I have committed a first version of the new instructions for Homebrew (rev 26005). I don't own a Mac, so there are some sections I am unsure about (verification, uninstall, configuration location, sample config), but they should definitely be an improvement over the old useless instructions.
Can someone fill me in on how to configure Tor to run as daemon?
The document also states that at least 20kb/s are a good contribution as a relay. I don't think that's good advice nowadays.
I have committed a first version of the new instructions for Homebrew (rev 26005). I don't own a Mac, so there are some sections I am unsure about (verification, uninstall, configuration location, sample config), but they should definitely be an improvement over the old useless instructions.
Can someone fill me in on how to configure Tor to run as daemon?
The document also states that at least 20kb/s are a good contribution as a relay. I don't think that's good advice nowadays.
I have a Mac with Homebrew. Where can I see the new writeup?
This will insecurely (-k = no certificate checks) load code from Homebrew and send it to the ruby interpreter. This is how Homebrew advertises their install method, but it isn't secure in the slightest. I'm not aware any reasonably secure way to bootstap Homebrew, as it wasn't designed with security in mind.
brew install tor
The only verification done here will be a check of the MD5 checksum provided by brew. I suppose it may be possible to download the Tor tarball, confirm the signature with GPG, and move the tarball to the /Library/Caches directory before running the install command; however any minor mistakes in the process would just cause brew to download the source.
A better solution may be packaging and signing a standalone Tor relay build, so that concerned end-users can verify GPG signatures.
If users are willing to put up with the inherently insecure nature of Homebrew, the following command can be run in Terminal to start Tor when the user logs in:
Create a data directory for the Tor daemon. /var/db/tor would be a good choice. The permissions will have to be changed in this directory to allow access for the user created in 2.
Modify /usr/local/etc/tor/torrc to include this valid DataDirectory and User.