From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on gnuweeb.org X-Spam-Level: X-Spam-Status: No, score=-1.8 required=5.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,NO_DNS_FOR_FROM, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from [192.168.210.80] (unknown [182.2.39.249]) by gnuweeb.org (Postfix) with ESMTPSA id B3CEB80927; Wed, 31 Aug 2022 14:02:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gnuweeb.org; s=default; t=1661954543; bh=vSUNrO2wH3QjD/fjjggw5MvAADszXjLJDgNN2Jmbt/8=; h=Date:To:Cc:References:From:Subject:In-Reply-To:From; b=YxiHZnd3OUfbkHHWy3qO1hwEXOjGMsT6yDAzGbbe72elo/neB6oY3gbEGlcyijM5k x0WT+ZkYVGp5g75b1F2bPey2vwEfK+gb2e8BRaDyWgch7SNy53GXPIxsXaZkwXV2U9 EkruEwQ2FtHVQTQzF8ylK6oXYJfgvnEl999ifVgwy8YGKoQ2un9B2Ir0bCqe2hitvx gHbnsx9Z7LMEfmSzTKKtbw2ReU5m7wcrORJSV4hYKw/qWT6iNWdPxxJrYq3yYB6zQH KntP7MlE1U+YpTi96VEdFN1Vrufw+822dYVvkTK2gx50SGVWMN6Ge5ID7brBmM1LCw QU+RhXnAZ1RTw== Message-ID: <736c22b0-bfd8-4bb1-74b5-de376ca67e35@gnuweeb.org> Date: Wed, 31 Aug 2022 21:02:18 +0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Content-Language: en-US To: Georg Koppen Cc: bad-relays , GNU/Weeb Mailing List , Louvian Lyndal References: <291c272c-f3c6-6479-1b00-bf8c57ec9cf6@gnuweeb.org> <6827c274-5a85-aa8f-b41f-ccf520d7aad6@torproject.org> <1f42f7e1-8691-5b15-36c3-a7470294867c@gnuweeb.org> <903389a3-1c36-4bf3-cb30-7c12cb9b98ed@gnuweeb.org> <2aba6c4e-04c9-3e66-1293-583e68d8307d@torproject.org> <0238b664-2822-7db1-da0e-3f4424737b51@torproject.org> <6e0c8443-8e10-2b2c-6401-39d72f8d4455@gnuweeb.org> <50a99217-06d5-6404-9e5a-070dd1777d14@torproject.org> <8139f3ff-0f6e-b363-dda8-f5a8f4265732@gnuweeb.org> <06aeec7d-e8b5-ef6b-a6f9-60b0f9bcc36e@torproject.org> From: Ammar Faizi Subject: Re: Your TeaInside relay is failing to relay exit traffic In-Reply-To: <06aeec7d-e8b5-ef6b-a6f9-60b0f9bcc36e@torproject.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit List-Id: On 8/31/22 8:37 PM, Georg Koppen wrote: > Ammar Faizi: >> On 8/31/22 2:25 PM, Georg Koppen wrote: >>> In the meantime: could you elaborate on why you have the >>> DNSPort/TransPort setup and those many SocksPorts configured? That's >>> pretty unusual for a plan exit node setup and not needed. >> >> I run a VPN service that uses the transparent proxy and DNSPort in the >> same server with the exit node. I also use the SOCKSPort to run my >> scraper app. >> >> Side note: The amount of the traffic from the VPN and SOCKS is fairly >> small, it shouldn't affect my exit node. >> >> Current usage: >> >> - A single small scrapper app (SOCKSPort). >> >> I configure many ports to get many exit IP addresses for >> randomizing my identity. > > How is that supposed to work given that you only have one exit IP address > (68.183.184.174)? You misunderstood my email. I use the SOCKSPort for scraping, this gives me random exit IP. It doesn't use my exit IP for the scraper's outbound traffic. A simple way to use it is like this (I expose the ports publicly, you can try it too): ```bash for i in {64500..64599}; do curl -4 https://ipecho.net/plain --proxy socks5://68.183.184.174:$i; echo; done; ``` It's slow, but it works. > And what are you actually scraping? The current is actively fetching https://lore.kernel.org/io-uring/new.atom every 30 seconds. I don't see this as a big deal for the Tor network anyway. > One thing that makes me wonder is that we encounter more and more websites > that deploy either total bans on Tor users or annoying CAPTCHAs etc. because > of folks massively scraping their contents and because all simpler scraping > solutions are already blocked. Are you aware of that issue? > (FWIW: that is having a big impact on Tor's overall usability). Yes, I am aware of this issue. I have been bitten by annoying CAPTCHAs, block, etc. when using Tor network. So I understand. >> - TeaVPN2 service (TransPort and DNSPort). >> >> I am writing a VPN software (Linux). It uses the transparent >> proxy and DNS port only for accessing "*.onion" host. Only >> 3 people using it so far, rarely used too. >> >> Is it fine doing that? >> >> I can deploy a dedicated Tor instance for my VPN and scraper app if >> it is really needed. > > Well, "needed" might be to strong here but it is certainly encouraged to > just relay Tor exit traffic with your server as whatever else you are > running and doing on that box might affect that exit relay which in turn > might impact (other) Tor users. Understand, thanks! -- Ammar Faizi