* Your TeaInside relay is failing to relay exit traffic @ 2022-08-25 6:58 Georg Koppen 2022-08-25 7:18 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-25 6:58 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 499 bytes --] Hello! Your TeaInside relay[1] seems to fail relaying exit traffic according to our measurements. We ran some tests and it was not possible in 5/5 cases to reach e.g. https://torproject.org. Could you please look into that and resolve the issue on your end? Please let us know if you have further questions and when the problem is resolved on your side. Thanks for running relays! Georg [1] https://metrics.torproject.org/rs.html#details/F241330F16AF6BD90226CC9130DA8E20B58AAC3B [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-25 6:58 Your TeaInside relay is failing to relay exit traffic Georg Koppen @ 2022-08-25 7:18 ` Ammar Faizi 2022-08-25 7:33 ` Louvian Lyndal 2022-08-25 9:27 ` Georg Koppen 0 siblings, 2 replies; 23+ messages in thread From: Ammar Faizi @ 2022-08-25 7:18 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1.1: Type: text/plain, Size: 769 bytes --] On 8/25/22 1:58 PM, Georg Koppen wrote: > Hello! > > Your TeaInside relay[1] seems to fail relaying exit traffic > according to our measurements. We ran some tests and it was not possible > in 5/5 cases to reach e.g. https://torproject.org. Could you please look > into that and resolve the issue on your end? > > Please let us know if you have further questions and when the problem is > resolved on your side. > > Thanks for running relays! > Georg > > [1] https://metrics.torproject.org/rs.html#details/F241330F16AF6BD90226CC9130DA8E20B58AAC3B Hi Georg, Thanks for reporting this issue. I will take a look into it. But before that, I have a question. How do I test my exit relay to see whether it's working properly? -- Ammar Faizi [-- Attachment #1.1.2: OpenPGP public key --] [-- Type: application/pgp-keys, Size: 1795 bytes --] [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 495 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-25 7:18 ` Ammar Faizi @ 2022-08-25 7:33 ` Louvian Lyndal 2022-08-25 7:48 ` Ammar Faizi 2022-08-25 9:27 ` Georg Koppen 1 sibling, 1 reply; 23+ messages in thread From: Louvian Lyndal @ 2022-08-25 7:33 UTC (permalink / raw) To: Ammar Faizi; +Cc: Georg Koppen, bad-relays, GNU/Weeb Mailing List [-- Attachment #1: Type: text/plain, Size: 1023 bytes --] On Thu, Aug 25, 2022 at 2:18 PM Ammar Faizi wrote: > On 8/25/22 1:58 PM, Georg Koppen wrote: > > Hello! > > > > Your TeaInside relay[1] seems to fail relaying exit traffic > > according to our measurements. We ran some tests and it was not possible > > in 5/5 cases to reach e.g. https://torproject.org. Could you please look > > into that and resolve the issue on your end? > > > > Please let us know if you have further questions and when the problem is > > resolved on your side. > > > > Thanks for running relays! > > Georg > > > > [1] https://metrics.torproject.org/rs.html#details/F241330F16AF6BD90226CC9130DA8E20B58AAC3B > > Hi Georg, > > Thanks for reporting this issue. > > I will take a look into it. But before that, I have a question. How do I > test my exit relay to see whether it's working properly? I checked it, there are many TLS error here: TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer I don't understand the reason behind this. Will investigate it. [-- Attachment #2: tor.log --] [-- Type: text/x-log, Size: 4401 bytes --] Aug 25 14:21:21.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:21:32.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:03.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:03.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:17.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:17.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:17.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:36.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:50.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:22:58.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:23:29.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:23:29.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:23:41.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:23:58.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:24:11.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:25:19.000 [notice] TLS error PR_CONNECT_RESET_ERROR while reading with [scrubbed]: TCP connection reset by peer Aug 25 14:25:47.000 [notice] New control connection opened from 127.0.0.1. Aug 25 14:26:12.000 [notice] New control connection opened from 127.0.0.1. Aug 25 14:26:37.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:26:49.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:05.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:20.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:20.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:20.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:20.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:20.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:20.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:26.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:27:40.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:28:10.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:28:33.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:28:36.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:28:59.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:29:26.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer Aug 25 14:29:33.000 [notice] TLS error PR_CONNECT_RESET_ERROR while reading with 78.42.224.40:9001 ID=C1lV7a6ArdG1jQIwnPXgwMsWmInEiws3R0EGt6TXLxQ RSA_ID=841A6A7A53432F8A6B36D6A3083FE0E29899469C: TCP connection reset by peer Aug 25 14:29:45.000 [notice] TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP connection reset by peer ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-25 7:33 ` Louvian Lyndal @ 2022-08-25 7:48 ` Ammar Faizi 0 siblings, 0 replies; 23+ messages in thread From: Ammar Faizi @ 2022-08-25 7:48 UTC (permalink / raw) To: Louvian Lyndal; +Cc: Georg Koppen, bad-relays, GNU/Weeb Mailing List On 8/25/22 2:33 PM, Louvian Lyndal wrote: > I checked it, there are many TLS error here: > > TLS error PR_CONNECT_RESET_ERROR while writing with [scrubbed]: TCP > connection reset by peer > > I don't understand the reason behind this. Will investigate it. Hmmm... I doubt if this one is an issue from our side. As far I can tell, ECONNRESET means the other side (the remote side) is terminating the connection. But of course this can be a firewall issue or something that results in the Tor daemon thinks so. (I still doubt if it's a firewall issue, though). -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-25 7:18 ` Ammar Faizi 2022-08-25 7:33 ` Louvian Lyndal @ 2022-08-25 9:27 ` Georg Koppen 2022-08-25 10:13 ` Ammar Faizi 1 sibling, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-25 9:27 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 1611 bytes --] Ammar Faizi: > On 8/25/22 1:58 PM, Georg Koppen wrote: >> Hello! >> >> Your TeaInside relay[1] seems to fail relaying exit traffic >> according to our measurements. We ran some tests and it was not possible >> in 5/5 cases to reach e.g. https://torproject.org. Could you please look >> into that and resolve the issue on your end? >> >> Please let us know if you have further questions and when the problem is >> resolved on your side. >> >> Thanks for running relays! >> Georg >> >> [1] >> https://metrics.torproject.org/rs.html#details/F241330F16AF6BD90226CC9130DA8E20B58AAC3B > > Hi Georg, > > Thanks for reporting this issue. > > I will take a look into it. But before that, I have a question. How do I > test my exit relay to see whether it's working properly? There are different ways. One thing we do is to build circuits with the respective nodes to test as exits and then we try to connect to different websites and check whether there are any failures. In your case it seems connections are timing out. Another way, which you could try is using Tor Browser with your node as exit node. For that, after you have downloaded Tor Browser and extracted it, add to your torrc file (in tor-browser_en-US/Browser/TorBrowser/Data/Tor): ExitNodes F241330F16AF6BD90226CC9130DA8E20B58AAC3B The start Tor Browser and try to surf to some websites like popular news sites etc. Those requests are frequently timing out or take super long to load resulting caused by lots of circuit churn (as the circuit fails due to timeouts). Hope this helps, Georg [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-25 9:27 ` Georg Koppen @ 2022-08-25 10:13 ` Ammar Faizi 2022-08-30 5:57 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-25 10:13 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/25/22 4:27 PM, Georg Koppen wrote: > There are different ways. One thing we do is to build circuits with the > respective nodes to test as exits and then we try to connect to > different websites and check whether there are any failures. In your > case it seems connections are timing out. > > Another way, which you could try is using Tor Browser with your node as > exit node. For that, after you have downloaded Tor Browser and extracted > it, add to your torrc file (in > tor-browser_en-US/Browser/TorBrowser/Data/Tor): > > ExitNodes F241330F16AF6BD90226CC9130DA8E20B58AAC3B > > The start Tor Browser and try to surf to some websites like popular news > sites etc. Those requests are frequently timing out or take super long > to load resulting caused by lots of circuit churn (as the circuit fails > due to timeouts). Great, thanks for the tips! The latter way using Tor Browser sounds easier for me. I will investigate this and be back to you soon. -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-25 10:13 ` Ammar Faizi @ 2022-08-30 5:57 ` Ammar Faizi 2022-08-30 11:02 ` Georg Koppen 0 siblings, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-30 5:57 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/25/22 5:13 PM, Ammar Faizi wrote: > On 8/25/22 4:27 PM, Georg Koppen wrote: >> There are different ways. One thing we do is to build circuits with the >> respective nodes to test as exits and then we try to connect to >> different websites and check whether there are any failures. In your >> case it seems connections are timing out. >> >> Another way, which you could try is using Tor Browser with your node as >> exit node. For that, after you have downloaded Tor Browser and extracted >> it, add to your torrc file (in >> tor-browser_en-US/Browser/TorBrowser/Data/Tor): >> >> ExitNodes F241330F16AF6BD90226CC9130DA8E20B58AAC3B >> >> The start Tor Browser and try to surf to some websites like popular news >> sites etc. Those requests are frequently timing out or take super long >> to load resulting caused by lots of circuit churn (as the circuit fails >> due to timeouts). > > Great, thanks for the tips! > > The latter way using Tor Browser sounds easier for me. I will > investigate this and be back to you soon. Hi Georg, I have been trying to investigate this for several days, but haven't been able to fix the issue. Looking at the Tor daemon process from htop, it is spinning at 100% CPU. I don't know what is going on, but as far as I can tell, it is still consuming CPU and network I/O. I tried to specify my relay fingerprint in torrc Tor browser like what you said previously. My Tor browser didn't work. It was always timing out with no clear error. From the server side, this is the last few hundred of lines of my Tor daemon log: https://gist.githubusercontent.com/ammarfaizi2/40be0cb122b5ad1240f9001f8e58eb7d/raw/2407fc3063d786e3e0054d522a0e63323e35513e/tor_log.txt Do you have any suggestion? If you need more information to diagnose this, tell me what do you need. I will happily provide it. -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-30 5:57 ` Ammar Faizi @ 2022-08-30 11:02 ` Georg Koppen 2022-08-30 11:14 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-30 11:02 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 2087 bytes --] Ammar Faizi: > On 8/25/22 5:13 PM, Ammar Faizi wrote: >> On 8/25/22 4:27 PM, Georg Koppen wrote: >>> There are different ways. One thing we do is to build circuits with the >>> respective nodes to test as exits and then we try to connect to >>> different websites and check whether there are any failures. In your >>> case it seems connections are timing out. >>> >>> Another way, which you could try is using Tor Browser with your node as >>> exit node. For that, after you have downloaded Tor Browser and extracted >>> it, add to your torrc file (in >>> tor-browser_en-US/Browser/TorBrowser/Data/Tor): >>> >>> ExitNodes F241330F16AF6BD90226CC9130DA8E20B58AAC3B >>> >>> The start Tor Browser and try to surf to some websites like popular news >>> sites etc. Those requests are frequently timing out or take super long >>> to load resulting caused by lots of circuit churn (as the circuit fails >>> due to timeouts). >> >> Great, thanks for the tips! >> >> The latter way using Tor Browser sounds easier for me. I will >> investigate this and be back to you soon. > Hi Georg, > > I have been trying to investigate this for several days, but haven't been > able to fix the issue. Looking at the Tor daemon process from htop, it is > spinning at 100% CPU. I don't know what is going on, but as far as I can > tell, it is still consuming CPU and network I/O. > > I tried to specify my relay fingerprint in torrc Tor browser like > what you said previously. My Tor browser didn't work. It was always > timing out with no clear error. > > From the server side, this is the last few hundred of lines of my Tor > daemon log: > > > https://gist.githubusercontent.com/ammarfaizi2/40be0cb122b5ad1240f9001f8e58eb7d/raw/2407fc3063d786e3e0054d522a0e63323e35513e/tor_log.txt > > Do you have any suggestion? > > If you need more information to diagnose this, tell me what do you > need. I will happily provide it. Hrm. What else is running on that server apart from the exit node? Could you share the torrc file you are using? Georg [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-30 11:02 ` Georg Koppen @ 2022-08-30 11:14 ` Ammar Faizi 2022-08-30 14:12 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-30 11:14 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/30/22 6:02 PM, Georg Koppen wrote: > Hrm. What else is running on that server apart from the exit node? Could > you share the torrc file you are using? I run a single Tor process. Apart from the exit node, it runs: - TransPort - DNSPort - and many socks5 proxies torrc file is: https://gist.githubusercontent.com/ammarfaizi2/7b6bef9eafc4c33085a893044eab8187/raw/38f47e88f812a7f092b3b5e8486399c59080d8d2/torrc.txt -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-30 11:14 ` Ammar Faizi @ 2022-08-30 14:12 ` Ammar Faizi 2022-08-31 0:13 ` Ammar Faizi 2022-08-31 6:37 ` Georg Koppen 0 siblings, 2 replies; 23+ messages in thread From: Ammar Faizi @ 2022-08-30 14:12 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/30/22 6:14 PM, Ammar Faizi wrote: > On 8/30/22 6:02 PM, Georg Koppen wrote: >> Hrm. What else is running on that server apart from the exit node? Could you share the torrc file you are using? > > I run a single Tor process. Apart from the exit node, it runs: > > - TransPort > - DNSPort > - and many socks5 proxies > > torrc file is: > > https://gist.githubusercontent.com/ammarfaizi2/7b6bef9eafc4c33085a893044eab8187/raw/38f47e88f812a7f092b3b5e8486399c59080d8d2/torrc.txt Hi Georg, Follow up on this issue... My exit node is now working properly. I also have just re-activated the IPv6 support on it. My Tor browser is now working fine and I can confirm the exit IP matches with my exit node server. While I don't actually know the reason behind this issue, it's all fixed now. I also learned more about Tor network. Thanks for reporting and helping! Please let me know if I missed something. -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-30 14:12 ` Ammar Faizi @ 2022-08-31 0:13 ` Ammar Faizi 2022-08-31 6:37 ` Georg Koppen 1 sibling, 0 replies; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 0:13 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/30/22 9:12 PM, Ammar Faizi wrote: > Hi Georg, > > Follow up on this issue... > > My exit node is now working properly. I also have just re-activated > the IPv6 support on it. My Tor browser is now working fine and I can > confirm the exit IP matches with my exit node server. > > While I don't actually know the reason behind this issue, it's all > fixed now. I also learned more about Tor network. > > Thanks for reporting and helping! > > Please let me know if I missed something. Hi, After several hours running, my exit node is now marked as BadExit. I am not sure what I did wrong. I can perform outbound traffic just fine from my exit node server. What is the real reason behind this? Fingerprint: F241330F16AF6BD90226CC9130DA8E20B58AAC3B Please help. -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-30 14:12 ` Ammar Faizi 2022-08-31 0:13 ` Ammar Faizi @ 2022-08-31 6:37 ` Georg Koppen 2022-08-31 6:45 ` Ammar Faizi 1 sibling, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-31 6:37 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 1066 bytes --] Ammar Faizi: > On 8/30/22 6:14 PM, Ammar Faizi wrote: >> On 8/30/22 6:02 PM, Georg Koppen wrote: >>> Hrm. What else is running on that server apart from the exit node? >>> Could you share the torrc file you are using? >> >> I run a single Tor process. Apart from the exit node, it runs: >> >> - TransPort >> - DNSPort >> - and many socks5 proxies >> >> torrc file is: >> >> >> https://gist.githubusercontent.com/ammarfaizi2/7b6bef9eafc4c33085a893044eab8187/raw/38f47e88f812a7f092b3b5e8486399c59080d8d2/torrc.txt > Hi Georg, > > Follow up on this issue... > > My exit node is now working properly. I also have just re-activated > the IPv6 support on it. My Tor browser is now working fine and I can > confirm the exit IP matches with my exit node server. > > While I don't actually know the reason behind this issue, it's all > fixed now. I also learned more about Tor network. Great, what did you change? Georg > Thanks for reporting and helping! > > Please let me know if I missed something. > [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 6:37 ` Georg Koppen @ 2022-08-31 6:45 ` Ammar Faizi 2022-08-31 7:25 ` Georg Koppen 0 siblings, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 6:45 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/31/22 1:37 PM, Georg Koppen wrote: > Ammar Faizi: >> On 8/30/22 6:14 PM, Ammar Faizi wrote: >> My exit node is now working properly. I also have just re-activated >> the IPv6 support on it. My Tor browser is now working fine and I can >> confirm the exit IP matches with my exit node server. >> >> While I don't actually know the reason behind this issue, it's all >> fixed now. I also learned more about Tor network. > > Great, what did you change? Too many things to tell. I adjusted several configurations in torrc. Not sure what the issue was. But now my exit node is marked as BadExit and can't relay exit traffic again (after previously several hour working well). Could you elaborate on what is going wrong? How to fix BadExit? My current torrc is: https://gist.githubusercontent.com/ammarfaizi2/ac111834be4970d93af67bd6e861838e/raw/baf086007a2847ff8aec37867211883e74231e8b/torrc Fingerprint: F241330F16AF6BD90226CC9130DA8E20B58AAC3B -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 6:45 ` Ammar Faizi @ 2022-08-31 7:25 ` Georg Koppen 2022-08-31 7:48 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-31 7:25 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 1252 bytes --] Ammar Faizi: > On 8/31/22 1:37 PM, Georg Koppen wrote: >> Ammar Faizi: >>> On 8/30/22 6:14 PM, Ammar Faizi wrote: >>> My exit node is now working properly. I also have just re-activated >>> the IPv6 support on it. My Tor browser is now working fine and I can >>> confirm the exit IP matches with my exit node server. >>> >>> While I don't actually know the reason behind this issue, it's all >>> fixed now. I also learned more about Tor network. >> >> Great, what did you change? > > Too many things to tell. I adjusted several configurations in torrc. > Not sure what the issue was. But now my exit node is marked as BadExit > and can't relay exit traffic again (after previously several hour > working well). > > Could you elaborate on what is going wrong? How to fix BadExit? The problem was that I still saw the same issues yesterday when testing and got the directory authorities to badexit your node as I did not know how long this problem persisted. I can redo my test later today and see how that goes. In the meantime: could you elaborate on why you have the DNSPort/TransPort setup and those many SocksPorts configured? That's pretty unusual for a plan exit node setup and not needed. Thanks, Georg [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 7:25 ` Georg Koppen @ 2022-08-31 7:48 ` Ammar Faizi 2022-08-31 12:49 ` Ammar Faizi 2022-08-31 13:37 ` Georg Koppen 0 siblings, 2 replies; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 7:48 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/31/22 2:25 PM, Georg Koppen wrote: > Ammar Faizi: >> On 8/31/22 1:37 PM, Georg Koppen wrote: >>> Ammar Faizi: >>>> On 8/30/22 6:14 PM, Ammar Faizi wrote: >>>> My exit node is now working properly. I also have just re-activated >>>> the IPv6 support on it. My Tor browser is now working fine and I can >>>> confirm the exit IP matches with my exit node server. >>>> >>>> While I don't actually know the reason behind this issue, it's all >>>> fixed now. I also learned more about Tor network. >>> >>> Great, what did you change? >> >> Too many things to tell. I adjusted several configurations in torrc. >> Not sure what the issue was. But now my exit node is marked as BadExit >> and can't relay exit traffic again (after previously several hour >> working well). >> >> Could you elaborate on what is going wrong? How to fix BadExit? > > The problem was that I still saw the same issues yesterday when testing > and got the directory authorities to badexit your node as I did not know > how long this problem persisted. I can redo my test later today and see > how that goes. I see, I understand, thanks! > In the meantime: could you elaborate on why you have the > DNSPort/TransPort setup and those many SocksPorts configured? That's > pretty unusual for a plan exit node setup and not needed. I run a VPN service that uses the transparent proxy and DNSPort in the same server with the exit node. I also use the SOCKSPort to run my scraper app. Side note: The amount of the traffic from the VPN and SOCKS is fairly small, it shouldn't affect my exit node. Current usage: - A single small scrapper app (SOCKSPort). I configure many ports to get many exit IP addresses for randomizing my identity. - TeaVPN2 service (TransPort and DNSPort). I am writing a VPN software (Linux). It uses the transparent proxy and DNS port only for accessing "*.onion" host. Only 3 people using it so far, rarely used too. Is it fine doing that? I can deploy a dedicated Tor instance for my VPN and scraper app if it is really needed. -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 7:48 ` Ammar Faizi @ 2022-08-31 12:49 ` Ammar Faizi 2022-08-31 13:25 ` Georg Koppen 2022-08-31 13:37 ` Georg Koppen 1 sibling, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 12:49 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/31/22 2:48 PM, Ammar Faizi wrote: > On 8/31/22 2:25 PM, Georg Koppen wrote: >> The problem was that I still saw the same issues yesterday when testing >> and got the directory authorities to badexit your node as I did not know >> how long this problem persisted. I can redo my test later today and see >> how that goes. I am curious on what my exit relay is currently doing. I have a question: What is my exit relay doing when it's marked as BadExit? I still see the Tor daemon consuming CPU and network I/O despite it doesn't relay exit traffic (per BadExit flag). [ I'm not a Tor expert, but I guess it acts as a guard or middle node. Doesn't it? #correct_me_if_i_am_wrong ] -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 12:49 ` Ammar Faizi @ 2022-08-31 13:25 ` Georg Koppen 0 siblings, 0 replies; 23+ messages in thread From: Georg Koppen @ 2022-08-31 13:25 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 836 bytes --] Ammar Faizi: > On 8/31/22 2:48 PM, Ammar Faizi wrote: >> On 8/31/22 2:25 PM, Georg Koppen wrote: >>> The problem was that I still saw the same issues yesterday when testing >>> and got the directory authorities to badexit your node as I did not know >>> how long this problem persisted. I can redo my test later today and see >>> how that goes. > > I am curious on what my exit relay is currently doing. I have a question: > > What is my exit relay doing when it's marked as BadExit? > > I still see the Tor daemon consuming CPU and network I/O despite it doesn't > relay exit traffic (per BadExit flag). > > [ > I'm not a Tor expert, but I guess it acts as a guard or middle node. > Doesn't it? > > #correct_me_if_i_am_wrong That's correct. It's just not used as an exit node. Georg [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 7:48 ` Ammar Faizi 2022-08-31 12:49 ` Ammar Faizi @ 2022-08-31 13:37 ` Georg Koppen 2022-08-31 14:02 ` Ammar Faizi 1 sibling, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-31 13:37 UTC (permalink / raw) To: Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal [-- Attachment #1.1: Type: text/plain, Size: 2997 bytes --] Ammar Faizi: > On 8/31/22 2:25 PM, Georg Koppen wrote: >> Ammar Faizi: >>> On 8/31/22 1:37 PM, Georg Koppen wrote: >>>> Ammar Faizi: >>>>> On 8/30/22 6:14 PM, Ammar Faizi wrote: >>>>> My exit node is now working properly. I also have just re-activated >>>>> the IPv6 support on it. My Tor browser is now working fine and I can >>>>> confirm the exit IP matches with my exit node server. >>>>> >>>>> While I don't actually know the reason behind this issue, it's all >>>>> fixed now. I also learned more about Tor network. >>>> >>>> Great, what did you change? >>> >>> Too many things to tell. I adjusted several configurations in torrc. >>> Not sure what the issue was. But now my exit node is marked as BadExit >>> and can't relay exit traffic again (after previously several hour >>> working well). >>> >>> Could you elaborate on what is going wrong? How to fix BadExit? >> >> The problem was that I still saw the same issues yesterday when testing >> and got the directory authorities to badexit your node as I did not know >> how long this problem persisted. I can redo my test later today and see >> how that goes. > > I see, I understand, thanks! > >> In the meantime: could you elaborate on why you have the >> DNSPort/TransPort setup and those many SocksPorts configured? That's >> pretty unusual for a plan exit node setup and not needed. > > I run a VPN service that uses the transparent proxy and DNSPort in the > same server with the exit node. I also use the SOCKSPort to run my > scraper app. > > Side note: The amount of the traffic from the VPN and SOCKS is fairly > small, it shouldn't affect my exit node. > > Current usage: > > - A single small scrapper app (SOCKSPort). > > I configure many ports to get many exit IP addresses for > randomizing my identity. How is that supposed to work given that you only have one exit IP address (68.183.184.174)? And what are you actually scraping? One thing that makes me wonder is that we encounter more and more websites that deploy either total bans on Tor users or annoying CAPTCHAs etc. because of folks massively scraping their contents and because all simpler scraping solutions are already blocked. Are you aware of that issue? (FWIW: that is having a big impact on Tor's overall usability). > - TeaVPN2 service (TransPort and DNSPort). > > I am writing a VPN software (Linux). It uses the transparent > proxy and DNS port only for accessing "*.onion" host. Only > 3 people using it so far, rarely used too. > > Is it fine doing that? > > I can deploy a dedicated Tor instance for my VPN and scraper app if > it is really needed. Well, "needed" might be to strong here but it is certainly encouraged to just relay Tor exit traffic with your server as whatever else you are running and doing on that box might affect that exit relay which in turn might impact (other) Tor users. Georg [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 13:37 ` Georg Koppen @ 2022-08-31 14:02 ` Ammar Faizi 2022-08-31 14:07 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 14:02 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/31/22 8:37 PM, Georg Koppen wrote: > Ammar Faizi: >> On 8/31/22 2:25 PM, Georg Koppen wrote: >>> In the meantime: could you elaborate on why you have the >>> DNSPort/TransPort setup and those many SocksPorts configured? That's >>> pretty unusual for a plan exit node setup and not needed. >> >> I run a VPN service that uses the transparent proxy and DNSPort in the >> same server with the exit node. I also use the SOCKSPort to run my >> scraper app. >> >> Side note: The amount of the traffic from the VPN and SOCKS is fairly >> small, it shouldn't affect my exit node. >> >> Current usage: >> >> - A single small scrapper app (SOCKSPort). >> >> I configure many ports to get many exit IP addresses for >> randomizing my identity. > > How is that supposed to work given that you only have one exit IP address > (68.183.184.174)? You misunderstood my email. I use the SOCKSPort for scraping, this gives me random exit IP. It doesn't use my exit IP for the scraper's outbound traffic. A simple way to use it is like this (I expose the ports publicly, you can try it too): ```bash for i in {64500..64599}; do curl -4 https://ipecho.net/plain --proxy socks5://68.183.184.174:$i; echo; done; ``` It's slow, but it works. > And what are you actually scraping? The current is actively fetching https://lore.kernel.org/io-uring/new.atom every 30 seconds. I don't see this as a big deal for the Tor network anyway. > One thing that makes me wonder is that we encounter more and more websites > that deploy either total bans on Tor users or annoying CAPTCHAs etc. because > of folks massively scraping their contents and because all simpler scraping > solutions are already blocked. Are you aware of that issue? > (FWIW: that is having a big impact on Tor's overall usability). Yes, I am aware of this issue. I have been bitten by annoying CAPTCHAs, block, etc. when using Tor network. So I understand. >> - TeaVPN2 service (TransPort and DNSPort). >> >> I am writing a VPN software (Linux). It uses the transparent >> proxy and DNS port only for accessing "*.onion" host. Only >> 3 people using it so far, rarely used too. >> >> Is it fine doing that? >> >> I can deploy a dedicated Tor instance for my VPN and scraper app if >> it is really needed. > > Well, "needed" might be to strong here but it is certainly encouraged to > just relay Tor exit traffic with your server as whatever else you are > running and doing on that box might affect that exit relay which in turn > might impact (other) Tor users. Understand, thanks! -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 14:02 ` Ammar Faizi @ 2022-08-31 14:07 ` Ammar Faizi 2022-08-31 14:32 ` Louvian Lyndal 0 siblings, 1 reply; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 14:07 UTC (permalink / raw) To: Georg Koppen; +Cc: bad-relays, GNU/Weeb Mailing List, Louvian Lyndal On 8/31/22 9:02 PM, Ammar Faizi wrote: > On 8/31/22 8:37 PM, Georg Koppen wrote: >> Ammar Faizi: >>> On 8/31/22 2:25 PM, Georg Koppen wrote: >>>> In the meantime: could you elaborate on why you have the >>>> DNSPort/TransPort setup and those many SocksPorts configured? That's >>>> pretty unusual for a plan exit node setup and not needed. >>> >>> I run a VPN service that uses the transparent proxy and DNSPort in the >>> same server with the exit node. I also use the SOCKSPort to run my >>> scraper app. >>> >>> Side note: The amount of the traffic from the VPN and SOCKS is fairly >>> small, it shouldn't affect my exit node. >>> >>> Current usage: >>> >>> - A single small scrapper app (SOCKSPort). >>> >>> I configure many ports to get many exit IP addresses for >>> randomizing my identity. >> >> How is that supposed to work given that you only have one exit IP address >> (68.183.184.174)? > > You misunderstood my email. > > I use the SOCKSPort for scraping, this gives me random exit IP. It doesn't > use my exit IP for the scraper's outbound traffic. A simple way to use it > is like this (I expose the ports publicly, you can try it too): > > ```bash > > for i in {64500..64599}; do > curl -4 https://ipecho.net/plain --proxy socks5://68.183.184.174:$i; echo; > done; > > ``` > > It's slow, but it works. > >> And what are you actually scraping? > > The current is actively fetching https://lore.kernel.org/io-uring/new.atom > every 30 seconds. I don't see this as a big deal for the Tor network anyway. Just addition to that, previously, Louvian (in the CC) was scraping nhentai.net with those SOCKSPort(s). But it was not a massive traffic. >> One thing that makes me wonder is that we encounter more and more websites >> that deploy either total bans on Tor users or annoying CAPTCHAs etc. because >> of folks massively scraping their contents and because all simpler scraping >> solutions are already blocked. Are you aware of that issue? >> (FWIW: that is having a big impact on Tor's overall usability). > > Yes, I am aware of this issue. I have been bitten by annoying CAPTCHAs, block, > etc. when using Tor network. So I understand. > >>> - TeaVPN2 service (TransPort and DNSPort). >>> >>> I am writing a VPN software (Linux). It uses the transparent >>> proxy and DNS port only for accessing "*.onion" host. Only >>> 3 people using it so far, rarely used too. >>> >>> Is it fine doing that? >>> >>> I can deploy a dedicated Tor instance for my VPN and scraper app if >>> it is really needed. >> >> Well, "needed" might be to strong here but it is certainly encouraged to >> just relay Tor exit traffic with your server as whatever else you are >> running and doing on that box might affect that exit relay which in turn >> might impact (other) Tor users. > > Understand, thanks! > -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 14:07 ` Ammar Faizi @ 2022-08-31 14:32 ` Louvian Lyndal 2022-08-31 14:46 ` Georg Koppen 0 siblings, 1 reply; 23+ messages in thread From: Louvian Lyndal @ 2022-08-31 14:32 UTC (permalink / raw) To: Ammar Faizi; +Cc: Georg Koppen, bad-relays, GNU/Weeb Mailing List On 8/31/22 9:07 PM, Ammar Faizi wrote: > On 8/31/22 9:02 PM, Ammar Faizi wrote: >> On 8/31/22 8:37 PM, Georg Koppen wrote: >>> Ammar Faizi: >>>> On 8/31/22 2:25 PM, Georg Koppen wrote: >>>> Current usage: >>>> >>>> - A single small scrapper app (SOCKSPort). >>>> >>>> I configure many ports to get many exit IP addresses for >>>> randomizing my identity. >>> >>> How is that supposed to work given that you only have one exit IP address >>> (68.183.184.174)? >> >> You misunderstood my email. >> >> I use the SOCKSPort for scraping, this gives me random exit IP. It doesn't >> use my exit IP for the scraper's outbound traffic. A simple way to use it >> is like this (I expose the ports publicly, you can try it too): >> >> ```bash >> >> for i in {64500..64599}; do >> curl -4 https://ipecho.net/plain --proxy socks5://68.183.184.174:$i; echo; >> done; >> >> ``` >> >> It's slow, but it works. >> >>> And what are you actually scraping? >> >> The current is actively fetching https://lore.kernel.org/io-uring/new.atom >> every 30 seconds. I don't see this as a big deal for the Tor network anyway. > > Just addition to that, previously, Louvian (in the CC) was scraping nhentai.net > with those SOCKSPort(s). But it was not a massive traffic. I've stopped scraping it for a while, sometimes only running the scraper when I want to download a specific gallery number from nh. but yes, before it, the scraper was running a bit aggressively for content collecting purpose I'll stop doing that, I actually enjoy reading nh online more than downloading. Our scraping activity (on nh) didn't actually have a strong intention, it was just for fun collecting data and happy doing code. thanks, lvldll ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 14:32 ` Louvian Lyndal @ 2022-08-31 14:46 ` Georg Koppen 2022-08-31 14:58 ` Ammar Faizi 0 siblings, 1 reply; 23+ messages in thread From: Georg Koppen @ 2022-08-31 14:46 UTC (permalink / raw) To: Louvian Lyndal, Ammar Faizi; +Cc: bad-relays, GNU/Weeb Mailing List [-- Attachment #1.1: Type: text/plain, Size: 2132 bytes --] Louvian Lyndal: > On 8/31/22 9:07 PM, Ammar Faizi wrote: >> On 8/31/22 9:02 PM, Ammar Faizi wrote: >>> On 8/31/22 8:37 PM, Georg Koppen wrote: >>>> Ammar Faizi: >>>>> On 8/31/22 2:25 PM, Georg Koppen wrote: >>>>> Current usage: >>>>> >>>>> - A single small scrapper app (SOCKSPort). >>>>> >>>>> I configure many ports to get many exit IP addresses for >>>>> randomizing my identity. >>>> >>>> How is that supposed to work given that you only have one exit IP address >>>> (68.183.184.174)? >>> >>> You misunderstood my email. >>> >>> I use the SOCKSPort for scraping, this gives me random exit IP. It doesn't >>> use my exit IP for the scraper's outbound traffic. A simple way to use it >>> is like this (I expose the ports publicly, you can try it too): >>> >>> ```bash >>> >>> for i in {64500..64599}; do >>> curl -4 https://ipecho.net/plain --proxy socks5://68.183.184.174:$i; echo; >>> done; >>> >>> ``` >>> >>> It's slow, but it works. >>> >>>> And what are you actually scraping? >>> >>> The current is actively fetching https://lore.kernel.org/io-uring/new.atom >>> every 30 seconds. I don't see this as a big deal for the Tor network anyway. >> >> Just addition to that, previously, Louvian (in the CC) was scraping nhentai.net >> with those SOCKSPort(s). But it was not a massive traffic. > > I've stopped scraping it for a while, sometimes only running the > scraper when I want to download a specific gallery number from nh. but > yes, before it, the scraper was running a bit aggressively for content > collecting purpose > > I'll stop doing that, I actually enjoy reading nh online more than > downloading. Our scraping activity (on nh) didn't actually have a > strong intention, it was just for fun collecting data and happy doing > code. I see. Anyway, the DNS issue seems indeed resolved, thanks! I pushed a commit to get the badexit flag removed. Once a majority of directory authorities has picked it up your relay will be used as an exit again. (That might take a couple of hours at least, though) Thanks for running relays, Georg [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: Your TeaInside relay is failing to relay exit traffic 2022-08-31 14:46 ` Georg Koppen @ 2022-08-31 14:58 ` Ammar Faizi 0 siblings, 0 replies; 23+ messages in thread From: Ammar Faizi @ 2022-08-31 14:58 UTC (permalink / raw) To: Georg Koppen; +Cc: Louvian Lyndal, bad-relays, GNU/Weeb Mailing List On 8/31/22 9:46 PM, Georg Koppen wrote: > Louvian Lyndal: >> I'll stop doing that, I actually enjoy reading nh online more than >> downloading. Our scraping activity (on nh) didn't actually have a >> strong intention, it was just for fun collecting data and happy doing >> code. > > I see. Anyway, the DNS issue seems indeed resolved, thanks! I pushed a > commit to get the badexit flag removed. Once a majority of directory > authorities has picked it up your relay will be used as an exit again. > (That might take a couple of hours at least, though) > > Thanks for running relays, > Georg Blissful running Tor relays, thanks for the help! -- Ammar Faizi ^ permalink raw reply [flat|nested] 23+ messages in thread
end of thread, other threads:[~2022-08-31 14:58 UTC | newest] Thread overview: 23+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2022-08-25 6:58 Your TeaInside relay is failing to relay exit traffic Georg Koppen 2022-08-25 7:18 ` Ammar Faizi 2022-08-25 7:33 ` Louvian Lyndal 2022-08-25 7:48 ` Ammar Faizi 2022-08-25 9:27 ` Georg Koppen 2022-08-25 10:13 ` Ammar Faizi 2022-08-30 5:57 ` Ammar Faizi 2022-08-30 11:02 ` Georg Koppen 2022-08-30 11:14 ` Ammar Faizi 2022-08-30 14:12 ` Ammar Faizi 2022-08-31 0:13 ` Ammar Faizi 2022-08-31 6:37 ` Georg Koppen 2022-08-31 6:45 ` Ammar Faizi 2022-08-31 7:25 ` Georg Koppen 2022-08-31 7:48 ` Ammar Faizi 2022-08-31 12:49 ` Ammar Faizi 2022-08-31 13:25 ` Georg Koppen 2022-08-31 13:37 ` Georg Koppen 2022-08-31 14:02 ` Ammar Faizi 2022-08-31 14:07 ` Ammar Faizi 2022-08-31 14:32 ` Louvian Lyndal 2022-08-31 14:46 ` Georg Koppen 2022-08-31 14:58 ` Ammar Faizi
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox