# Tor Relay

I’m a huge fan of both privacy and cool technology, so it goes without saying that I’m also a huge fan of the Tor Project.

Tor is free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis.

Tor works by routing your heavily encrypted traffic through a random selection of Tor relays. Each relay peels off a layer of encryption (hence the onion thing) and then passes it on to the next relay before it eventually connects to the target site. The data being returned to you takes a similar path with similar layered encryption. The cool thing is that, unlike VPN providers, none of the Tor relays have enough information to answer the questions: a) who you are, b) what you are connecting to / doing. This makes it a far more anonymous system than most VPN providers which require you to trust the VPN operator (who certainly can monitor your traffic and who definitely knows who you are).

The strength (and speed) of the Tor network is dependent on the relays which are those machines which pass your data around. The more relays there are run by different people, the less likely it is that the random path your data takes is going through a path operated by a single entity who would then be able to deanonymize you (since they can follow your data through each hop).

In occurred to me that I have a fairly beefy server that’s primarily serving this blog (static pages, yay!). It is extremely underutilized, so I decided to install Tor and set it up as a relay.

## Installing Tor

My server is running Ubuntu 18.04. The Tor package that is in the Ubuntu repositories is super old so it’s necessary to pull in the Tor repositories instead.

$sudo apt install apt-transport-https$ echo "deb https://deb.torproject.org/torproject.org/ $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/tor.list$ echo "deb-src https://deb.torproject.org/torproject.org/ $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/tor.list$ wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | sudo apt-key add -
$apt update$ apt install nyx tor deb.torproject.org-keyring


## Configuring Tor as a Relay

Once the software is installed, the Tor service is configured via. /etc/tor/torrc.

My bandwidth cap is 1TB / month which, if my math is correct, gives me about 400,000 Bytes/sec sustained. Outside of Tor, the traffic to this server per month is negligible.

Here is my sample /etc/tor/torrc file.

Log notice file /var/log/tor/notices.log
ORPort 9001
DirPort 9030 # what port to advertise for directory connections
Address wilbur.zeos.ca # hostname for this server
Nickname zeos # nickname for this server in directory
RelayBandwidthRate 400 KBytes  # Throttle traffic to 400KB/s (approx 1TB / mo)
RelayBandwidthBurst 1000 KBytes # But allow bursts up to 1000KB
ContactInfo 0x063B48690F1D6F12 Tor Admin <[email protected]>
ExitRelay 0


$systemctl tor restart  Once it’s up and running… There is a pretty cool tool called Nyx that you can run on the Tor node that shows real-time usage and log messages. Like so: $ sudo -u debian-tor nyx