Enable the ControlPort in your torrc file by uncommenting it, and setup authentication to the ControlPort in one of two ways: HashedControlPassword or CookieAuthentication.
To enable CookieAuthentication, simply remove the hash sign in front of that line. I can't remember how to do HashedControlPassword off the top of my head, but can find the answer should you like.
Arm isn't typically run with a config file, but can be with --config-path if I remember correctly.
Tor-arm's readme: https://gitweb.torproject.org/arm.git/blob/HEAD:/README On Apr 19, 2014 1:42 PM, "kbesig" kbesig@socal.rr.com wrote:
Getting closer: I can run tor arm as root, but get this error as <user>: ~$ sudo -u debian-tor arm [sudo] password for <user>: Connection refused. Is the ControlPort enabled?
Where is arm's config?
On 04/19/2014 09:19 AM, kbesig wrote:
Sorry for the spam in advance..
Install of tor-arm went well enough, no error msg's.
~$ sudo -u debian-tor arm
Any ideas??
On 04/19/2014 08:16 AM, irregulator@riseup.net wrote:
On 04/19/2014 05:42 PM, kbesig wrote:
My relay became one of the "rejected" since the heartbleed vulnerability surfaced so I reformatted my XP relay and did a fresh Ubuntu 14.04 LTS install. Built vidalia-0.2.21 from source using:
I would suggest completely avoiding (the burden of) Vidalia. You can
just install Tor as standalone daemon : https://www.torproject.org/docs/debian.html.en
If you want an interface to inspect your relay's traffic (the reason you wanted Vidalia?), I suggest tor-arm (provided you've already added Tor's repositories):
apt-get install tor-arm
then run :
sudo -u debian-tor arm
Cheers, Alex _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays