[tor-relays] Setting up Tor Bridge

Sebastian Urbach sebastian at urbach.org
Mon Mar 17 18:28:34 UTC 2014


Hi,

First things first. 0.2.2 is quite old, you should consider 0.2.4 if 
possible. Next thing is that you have multiple SocksPort entries in your 
torrc. You just need one, remove the others. Is it just 
ServerTransportPlugin without any further specification ?


On March 17, 2014 7:02:30 PM Eric Giannini <eric.giannini at yahoo.com> wrote:

> Hi I would like to set up a Tor Bridge but I have run into a few problems. 
> Can anyone give me a few recommendations on what to do? Raising maximum 
> number of filedescriptors (ulimit -n) to 32768.
> Starting tor daemon: tor...
> ABORTED: Tor configuration invalid:
> Mar 17 10:56:35.546 [notice] Tor v0.2.2.35 (git-73ff13ab3cc9570d). This is 
> experimental software. Do not rely on it for strong anonymity. (Running on 
> Linux i686)
> Mar 17 10:56:35.548 [warn] Option 'SocksPort' used more than once; all but 
> the last value will be ignored.
> Mar 17 10:56:35.548 [warn] Failed to parse/validate config: Unknown option 
> 'ServerTransportPlugin'.  Failing.
> Mar 17 10:56:35.548 [err] Reading config failed--see warnings above.
>
>
>
>
> ________________________________
>  От: Tobias Markus <tobias at markus-regensburg.de>
> Кому: Sebastian Urbach <sebastian at urbach.org> Копия: 
> tor-relays at lists.torproject.org Отправлено: понедельник, 17 марта 2014 10:37
> Тема: Re: [tor-relays] New tor relay, some questions
> >
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi Sebastian,
>
> now that you say it -- yes, it seems we both choose the same quote :D
> (Really, I didn't copy you. I've read it somewhere else a while ago
> and adopted it because I liked it. But really, you didn't read
> hundreds of quote books just to suddenly stumble on Franklin's quote,
> did you?)
>
> But another thing: Do you still need participating relays for TTTT?
>
> Tobias
>
> Am 17.03.2014 16:24, schrieb Sebastian Urbach:
> > Hi,
> > Great that it finally worked out, welcome to thd
> > brother/sisterhood. And btw. what are you doing with my mail
> > signature ? That seems to be the more important issue to me ;-)))
> > > Hi,
> > just wanted to inform you that I could resolve the issue simply by 
> deleting the tor data folder (thus getting a new fingerprint).
> > PS: I actually replied to Bryan, but forgot to CC tor-relays. Sadly
> > I can't find the message anymore, otherwise I would have resent
> > it.
> > On 03/13/2014 11:08 PM, Tobias Markus wrote:
> >> Hi, sorry for replying rather late! In response to 1): Thinking
> >> about it, I think the main (possible) problem is that my MTA is
> >> rejected by SMTP servers it connects to because of a Tor
> >> blacklist. Is this probable? Has someone got experience running a
> >> complete mail system and a (public) Tor relay on the same
> >> host/IP? About 2): That is indeed very unfortunate, but at the
> >> same time a reason to start contributing to Tor! (Sadly, I am
> >> presently occupied by various other projects, but I think Tor is
> >> definitely worth a 'visit'.) Now about something else. I recently
> >> had to restart my server for unrelated reasons. (The relay had
> >> the Guard and Stable flag at that time.) I sadly forgot to add
> >> the Tor service to the default runlevel, so it was not started at
> >> boot time. I went to bed thinking everything was OK and was only
> >> able to start Tor about 12 hours later. Unfortunately, my relay
> >> got no flags since then -- not even "Running"! The Tor consensus
> >> website confirms this: Three Auths voted for all previous/normal
> >> flags except Guard, the others only for Valid and V2Dir leading
> >> to my relay getting no flags! I cannot really explain this to myself. 
> What is going on here? Tobias On Sun, Mar 02, 2014 at
> >> 07:32:17PM +0100, Moritz Bartl wrote:
> >>> On 03/02/2014 04:06 PM, Tobias Markus wrote:
> >>>> I've been running a new tor relay for about a week now
> >>> Great. Thank you!
> >>> >>>> 1) I plan on running other services than tor on my server,
> >>>> including a (private) mail system. Other than the general
> >>>> possibility of tor having security holes and my server (and
> >>>> its IP address) being public and thus possibly target of
> >>>> attacks, are there security implications I should consider?
> >>> Unfortunately, many sites block Tor relay IPs regardless of
> >>> their exit policy. So, if you share one IP between the relay
> >>> and other services, your might be impacted. This is especially
> >>> true for exit relays.
> >>> >>>> 2) I would be interested to eventually run a
> >>>> directory/bandwith authority, so I read about them in [1] and
> >>>> [2], but the places seemed a bit odd (hidserv-perf branch in
> >>>> tor svn/torflow repo) so I thought I better ask here: Would I
> >>>> really just have to follow the steps in [1] to become a
> >>>> dirauth? Is there currently a need for auths, would contribution be 
> welcomed?
> >>> The offer is well appreciated. In the current design,
> >>> directory authorities and bandwidth authorities play a very
> >>> special role. There are several ideas on how to improve the
> >>> situation and then open participation to the broader community,
> >>> but for the time being, authorities can only be run by people
> >>> very close to the core dev team.
> > - -- Tobias Markus
>
> "They who would give up essential Liberty, to purchase a little
> temporary Safety, deserve neither Liberty nor Safety."
>         -- Benjamin Franklin (1706-1790)
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.20 (MingW32)
>
> iEYEARECAAYFAlMnMtoACgkQAO6N0EYmC9a66QCfSE+zXecw9aFJpOx7NNwnBnhZ
> imoAn0rbxsbu+NeiiJnxz82TUFe3vlWg
> =ZBIk
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




More information about the tor-relays mailing list