<div dir="ltr">Hi, so I am now auto upgrading tor using the method at 

<a href="https://trac.torproject.org/projects/tor/wiki/TorRelayGuide/DebianUbuntuUpdates">https://trac.torproject.org/projects/tor/wiki/TorRelayGuide/DebianUbuntuUpdates</a> <div><br></div><div>Upon testing, this is what I got.</div><div><br></div><div><br></div><div><br></div><div> Initial blacklisted packages: <br>Initial whitelisted packages: <br>Starting unattended upgrades script<br>Allowed origins are: []<br>Checking: firefox-esr ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: google-cloud-sdk ([<Origin component:'main' archive:'cloud-sdk-stretch' origin:'cloud-sdk-stretch' label:'cloud-sdk-stretch' site:'<a href="http://packages.cloud.google.com">packages.cloud.google.com</a>' isTrusted:True>])<br>Checking: google-compute-engine ([<Origin component:'main' archive:'google-compute-engine-stretch-stable' origin:'google-compute-engine-stretch-stable' label:'google-compute-engine-stretch-stable' site:'<a href="http://packages.cloud.google.com">packages.cloud.google.com</a>' isTrusted:True>])<br>Checking: google-compute-engine-oslogin ([<Origin component:'main' archive:'google-compute-engine-stretch-stable' origin:'google-compute-engine-stretch-stable' label:'google-compute-engine-stretch-stable' site:'<a href="http://packages.cloud.google.com">packages.cloud.google.com</a>' isTrusted:True>])<br>Checking: libavcodec57 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libavfilter6 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libavformat57 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libavresample3 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libavutil55 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libpostproc54 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libswresample2 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: libswscale4 ([<Origin component:'main' archive:'stable' origin:'Debian' label:'Debian-Security' site:'<a href="http://security.debian.org">security.debian.org</a>' isTrusted:True>])<br>Checking: python-google-compute-engine ([<Origin component:'main' archive:'google-compute-engine-stretch-stable' origin:'google-compute-engine-stretch-stable' label:'google-compute-engine-stretch-stable' site:'<a href="http://packages.cloud.google.com">packages.cloud.google.com</a>' isTrusted:True>])<br>Checking: python3-google-compute-engine ([<Origin component:'main' archive:'google-compute-engine-stretch-stable' origin:'google-compute-engine-stretch-stable' label:'google-compute-engine-stretch-stable' site:'<a href="http://packages.cloud.google.com">packages.cloud.google.com</a>' isTrusted:True>])<br>pkgs that look like they should be upgraded: <br>Fetched 0 B in 0s (0 B/s)                                                                                                            <br>fetch.run() result: 0<br>blacklist: []<br>whitelist: []<br>No packages found that can be upgraded unattended and no pending auto-removals</div><div><br></div><div>What I am attempting to do is automatically install new tor versions when they are released. Will this do that automatically? How can I keep this process running? Thanks.</div><div><br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr">--Keifer</div></div></div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, May 24, 2019 at 12:38 AM Conrad Rockenhaus <<a href="mailto:conrad@rockenhaus.com">conrad@rockenhaus.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div dir="auto">Hello,</div></div><div dir="auto"><br></div><div dir="auto">My bust, confirmation bias.</div><div dir="auto"><br></div><div dir="auto">Thanks,</div><div dir="auto"><br></div><div dir="auto">Conrad</div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, May 23, 2019 at 11:45 PM teor <<a href="mailto:teor@riseup.net" target="_blank">teor@riseup.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
> On 24 May 2019, at 14:08, Conrad Rockenhaus <<a href="mailto:conrad@rockenhaus.com" target="_blank">conrad@rockenhaus.com</a>> wrote:<br>
> <br>
> In April 2018 Google released an update that caused VPNs and Tor services to stop working on GCE and App Engine. It was a long planned network update.<br>
> <br>
> The following ticket refers: <a href="https://trac.torproject.org/projects/tor/ticket/25804" rel="noreferrer" target="_blank">https://trac.torproject.org/projects/tor/ticket/25804</a><br>
<br>
That ticket is about domain-fronting, which is used by meek and snowflake bridges.<br>
But these issues do not affect other relays.<br>
<br>
Do you have any information about Google blocking relays?<br>
<br>
T<br>
_______________________________________________<br>
tor-relays mailing list<br>
<a href="mailto:tor-relays@lists.torproject.org" target="_blank">tor-relays@lists.torproject.org</a><br>
<a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays" rel="noreferrer" target="_blank">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</a><br>
</blockquote></div></div>-- <br><div dir="ltr" class="gmail-m_-665191358810718968gmail_signature">Conrad Rockenhaus<br><a href="https://www.rockenhaus.com" target="_blank">https://www.rockenhaus.com</a><br>Cell: (254) 292-3350<br>Fax: (254) 875-0459</div>
_______________________________________________<br>
tor-relays mailing list<br>
<a href="mailto:tor-relays@lists.torproject.org" target="_blank">tor-relays@lists.torproject.org</a><br>
<a href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays" rel="noreferrer" target="_blank">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</a><br>
</blockquote></div>