Meet Nyx, a Command-Line Tor Relay Monitor

 

Never let it be said that we don’t give you a choice of ways to interact with Tor data. This month, Damian Johnson, a long-time Tor volunteer, updated a tool that provides real-time information about your relay. Named for the Greek goddess of night, Nyx is a dead-simple tool with data on bandwidth use, connections, logs, and more.

Relay operators can use Nyx to make sure their relay is functioning properly. At a glance, the tool tells them how much bandwidth the relay is using, whether their CPU is constrained, or if something’s wrong and their relay is failing to establish a connection. In keeping with Tor’s commitment to privacy, Nyx scrubs information about user identities and exit connections.

A screenshot of Nyx in action.

The tool formally known as...

If this all sounds familiar, that’s because this tool used to be called arm. Damian's overhauled the tool, redesigning the tool from the ground up. On his blog, he gives a breakdown of what’s new, including:

  • Python 3.x support
  • Bandwidth graph now prepopulates when you start up, so you have a graph right away
  • Connections are now available without toggling DisableDebuggerAttachment in your torrc
  • Support for showing IPv6 connections

Check out the Nyx page to learn more and get the tool.

insecure connection
http://blog.atagar.com/nyx-release-2-0/
no https no link !

and what about dns ?
afaik google (and others that i should not name ... ) are not recommended

and what about a contact between relay operator/client ? this tool is like monitoring/reviewing/surveying/analyzing the connection ... so we are un-anonymizing in a way no ?

of course, it is a wonderful tool ... for hackers:testers ... does it help for censoring/shutting down/ remote control ... ?

For specialist only.

Hi m_m.

> insecure connection

Yup. As mentioned in my other reply I should get around to this. It's an old blog and I've been busy writing Nyx. :P

> and what about dns ?
> afaik google (and others that i should not name ... ) are not recommended

Sorry, not sure I follow this part. What in particular are your DNS concerns?

> and what about a contact between relay operator/client ? this tool is like monitoring/reviewing/surveying/analyzing the connection ... so we are un-anonymizing in a way no ?

Nope. Nyx scrubs any sensitive information (such as exit and client connections). Information it shows is pretty safe.

> of course, it is a wonderful tool ... for hackers:testers ... does it help for censoring/shutting down/ remote control ... ?

Again, not sure I understand the question. You can use Nyx to reconfigure Tor if that's your question.

> Sorry, not sure I follow this part. What in particular are your DNS concerns?
does a relay use dns ? does tor use dns ? does a client use dns ?
dns : relays are using dns _ some are not welcome , it is under the responsibility of the relay operator to pick a 'safe' one _ but how to reject a bad temporary choice as client & as relay operator ; i mean it is not supervised by something or someone else ; all is based on a relay: tor configuration.
Does it exist a command-line option rejecting/blacklisting a 'not recommended dns' or a general hidden/masked supervisor like a table updated every day/hour ?

> Again, not sure I understand the question. You can use Nyx to reconfigure Tor if that's your question.
do you interact using nyx on the quality of the connection ?
do you interfere in the speed, the bottleneck, the choice of the other relays ?
do you control this part (yours as relay operator) in a way that you could redirect the flux or start/stop a tor instance (located at the home client) on demand ?
i understand nix like a sophisticated security tool and like all these similar tools ; it sounds like a big brother feature.
The client or another control layer should be alerted of a ... connection surveyed by nyx because it is done in real time : too many things are based on trust , in this case the relay operator who could be every one every where ... even the worst.
nix could be improved adding an alert/avert when using a bad dns
nix could be improved adding its own setting/running only in preview not in real time.

Anonymous

November 08, 2017

Permalink

Please check this node
137.205.124.35
It always send something.
Tor nodes should detect and disconnect abnormal nodes.

no, every one can run a node : you cannot control the others or you are on the other side , a proprietary tool for controlling the others which the consequences are none security , none anonymity.
a false idea (windows/microsoft usa puerile idea ) runs & runs again : secure = controlled = known = nothing to hide = authorized = clean = citizen = vip = masked/opened = white ? innocent ?
the more you are controlled the less you are in security : that is the real life.
* if you detect something abnormal, you can report it and maybe, it will be shut down after a serious investigation. it should be very suspicious to do that automatically. it can be a leak, a hack a bad operator a misconfiguration a bad update an unknown bug or an electric/cable problem ...

Join the discussion...

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

3 + 1 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.