[tor-relays] New relay operator. Basic security practices?

C S yawnbox at gmail.com
Wed Mar 4 20:01:55 UTC 2015


You may wish to revise your guide to better SSH.

https://stribika.github.io/2015/01/04/secure-secure-shell.html

Particularly, running it through a Tor HS.

Other ideal reading is the BetterCrypto guide:
https://bettercrypto.org/static/applied-crypto-hardening.pdf

Cheers



On Wed, Mar 4, 2015 at 11:36 AM, Libertas <libertas at mykolab.com> wrote:
> On 03/04/2015 02:05 PM, relay_acab at openmailbox.org wrote:
>> Hello all. I'm running a new relay, relayacab, at apexy in DE on a
>> minimal Debian 7 OS. Is there a best practices guide for basic security
>> setup? This is my first time operating a remote machine, running a
>> relay, and having any public service to harden. So I'd really like to
>> take this opportunity to do this the right way and continue on a
>> productive path in supporting the tor network.
>> Thanks!
>> +-- relayacab
>
> I wrote this recently:
>
> https://gist.github.com/plsql/49e642d5bce835df2946
>
> Thanks so much for considering security! It's a very important and often
> neglected aspect of Tor relay operation.
>
> Let me know what you think of the document.
>
>         Libertas
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>


More information about the tor-relays mailing list