[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: tor-ramdisk 20101011 released for i686 only
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: tor-ramdisk 20101011 released for i686 only
- From: Anders Andersson <pipatron@xxxxxxxxx>
- Date: Tue, 12 Oct 2010 05:25:02 +0200
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 11 Oct 2010 23:25:14 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:content-type; bh=EeifFxs5sQOhy1EbFqnKTIf1rXHi8OU7xVDAwdnDD4c=; b=mFLaEPQYzY0g8alM4+b31xzB01OEwVd2emH92hKgw6W83SheZpCp7reb4OQCuWNR8p MECQhrYvcVIVj4lUo+yJ/LUwClsek8s4dnfYsp4p4HHNSWjVJJp2Vg+adMjIQjmrLkmI VPkERyYK9kYBQ4eq10oPOoeDfyyNMVCvWK/VU=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=jhZkZSrQ8VBt2508ANaFQyPwQ7FwOxycgCDkj50OFH3HcFgzn4fNWS29tUlQIiou7p f3tvaoQMSXfba4zDQE8VjBmeEG5jDRg4nWj2e1EhnvGFwY2oEO2CIKVbBIBPyYdm8fwb G0oqpF7ozBmWjlvMUWSJlfUyOEVb6gwvz1gzM=
- In-reply-to: <4CB37E94.3020601@xxxxxxxxxxxxx>
- References: <4CB34EC1.1060508@xxxxxxxxxxxxxxxxxx> <4CB37E94.3020601@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Mon, Oct 11, 2010 at 11:16 PM, Jacob Appelbaum <jacob@xxxxxxxxxxxxx> wrote:
> On 10/11/2010 10:52 AM, Anthony G. Basile wrote:
>> Hi everyone
>> I want to announce to the list that a new release of tor-ramdisk is out.
>> Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux
>> distribution whose only purpose is to host a Tor server in an
>> environment that maximizes security and privacy. Security is enhenced by
>> hardening the kernel and binaries, and privacy is enhanced by forcing
>> logging to be off at all levels so that even the Tor operator only has
>> access to minimal information. Finally, since everything runs in
>> ephemeral memory, no information survives a reboot, except for the Tor
>> configuration file and the private RSA key, which may be
>> exported/imported by FTP.
> Via FTP? It's probably not a good idea to export a private key without
> using encryption...
> All the best,
My first thought as well. Pretty much every protocol invented is
better than FTP, in this case and most other cases.
Another question regarding the logging: I hope you include enough to
know if the node is working correctly or not. The logs that are
generated could also be deleted after a couple of minutes or an hour
as well, which might make it possible to log some more information if
necessary to verify functionality.
Great project though, a lot of people request this.
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/