Re: [tor-relays] Linux kernel vulnerability

2016-10-23 Thread Tristan
Rebooting also makes sure updates are applied correctly. If a shared library updates, the old version is still in use until whatever program using it stops, and the new version is loaded on the next run. On Oct 23, 2016 10:07 PM, "Duncan Guthrie" wrote: > Hi folks, > > I

Re: [tor-relays] Linux kernel vulnerability

2016-10-23 Thread Duncan Guthrie
Hi folks, I think this is a very extreme and unnecessary solution. While it is good to keep relays up, this may be unreliable. It is good to perform maintenance regularly, and reboots are often best. Also, it appears to be proprietary technology. I would not advise proprietary technology on a

Re: [tor-relays] Linux kernel vulnerability

2016-10-23 Thread nusenu
> Would it be acceptable to configure unattended-upgrades to automatically > reboot the system when required? I already have it configured to check for > and install all updates to Ubuntu and Tor once a day, but I still need to > manually reboot to apply kernel upgrades. I think

Re: [tor-relays] Linux kernel vulnerability

2016-10-23 Thread Petrusko
I don't know if it's possible to load a new kernel without rebooting... But I think people who doesn't want to reboot because feared of a bad reboot, loose SSH or anything else... If OS's teams are updating a system for security, I prefer a bad reboot (backups are done before!) than a system with

Re: [tor-relays] CentOS 7 Packages

2016-10-23 Thread nusenu
> I have one relay on CentOS 6 and one on CentOS 7. The one running CentOS 7 > hasn't had the 0.2.8.8 update yet and so is still running 0.2.8.7. The one > running CentOS 6 has had the latest update. by "latest update" you mean 0.2.8.9? Where do you get your tor packages from? If you got tor