[tor-relays] Tor Relay Operator Poll (closes on 2023-05-30)

Hi,

want to help shape the future of the Tor network?

Here is a poll for you:

It is open until 2023-05-30.

Only operators that did run relays/bridges before 2023-04-01
(and are still running) may participate.
An AROI or a relay fingerprint (or hashed bridge fingerprint)
is required to participate.

This poll happens in the context
of working on a network health proposal.

The goal of this poll is

* to gather input from non-malicious relay operators
* to help make pragmatical design decisions for an upcoming network health proposal
* to ensure it remains practical to implement for relay operators
* to get a feeling on whether it has a chance to see actual real world adoption
* to get a feeling on whether relay operators would participate in a web of trust
* to get a feeling on what type of rules relay operators would find acceptable

In the light of malicious entities this
poll has been send to large relay operators a few days ago
so they can claim their submission first.

Their feedback was also used to improve and extend the poll,
if you submitted it already once you can submit it again
but ensure to submit the same random string at the end as you
did the first time so they can be linked.

kind regards,
nusenu

···

--
https://nusenu.github.io
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Thanks for this initiative.

I am working on adding my AROI but ran into a minor snag.

The torrc man page (which btw i could not find on the torproject website) says the ContactInfo line can only contain an email address, though by example we have known for years it also can have a GPG key fingerprint. Now the guide for setting up AROI says add these things:

url:example.com proof:uri-rsa ciissversion:2 |

Maybe the whole line is arbitrary text. Anyway is there an updated torrc spec somewhere?

···

On 2023-05-11 15:57, nusenu wrote:

Hi,

want to help shape the future of the Tor network?

Here is a poll for you:

CryptPad

It is open until 2023-05-30.

Only operators that did run relays/bridges before 2023-04-01
(and are still running) may participate.
An AROI or a relay fingerprint (or hashed bridge fingerprint)
is required to participate.

This poll happens in the context
of working on a network health proposal.

The goal of this poll is

* to gather input from non-malicious relay operators
* to help make pragmatical design decisions for an upcoming network health proposal
* to ensure it remains practical to implement for relay operators
* to get a feeling on whether it has a chance to see actual real world adoption
* to get a feeling on whether relay operators would participate in a web of trust
* to get a feeling on what type of rules relay operators would find acceptable

In the light of malicious entities this
poll has been send to large relay operators a few days ago
so they can claim their submission first.

Their feedback was also used to improve and extend the poll,
if you submitted it already once you can submit it again
but ensure to submit the same random string at the end as you
did the first time so they can be linked.

kind regards,
nusenu

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Hi,

>url:example.com proof:uri-rsa ciissversion:2 |

Maybe the whole line is arbitrary text. Anyway is there an updated torrc spec somewhere?

Correct, the ContactInfo is basically an arbitrary string.
tor's man page does not strictly define the ContactInfo string either.

kind regards,
nusenu

···

--
https://nusenu.github.io
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Hi skankhunt42,

I replied to your email, I received on 2023-05-21
on the same day but your DANE configuration appears broken so
mail servers implementing DANE will fail to deliver emails to you

Undelivered Mail Returned to Sender:

                   The mail system

<admin@skankhunt42.pw>: Server certificate not verified

kind regards,
nusenu

···

--
https://nusenu.github.io
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays