb.org; s=default; t=1661954856; bh=md4VEOw0wwnIF3CH3iuE6RAVKEV4KRyVtCYhgfqkaB8=; h=Date:Subject:From:To:Cc:References:In-Reply-To:From; b=GQcPdTROxzUOUe2pGwU5M147DK3pSA2xl98v8kJXuXdZc0BCXg8R4ntn4f7KDj+6M 3E5b4Ywewg9csn48bLYH8tKnOeFxM41lPY+AHlkcjm1O5NPrxVn5CEv4ndGqDdIiDR GWhW6+nCNUTfaToxe/0IwOijE/xcYsLw8BgedlQaX4eE7+mOhMp9Bj+hjec+jKXwbl uR0C7xM/HZtNOr9isy7+5o44mDV11ApnpQkssMJP82pz4Tz0toc/iiW742JkkRWil5 qiwRnxAmz+UAQCvHSjzbD7tkrV1Q6y0Fodl/na7a6QNnrfEEuTAMKPkgVQ1fPzn2NA SdI/MkjXlZ5Ug== Message-ID: <1509780b-1ff1-3a87-bb65-f764d11c1f42@gnuweeb.org> Date: Wed, 31 Aug 2022 21:07:30 +0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: Your TeaInside relay is failing to relay exit traffic Content-Language: en-US From: Ammar Faizi To: Georg Koppen Cc: bad-relays , GNU/Weeb Mailing List , Louvian Lyndal References: <291c272c-f3c6-6479-1b00-bf8c57ec9cf6@gnuweeb.org> <6827c274-5a85-aa8f-b41f-ccf520d7aad6@torproject.org> <1f42f7e1-8691-5b15-36c3-a7470294867c@gnuweeb.org> <903389a3-1c36-4bf3-cb30-7c12cb9b98ed@gnuweeb.org> <2aba6c4e-04c9-3e66-1293-583e68d8307d@torproject.org> <0238b664-2822-7db1-da0e-3f4424737b51@torproject.org> <6e0c8443-8e10-2b2c-6401-39d72f8d4455@gnuweeb.org> <50a99217-06d5-6404-9e5a-070dd1777d14@torproject.org> <8139f3ff-0f6e-b363-dda8-f5a8f4265732@gnuweeb.org> <06aeec7d-e8b5-ef6b-a6f9-60b0f9bcc36e@torproject.org> <736c22b0-bfd8-4bb1-74b5-de376ca67e35@gnuweeb.org> In-Reply-To: <736c22b0-bfd8-4bb1-74b5-de376ca67e35@gnuweeb.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit List-Id: On 8/31/22 9:02 PM, Ammar Faizi wrote: > On 8/31/22 8:37 PM, Georg Koppen wrote: >> Ammar Faizi: >>> On 8/31/22 2:25 PM, Georg Koppen wrote: >>>> In the meantime: could you elaborate on why you have the >>>> DNSPort/TransPort setup and those many SocksPorts configured? That's >>>> pretty unusual for a plan exit node setup and not needed. >>> >>> I run a VPN service that uses the transparent proxy and DNSPort in the >>> same server with the exit node. I also use the SOCKSPort to run my >>> scraper app. >>> >>> Side note: The amount of the traffic from the VPN and SOCKS is fairly >>> small, it shouldn't affect my exit node. >>> >>> Current usage: >>> >>>    - A single small scrapper app (SOCKSPort). >>> >>>      I configure many ports to get many exit IP addresses for >>>      randomizing my identity. >> >> How is that supposed to work given that you only have one exit IP address >> (68.183.184.174)? > > You misunderstood my email. > > I use the SOCKSPort for scraping, this gives me random exit IP. It doesn't > use my exit IP for the scraper's outbound traffic. A simple way to use it > is like this (I expose the ports publicly, you can try it too): > > ```bash > > for i in {64500..64599}; do > curl -4 https://ipecho.net/plain --proxy socks5://68.183.184.174:$i; echo; > done; > > ``` > > It's slow, but it works. > >> And what are you actually scraping? > > The current is actively fetching https://lore.kernel.org/io-uring/new.atom > every 30 seconds. I don't see this as a big deal for the Tor network anyway. Just addition to that, previously, Louvian (in the CC) was scraping nhentai.net with those SOCKSPort(s). But it was not a massive traffic. >> One thing that makes me wonder is that we encounter more and more websites >> that deploy either total bans on Tor users or annoying CAPTCHAs etc. because >> of folks massively scraping their contents and because all simpler scraping >> solutions are already blocked. Are you aware of that issue? >> (FWIW: that is having a big impact on Tor's overall usability). > > Yes, I am aware of this issue. I have been bitten by annoying CAPTCHAs, block, > etc. when using Tor network. So I understand. > >>>    - TeaVPN2 service (TransPort and DNSPort). >>> >>>      I am writing a VPN software (Linux). It uses the transparent >>>      proxy and DNS port only for accessing "*.onion" host. Only >>>      3 people using it so far, rarely used too. >>> >>> Is it fine doing that? >>> >>> I can deploy a dedicated Tor instance for my VPN and scraper app if >>> it is really needed. >> >> Well, "needed" might be to strong here but it is certainly encouraged to >> just relay Tor exit traffic with your server as whatever else you are >> running and doing on that box might affect that exit relay which in turn >> might impact (other) Tor users. > > Understand, thanks! > -- Ammar Faizi