On 2014-12-16 12:05, teor wrote:
From: Richard Johnson
Modify /etc/tor/torrc2, /etc/tor/torrc3, ... so they refer to their
appropriate private DataDirectory and PidFile, listen on the appropriate
ports and IP addresses, and have the appropriate exit policies. (Remember
that the public Tor netw
> From: Richard Johnson
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Platform diversity in Tor network [was:
> OpenBSD doc/TUNING]
>
> On 2014-11-05 10:47, Libertas wrote:
>> I appreciate your interest! Also, I hope I'm not speaking w
On 2014-11-05 10:47, Libertas wrote:
I appreciate your interest! Also, I hope I'm not speaking with too
much authority. If anyone here has more OpenBSD experience than me,
please send addendums or corrections.
Maybe call this an addendum? Some version of the following work in progress
is going
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/05/2014 04:04 AM, grarpamp wrote:
> On Tue, Nov 4, 2014 at 12:25 PM, Libertas
> wrote:
>> I think it would be a good idea to add OpenBSD to doc/TUNING
>> because [...] promoting OpenBSD relays benefits the Tor network's
>> security.
>
> Absol
On Wed, Nov 5, 2014 at 11:20 AM, Niklas Kielblock wrote:
> Is there much of a difference between setting up Tor on OpenBSD vs. Linux or
> other Unix(like) systems?
Tor itself? ...
https://dist.torproject.org/
tar -xzf torball.tar.gz
cd tor ; ./configure ; make ; cd src ; ./tor
Nope, absolutely
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
>> My OpenBSD node is currently on 0.2.5.10.
>
> Which is from the -current ports tree. On -stable it's
> tor-0.2.4.23 but I doubt that you want to run your relay on
> -current.
Huh? I compiled it from non-port source because the port at the time
w
On Wed, 05 Nov 2014 15:17:29 -0500, Libertas
wrote:
> My OpenBSD node is currently on 0.2.5.10.
Which is from the -current ports tree. On -stable it's tor-0.2.4.23
but I doubt that you want to run your relay on -current.
> If compilation is considered tedious, though, I or someone like me
> cou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I don't want to spam this list with OS discussion, but I think yours
is an important point, so I'll give my perspective briefly.
This is one of the main aspects of OpenBSD that make it better suited
for firewalls etc. than for desktops. One of the m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I don't want to spam this list with OS discussion, but I think yours
is an important point, so I'll give my perspective briefly.
This is one of the main aspects of OpenBSD that make it better suited
for firewalls etc. than for desktops. One of the m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/05/2014 08:20 AM, Niklas Kielblock wrote:
> Is there much of a difference between setting up Tor on OpenBSD
> vs. Linux or other Unix(like) systems?
Not really. Partitioning the disk is a little different, but that's
about it. I'll admit to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
It's a little bit of both. The OpenBSD port and package of Tor were
out of date last time I checked, so the first difference is that you
want to build from source. If you do so, though, you have to make the
unprivileged user yourself. This is covered
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
> You're wrong, OpenBSD's documentation (and other BSDs' too) is
> awesome. I learn to use Unix systems with OpenBSD.
I never said the docs are bad - one of my previous emails mentioned
how great the man pages are. What I meant was that there are le
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Thanks for the quick response, Zack!
I'm hesitant to give too much advice, as I've been using OpenBSD for
all of four months, and I've been a small-time sysadmin for all of
three years. So, take all this with a grain of salt.
My ultimate concern is
On Wed, 05 Nov 2014 10:35:01 -0500, Libertas
wrote:
> Agreed. Thanks for pulling together the statistics, too. However, I'd
> like to make an argument for OpenBSD specifically.
>
> It isn't very inviting for people
> that don't know at least intermediate Unix.
You're wrong, OpenBSD's documentat
On Wed, Nov 5, 2014 at 11:20 AM, Niklas Kielblock wrote:
> Is there much of a difference between setting up Tor on OpenBSD
> vs. Linux or other Unix(like) systems?
>
> Or is this just about setting up OpenBSD in general, or additional security
> for relays (disk encryption, memory protection) whos
Is there much of a difference between setting up Tor on OpenBSD vs.
Linux or other Unix(like) systems?
Or is this just about setting up OpenBSD in general, or additional
security for relays (disk encryption, memory protection) whose use isn't
common on most general servers?
>
> I would love
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/05/2014 10:35 AM, Libertas wrote:
> I would love to start a larger conversation about running Tor on
> OpenBSD. I've been considering making a guide describing the
> process. However, that violates the OpenBSD philosophy to some
> extent. They
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Agreed. Thanks for pulling together the statistics, too. However, I'd
like to make an argument for OpenBSD specifically.
I openly acknowledge that, at least for non-experts (and I'm one of
them), OpenBSD isn't ideal for many uses. It isn't used much
On Tue, Nov 4, 2014 at 12:25 PM, Libertas wrote:
> I think it would be a good idea to add OpenBSD to doc/TUNING because [...]
> promoting OpenBSD relays benefits the Tor network's security.
Absolutely. Not just due to OpenBSD's security positioning, but
moreso from network diversity. Windows is i
19 matches
Mail list logo