Re: [tor-relays] Key files encryption methods.

2013-08-21 Thread grarpamp
There may be no better than pure ram, so this ticket may be of interest: https://trac.torproject.org/projects/tor/ticket/9478 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Key files encryption methods.

2013-08-21 Thread tor
I have something to add to this. I'm a new relay operator, but not new to server hosting in general. People should be aware that some providers of vservers run their internal operations by using a large-capacity storage box for the disk storage, and separate hardware hosts which run the cpu/

Re: [tor-relays] Key files encryption methods.

2013-08-21 Thread Moritz Bartl
On 21.08.2013 11:56, Tony Xue wrote: > Is that those key files are only loaded when the Tor start and reload? > So could it be possible to decrypt the file before the start-up and > encrypt them again after the Tor start-up process is complete? The files are required only on startup of the relay,

[tor-relays] Key files encryption methods.

2013-08-21 Thread Tony Xue
Hi, As shown on the Tor website, the most important file of Tor is the key files. So is there any efficient way to encrypt those files in order to prevent anyone else, i.e. Hosting provider, getting and reading them? Is that those key files are only loaded when the Tor start and reload? So could