Re: [tor-relays] Relay Or/Dirport Unreachable
> The Debian/Ubuntu instructions for doing this properly are listed at e.g. > https://bugs.torproject.org/25890#comment:1 > Or I'll say the updated version here: > """ > You might like to use the nyx relay monitor to watch your relay's > activities from the command line. First, "sudo apt install nyx". > Second, as the user that will be running nyx, run "sudo adduser $USER > debian-tor" to add your user to the debian-tor group so it can reach > Tor's controlsocket. Then log out and log back in (so your user is > actually in the group), and run "nyx". > """ Thanks Roger. Dumbish question but if we replace 'Then log out and log back in' with 'run "reset" in your console' will that do the trick? > We keep rearranging our docs and losing the instructions, and also > Damian (the nyx developer) has been unenthusiastic about complicating > nyx's docs with distro-specific instructions, so here we are. Nope, I'm not against providing them. Just awaiting noob friendly instructions for me to post. Nyx itself can autodetect when tor's auth cookie is owned by debian-tor and provide Debian specific instructions. If we provide the following will it be accurate? """ To connect to tor we require one more step. Please run the following and try nyx again... % sudo adduser $USER debian-tor % reset """ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay Or/Dirport Unreachable
On Thu, Mar 19, 2020 at 07:57:53PM +0100, Mario Costa wrote: > Or you could just add your user to the debian-tor group, so it will be able > to access the nyx control Unix socket. This is definitely imo the better approach rather than sudo'ing your nyx to the debian-tor user. If you sudo to debian-tor, then your nyx gets access to all of your Tor keys, and if nyx has a security flaw then it can do more damage. Whereas if you add your own user to the debian-tor group, and then run nyx as yourself, you are better isolated from pieces of Tor that nyx has no business being able to access. The Debian/Ubuntu instructions for doing this properly are listed at e.g. https://bugs.torproject.org/25890#comment:1 Or I'll say the updated version here: """ You might like to use the nyx relay monitor to watch your relay's activities from the command line. First, "sudo apt install nyx". Second, as the user that will be running nyx, run "sudo adduser $USER debian-tor" to add your user to the debian-tor group so it can reach Tor's controlsocket. Then log out and log back in (so your user is actually in the group), and run "nyx". """ We keep rearranging our docs and losing the instructions, and also Damian (the nyx developer) has been unenthusiastic about complicating nyx's docs with distro-specific instructions, so here we are. --Roger ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay Or/Dirport Unreachable
Or you could just add your user to the debian-tor group, so it will be able to access the nyx control Unix socket. > Il giorno 19 mar 2020, alle ore 19:55, li...@for-privacy.net ha scritto: > > On 19.03.2020 02:28, Kathi wrote: > >> NOTE: I know tor.Nyx should not be run as root, I get that. Tor/Nyx >> are running as root. I don’t know how to use debian-tor as usr. > > ~$ sudo -u debian-tor nyx -i 9051 > > .bashrc aliases for lazy admin ;-) > > # My aliases for nyx (tor & tor-instances) > alias nyx='sudo -u debian-tor nyx -i 9051' > #alias nyx00='sudo -u _tor-00 nyx -i 9051' > #alias nyx01='sudo -u _tor-01 nyx -i 9052' > #alias nyx02='sudo -u _tor-02 nyx -i 9053' > > If you have not yet installed or set up sudo: > ~$ su - > ~# apt install sudo > ~# usermod -aG sudo user > > -- > ╰_╯ Ciao Marco! > > Debian GNU/Linux > > It's free software and it gives you freedom! > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays