[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] serious gap in 'chroot' documentation



Newer versions of 'openssl' require access to

   /proc/sys/kernel/random 

and so the line

   /proc/sys/kernel/random /chroot_tor/proc/sys/kernel/random auto bind 0 0

must be added to the

   /etc/fstab

file or the command

   mount -o bind /proc/sys/kernel/random /chroot_tor/proc/sys/kernel/random

must be run from somewhere.  Keep in mind
that issuing the 'mount' more than once
causes nested overly mounts rather than
doing nothing, so the 'fstab' approach
is best.

Obviously the directories

   proc/sys/kernel/random

must be created in the 'chroot' jail tree.

----------------

This problem will appear when 'tor' attempts
to roll-over it's key after several days.
Took significant effort of figure out
what happened as 'tor' dies without
comment.

It appears that if 'tor' fails in the middle
of a re-key operation, the node name and state
is lost entirely and the relay must rebuild
it's reputation from scratch with a new
name.  Quite vexing.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays