[tor-dev] Experimenting with private tor setup

teor teor2345 at gmail.com
Thu Apr 23 11:27:40 UTC 2015

> Date: Wed, 22 Apr 2015 23:14:07 -0400
> From: CJ Ess <zxcvbn4038 at gmail.com>
> I think that just leaves a couple questions for now:
> - I know the directory authority's certificate needs to be
> renewed periodically (looks like 12 months default). Since it asked for a
> password that is something I need to do manually then send a HUP, correct?
> Later on I'll try to hack generating a cert with days or hours of time just
> to see what happens, but would like to know what the correct way to handle
> it is.

Yes, you will need to generate new authority certificates when they expire.

Look at "man tor-gencert" for more details - you may be able to enter a blank password, or generate a new certificate and send a HUP on a cron job. Alternately, look at the chutney source code for how it's done there. (This isn't my area of expertise.)

> - All of my routers have done the bandwidth tests, but I see this warning
> on the DAs with each vote:
> Apr 22 22:39:41.000 [warn] Consensus with empty bandwidth: G=0 M=5 E=0
> D=243 T=248
> Is this something that will fill out as the uptime of the instances
> increase? Or is this something I should look into?

I think you need to run a separate bandwidth authority to get bandwidths in your consensus. This probably isn't necessary for your purposes, as your instances are all on the same host.

It's also not something that chutney does, and chutney networks function fine.


teor2345 at gmail dot com
pgp 0xABFED1AC

teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150423/1911b669/attachment.html>

More information about the tor-dev mailing list