Re: [tor-relays] update obfs4proxy if you run a bridge
On Wednesday, March 23, 2022 6:08:10 PM CET Toralf Förster wrote: > On 3/21/22 18:45, meskio wrote: > > > Thank you for running bridges, > > let me know if you need any help upgrading it. > > > I'm not really familar with Debian and do wonder, what line I have to > add to /etc/apt/apt.conf.d/50unattended-upgrades to get that > automatically installed ? Maybe I need to add the repo too ? > Yes, first edit '/etc/apt/sources.list': # bullseye-backports, previously on backports.debian.org deb http://deb.debian.org/debian/ bullseye-backports main #deb-src http://deb.debian.org/debian/ bullseye-backports main Then install: apt update apt install -t bullseye-backports obfs4proxy https://backports.debian.org/Instructions/ You should always install individual packages from the backports archive. Don't use apt-pinning for the whole backport archive in '/etc/apt/preferences'. -- ╰_╯ Ciao Marco! Debian GNU/Linux It's free software and it gives you freedom! signature.asc Description: This is a digitally signed message part. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] update obfs4proxy if you run a bridge
On 3/21/22 18:45, meskio wrote: Thank you for running bridges, let me know if you need any help upgrading it. I'm not really familar with Debian and do wonder, what line I have to add to /etc/apt/apt.conf.d/50unattended-upgrades to get that automatically installed ? Maybe I need to add the repo too ? Currently it looks like: ~# cat /etc/apt/apt.conf.d/50unattended-upgrades Unattended-Upgrade::Origins-Pattern { "origin=Debian,codename=${distro_codename},label=Debian"; "origin=Debian,codename=${distro_codename},label=Debian-Security"; "origin=Debian,codename=${distro_codename}-security,label=Debian-Security"; "origin=TorProject"; }; Unattended-Upgrade::Package-Blacklist { }; Unattended-Upgrade::Automatic-Reboot "true"; -- Toralf OpenPGP_signature Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] update obfs4proxy if you run a bridge
On 21 Mar 2022, 17:46 +, meskio , wrote: > Hello, > > TL;RD: > if you are a bridge operator please update obfs4proxy to a version>=0.0.12. Thanks, done. Worth noting I had to adjust (on Debian) /etc/apparmor.d/abstractions/tor to contain: /sys/kernel/mm/transparent_hugepage/hpage_pmd_size r, To prevent the error: apparmor="DENIED" operation="open" profile="system_tor" name="/sys/kernel/mm/transparent_hugepage/hpage_pmd_size per [1]. And be sure to setcap the obfs4proxy binary again if running on a port<1024, as well as restart Tor after updating. Cheers. [1]: https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1839505.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays