1,575
edits
Changes
no edit summary
##Configure ''Tor'' to act as a Relay
###Create a Control Password (you'll use this later) by running ''sudo tor --hash-password <yourpasswordhere> > TempPassFile''
###Edit Delete the record of your Control Password from your History####Run ''history'' to see a numbered list of the commands you executed####Find the entry for ''sudo tor --hash-password <yourpasswordhere> > TempPassFile'' and note the <LineNumber>####Run ''history -d <LineNumber>'' to remove that line from your history###Open your ''TempPassFile'' with ''vi /path/to/TempPassFile''###Arrow down to the last line and "yank" (copy) the line by hitting''yy''###Open your ''/etc/tor/torrc''from within vi by executing '':e /etc/tor/torrc''###Uncomment ''HashedControlPassword ...'' to use a password to secure the ControlPort###Hit ''p'' to "paste" the hashed password your yanked a few minutes ago. Erase the original long hash replacing it with your pasted hash. This now make the Control Password the one you typed in earlier.
###Uncomment ''ORPort 9001'' to enable the system as a Relay
###Uncomment ''ExitPolicy reject *:*'' to configure the Relay as a "common" Middle Relay
###Uncomment ''DataDirectory /var/lib/tor'' if you want your keys/etc to be saved here. I prefer this since tor is typically run as a _tor user
###Uncomment ''ControlPort 9051'' if you intend to use ''arm'' to monitor your Relay (I recommend this and will describe the installation below)
###Uncomment ''RelayBandwidthRate'' and ''RelayBandwidthBurst'' and set them to something suitable for your connection. I recommend running a [http://www.speedtest.net/ speedtest] and taking half of the upload value. Keep in mind that the configuration is in KiloBytes. This particular speedtest returns results in MegaBits. This means you must take the Mb result from the speedtest, multiply by 1000 (to convert to Kb) and then divide by 8 (to convert to KB). Then divide by 2 to get half of this value.
###Save and exit your editor
###Delete the TempPassFile with ''sudo rm TempPassFile''
##Setup any Firewalls to pass your 9001 ORPort (and possibly 9051 ControlPort)
###Router: [http://www.dd-wrt.com/site/index DD-WRT]
##Setup [https://www.atagar.com/arm/ Arm]
###Arm is a nice "graphical" command line program that can give you status information on your Tor Relay. It is a lot more fun to look at than log files ;)
###Navigate to your home folder: ''cd ~''###Install ''wget'' via ''sudo yum install wget''###Download ''arm'': ''wget https://www.atagar.com/arm/resources/static/arm-1.4.5.0-1.rpm --no-check-certificate''. --no-check-certificate is required because atagar's HTTPS website (creator of Arm) is self-signed.###Download the ''arm signature'': ''wget https://www.atagar.com/arm/resources/static/arm-1.4.5.0-1.rpm.asc --no-check-certificate''###Download atagar's (Damian Johnson's) PGP Key: ''wget https://www.atagar.com/resources/damianJohnson.asc --no-check-certificate''###Import Damian Johnson's PGP Key: ''gpg --import damianJohnson.asc''###Test the RPM against Damian's PGP Key: ''gpg --verify arm-1.4.5.0-1.rpm.asc''###*The results will say that the Signaure is good but that the key is not certified. This is normal and fine.###Test the RPM signature: ''rpm --checksig arm-1.4.5.0-1.rpm''###Install arm: ''sudo rpm -ivh arm-1.4.5.0-1.rpm.asc'' (''i'' = install, ''h'' = print progress bar, ''v'' = verbose)###Add yourself to to the ''_tor'' group: ''sudo usermod -a -G _tor <username>'' so you can run ''arm'' and interact with ''tor'' properly.
*#https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/sect-Date_and_Time_Configuration-Command_Line_Configuration-Network_Time_Protocol.html
*#http://wiki.centos.org/HowTos/SELinux