I never saw the OBFS specific entries in the /tmp/torrc - I dont know how it gets built each time you start Tor. I killed the Tor process and then started from the command line pointing to the SSD version of my torrc - came right up, and I have the obfs4 proxy listening too. Problem is its notated as :::443 and the ORport too. what is the general flow of tor reading files? Tor starts and passes $1 to torrc.postconf which becomes $config? I was under the impression some copy mechanism created an image of the SSD based torrc on /tmp but cant prove it. Any help on that would be great. any pointers to pc_insert and how to use it too. I pressing issue. How do make sure tor always uses the torrc on the SSD or an accurate copy of it on /tmp? Will I drop off the "wanted list" in a few days or should I request a new ONT so my IP changes?
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:43167 0.0.0.0:* LISTEN 19910/Tor
tcp 0 0 0.0.0.0:55535 0.0.0.0:* LISTEN 19910/Tor
tcp 0 0 192.168.51.1:9040 0.0.0.0:* LISTEN 19910/Tor
tcp 0 0 192.168.51.1:9050 0.0.0.0:* LISTEN 19910/Tor
tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 19910/Tor
tcp 0 0 127.0.0.1:9051 0.0.0.0:* LISTEN 19910/Tor
tcp 0 0 :::55535 :::* LISTEN 19910/Tor
tcp 0 0 :::443 :::* LISTEN 19911/obfs4proxy
May 12 01:10:03.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the l>May 12 01:10:04.000 [notice] Parsing GEOIP IPv4 file /tmp/mnt/SSDv09/entware/share/tor/geoip.
May 12 01:10:05.000 [notice] Parsing GEOIP IPv6 file /opt/share/tor/geoip6.
May 12 01:10:06.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
May 12 01:10:07.000 [notice] Your Tor server's identity key fingerprint is 'AMOBFS4Relay555 ============================'
May 12 01:10:07.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'AMOBFS4Relay555 ======================='
May 12 01:10:07.000 [notice] Your Tor server's identity key ed25519 fingerprint is 'AMOBFS4Relay555 ==========='
May 12 01:10:07.000 [notice] You can check the status of your bridge relay at
https://bridges.torproject.org/status/
May 12 01:10:07.000 [notice] Bootstrapped 0% (starting): Starting
May 12 01:10:11.000 [notice] Starting with guard context "default"
May 12 01:10:37.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
May 12 01:10:37.000 [notice] Registered server transport 'obfs4' at '[::]:443' <== YES I have it set to IPvonly
One last thought - after seeing the impact of how my traffic is monitored and filtered and blacklisted and such - I am now committed to being a contributor! So let me know if using a dmz exposed instance of ubuntu or something would be better.
AND now I get a warning Tor is running as root and doesnt need to!
Thanks - I look forward to any answers to my above questions
PS - I lose the capability setting on OBFS4Proxy for some reason; still listed as a relay - status seems slow to update