Re: [tor-relays] Relay Or/Dirport Unreachable

2020-03-20 Thread Damian Johnson
> The Debian/Ubuntu instructions for doing this properly are listed at e.g.
> https://bugs.torproject.org/25890#comment:1
> Or I'll say the updated version here:
> """
> You might like to use the nyx relay monitor to watch your relay's
> activities from the command line. First, "sudo apt install nyx".
> Second, as the user that will be running nyx, run "sudo adduser $USER
> debian-tor" to add your user to the debian-tor group so it can reach
> Tor's controlsocket. Then log out and log back in (so your user is
> actually in the group), and run "nyx".
> """

Thanks Roger. Dumbish question but if we replace 'Then log out and log
back in' with 'run "reset" in your console' will that do the trick?

> We keep rearranging our docs and losing the instructions, and also
> Damian (the nyx developer) has been unenthusiastic about complicating
> nyx's docs with distro-specific instructions, so here we are.

Nope, I'm not against providing them. Just awaiting noob friendly
instructions for me to post.

Nyx itself can autodetect when tor's auth cookie is owned by
debian-tor and provide Debian specific instructions. If we provide the
following will it be accurate?

"""
To connect to tor we require one more step. Please run the following
and try nyx again...

% sudo adduser $USER debian-tor
% reset
"""
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay Or/Dirport Unreachable

2020-03-20 Thread Roger Dingledine
On Thu, Mar 19, 2020 at 07:57:53PM +0100, Mario Costa wrote:
> Or you could just add your user to the debian-tor group, so it will be able 
> to access the nyx control Unix socket.

This is definitely imo the better approach rather than sudo'ing your
nyx to the debian-tor user.

If you sudo to debian-tor, then your nyx gets access to all of your Tor
keys, and if nyx has a security flaw then it can do more damage.

Whereas if you add your own user to the debian-tor group, and then run nyx
as yourself, you are better isolated from pieces of Tor that nyx has no
business being able to access.

The Debian/Ubuntu instructions for doing this properly are listed at e.g.
https://bugs.torproject.org/25890#comment:1
Or I'll say the updated version here:
"""
You might like to use the nyx relay monitor to watch your relay's
activities from the command line. First, "sudo apt install nyx".
Second, as the user that will be running nyx, run "sudo adduser $USER
debian-tor" to add your user to the debian-tor group so it can reach
Tor's controlsocket. Then log out and log back in (so your user is
actually in the group), and run "nyx".
"""

We keep rearranging our docs and losing the instructions, and also
Damian (the nyx developer) has been unenthusiastic about complicating
nyx's docs with distro-specific instructions, so here we are.

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay Or/Dirport Unreachable

2020-03-20 Thread Mario Costa
Or you could just add your user to the debian-tor group, so it will be able to 
access the nyx control Unix socket.

> Il giorno 19 mar 2020, alle ore 19:55, li...@for-privacy.net ha scritto:
> 
> On 19.03.2020 02:28, Kathi wrote:
> 
>> NOTE: I know tor.Nyx should not be run as root, I get that. Tor/Nyx
>> are running as root. I don’t know how to use debian-tor as usr.
> 
> ~$ sudo -u debian-tor nyx -i 9051
> 
> .bashrc aliases for lazy admin ;-)
> 
> # My aliases for nyx (tor & tor-instances)
> alias nyx='sudo -u debian-tor nyx -i 9051'
> #alias nyx00='sudo -u _tor-00 nyx -i 9051'
> #alias nyx01='sudo -u _tor-01 nyx -i 9052'
> #alias nyx02='sudo -u _tor-02 nyx -i 9053'
> 
> If you have not yet installed or set up sudo:
> ~$ su -
> ~# apt install sudo
> ~# usermod -aG sudo user
> 
> -- 
> ╰_╯ Ciao Marco!
> 
> Debian GNU/Linux
> 
> It's free software and it gives you freedom!
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays