If I run rm -f /var/lib/tor/keys/* 2>&1 >> /home/[me]/reboot.txt
it doesn't error (as long as I run it with sudo) but it also doesn't do anything, checking *keys *shows it still contains files. I read the RAM disk tutorial that is linked on the Tor Relay Security page, what I don't understand is how the keys are created and stored solely in RAM. When launching tor for the first time (say "sudo apt-get purge Tor" then "sudo apt-get install Tor") the *keys* folder does not exist. Would I just mount the whole /var/lib/tor folder in RAM instead or is there a better way to do it? On Wed, Apr 22, 2015 at 6:06 AM, Toralf Förster <[email protected]> wrote: > On 04/22/2015 06:29 AM, CJ Barlow wrote: > > @reboot rm -f /var/lib/tor/keys/* && echo "keys gone!" > > > /home/[me]/reboot.txt 2>&1 > > What's about > > rm -f /var/lib/tor/keys/* 2>&1 >> /home/[me]/reboot.txt > > to see the error msg ? > > -- > Toralf > pgp key: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 0076 E94E > -- > "; the past is all dirty and cruel in the modern popular imagination, with > the exception of the Romans, who are just cruel" > Ian Mortimer, 2008, "The Time Traveller's Guide to Medieval England" > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays >
_______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
