Re: [tor-relays] Out of memory message

2014-12-10 Thread Logforme
On 2014-12-10 08:31, Roger Dingledine wrote: > Careful with your conclusion there -- because of memory fragmentation, > the process can still hold the memory even when Tor has freed the memory. htop currently shows 3622/3858 Mem used and 1545/3136 Swap used. (if I remember correctly it's usually le

[tor-relays] specifying your own entrance and exit nodes

2014-12-10 Thread Seth
Assuming there are certain Tor notes being run by parties hostile to my own interests, what are the pros and cons of specifying one's own list of trusted entrance and exit nodes? I run a Tor relay at home 24/7 and use that as my entrance point. I do this to provide cover traffic for my own

[tor-relays] Changing ulimit for debian-tor

2014-12-10 Thread Lluís
The limit to open files is set to 1024 by default in my system. So it is for the "debian-tor" user, too. It seems to me a bit low. I tried to rise it a whit through "sudo" and getting a shell for debian-tor, but it doesn't work. Can I use PAM-LIMIT with tor ? If not, how can I set ulimit for debi

Re: [tor-relays] Changing ulimit for debian-tor

2014-12-10 Thread Peter Palfrader
On Wed, 10 Dec 2014, Lluís wrote: > If not, how can I set ulimit for debian-tor when booting ? > And when restarting tor ? If you run tor from the init script (service tor (re)start), the init script will set higher limits. It will try to pick something reasonable based on the total number of fi

Re: [tor-relays] Changing ulimit for debian-tor

2014-12-10 Thread Libertas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Lluís. I think the ulimit is set on a per-process basis, inherited from the parent process, so raising it in another shell won't change anything. This can be seen by opening two terminals on a local machine or two SSH sessions on a remote machin

Re: [tor-relays] specifying your own entrance and exit nodes

2014-12-10 Thread usprey
I run an exit node, https://atlas.torproject.org/#details/F14B7BF44F9B170DFF628F237E0C7E8D631F957E, and I'm also quite new on the list and learn new things about Tor everyday, so please bear with me. I do not have a full understanding of how the DirAuth works, but how about an out of band verifica

Re: [tor-relays] specifying your own entrance and exit nodes

2014-12-10 Thread tor-exit0
On 12/10/2014 4:52 PM, usprey wrote: > I do not have a full understanding of how the DirAuth works, but how > about an out of band verification process, to ensure the > trustworthiness, for exit nodes specifically. This would minimize the > hazzle for people who wishes to use trusted exit nodes, a

Re: [tor-relays] specifying your own entrance and exit nodes

2014-12-10 Thread usprey
Inline below. On 11 December 2014 at 01:46, tor-exit0 wrote: > On 12/10/2014 4:52 PM, usprey wrote: > > > I do not have a full understanding of how the DirAuth works, but how > > about an out of band verification process, to ensure the > > trustworthiness, for exit nodes specifically. This would

Re: [tor-relays] Out of memory message

2014-12-10 Thread usprey
https://gitweb.torproject.org/tor.git/commit/?id=17ecd04fde2fd98b0cca3afb251b7173e22d3f42 On 10 December 2014 at 17:57, Logforme wrote: > On 2014-12-10 08:31, Roger Dingledine wrote: > > Careful with your conclusion there -- because of memory fragmentation, > > the process can still hold the mem