You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Tor2web configuration file
[main]
# Unique nodename identifier
# nodename = [UNIQUE_IDENTIFIER]
# Path to Tor2web data directory
datadir = /home/tor2web
# Debug and logging
logreqs = True
debugmode = True
debugtostdout = True
# Processes (suggested number of cores + 1)
processes = 4
requests_per_process = 100000
# Ip addresses and ports
transport = BOTH
listen_ipv4 = [LISTENING_IPV4_ADDRESS]
listen_ipv6 = [LISTENING_IPV6_ADDRESS]
listen_port_http = 80
listen_port_https = 443
# This is the base hostname for the current tor2web node
# basehost = AUTO
# This is the SOCKS host and port on which Tor is listening
sockshost = 127.0.0.1
socksport = 9050
# socksoptimisticdata = True
# sockmaxpersistentperhost = 5
# sockcachedconnectiontimeout = 240
# sockretryautomatically = True
# SSL configuration
ssl_key = /home/tor2web/certs/tor2web-key.pem
ssl_cert = /home/tor2web/certs/tor2web-cert.pem
# BE SURE TO CONFIGURE THE INTERMEDIATE CA OR YOUR WEB BROWSER WILL RESPOND
# WITH VERY LOUD WARNINGS AND ERRORS
# ssl_intermediate = /home/tor2web/certs/tor2web-intermediate.pem
# TO GENERATE DH Parameters:
# $ cd /home/tor2web/certs/
# $ openssl dhparam -out tor2web-dh.pem 2048
ssl_dh = /home/tor2web/certs/tor2web-dh.pem
cipher_list = ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-AES128-SHA
ssl_tofu_cache_size = 100
# Access Blocking
mode = TRANSLATION
onion = my_address.onion
# blockhotlinking = True
# blockhotlinking_exts = [jpg, png, gif]
# Add special HTTP headers
# This option makes it possible to add headers to responses sent to clients.
# Do NOT use this unless you are positive you need it.
# extra_HTTP_headers_to_response = [ 'Cache-Control: max-age=600', 'Surrogate-Control: max-age=86400' ]
# Disable the automagical redirect of Tor user on Tor HSs
# disable_tor_redirection = False
# If set to True will disable the tor2web disclaimer
# disable_disclaimer = False
# If set to True will disable the tor2web banner
# disable_banner = False
# If set to True will avoid rewriting visible data (experimental; will result
# in less functional proxy) Could be useful in relation to DMCA for US law only
# avoid_rewriting_visible_content = True
# Mail configuration for automatic exception and user abuse notifications
# smtpuser = [USERNAME]
# smtppass = [PASSWORD]
# smtpmail = [EMAIL]
# smtpmailto_exceptions = [EMAIL_FOR_ABUSES_EXCEPTIONS]
# smtpmailto_notifications = [EMAIL_FOR_ABUSES_NOTIFICATION]
# smtpdomain = [DOMAIN]
# smtpport = [PORT]
# Exit nodes list refresh period (in seconds)
exit_node_list_refresh = 600
# Enables the automatic fetching of the hashed blocklist
# automatic_blocklist_updates_source = https://ahmia.fi/bannedMD5.txt
# automatic_blocklist_updates_refresh = 600
# automatic_blocklist_updates_mode = MERGE
# This publishes blocklist which will be available at::/antanistaticmap/lists/blocklist
# publish_blocklist = False
# List of mirrors shown in Tor2web disclaimer and banner
# An updated list of know mirrors can be found at: https://github.com/globaleaks/tor2web/wiki
# mirror = [tor2web.org, mirror2.tld, mirror3.tld, ...]
# This allows Tor2web to make use of a simple TCP proxies
# dummyproxy = https://127.0.0.1:8080
sudo journalctl -xe
Unit tor2web.service has begun starting up.
Jan 10 11:22:41 server.domain.com tor2web[16966]: WARNING: Missing Apparmor Sandboxing support
Jan 10 11:22:41 server.domain.com tor2web[16966]: Starting Tor2web tor2web...Starting tor (via
Jan 10 11:22:41 server.domain.com tor2web[16966]: Traceback (most recent call last):
Jan 10 11:22:41 server.domain.com tor2web[16966]: File "/usr/lib/python3/dist-packages/tor2w
Jan 10 11:22:41 server.domain.com tor2web[16966]: from tor2web.utils.mail import sendmail,
Jan 10 11:22:41 server.domain.com tor2web[16966]: File "/usr/lib/python3/dist-packages/tor2w
Jan 10 11:22:41 server.domain.com tor2web[16966]: from twisted.mail.smtp import ESMTPSende
Jan 10 11:22:41 server.domain.com tor2web[16966]: ImportError: No module named 'twisted.mail.s
Jan 10 11:22:42 server.domain.com tor2web[16966]: Traceback (most recent call last):
Jan 10 11:22:42 server.domain.com tor2web[16966]: File "/usr/lib/python3/dist-packages/tor2w
Jan 10 11:22:42 server.domain.com tor2web[16966]: from tor2web.utils.mail import sendmail,
Jan 10 11:22:42 server.domain.com tor2web[16966]: File "/usr/lib/python3/dist-packages/tor2w
Jan 10 11:22:42 server.domain.com tor2web[16966]: from twisted.mail.smtp import ESMTPSende
Jan 10 11:22:42 server.domain.com tor2web[16966]: ImportError: No module named 'twisted.mail.s
Jan 10 11:22:42 server.domain.com tor2web[16966]: failed!
Jan 10 11:22:42 server.domain.com systemd[1]: tor2web.service: Control process exited, code=ex
Jan 10 11:22:42 server.domain.com systemd[1]: Failed to start LSB: Start the Tor2web proxy..
-- Subject: Unit tor2web.service has failed
-- Defined-By: systemd
-- Support: https://www.debian.org/support
--
-- Unit tor2web.service has failed.
--
-- The result is failed.
Jan 10 11:22:42 server.domain.com polkitd(authority=local)[14971]: Unregistered Authentication
Jan 10 11:22:42 server.domain.com systemd[1]: tor2web.service: Unit entered failed state.
Jan 10 11:22:42 server.domain.com systemd[1]: tor2web.service: Failed with result 'exit-code'.
Jan 10 11:22:55 server.domain.com sshd[17032]: Did not receive identification string from 222.
Jan 10 11:22:55 server.domain.com sudo[17033]: tor2web : TTY=pts/0 ; PWD=/home/tor2web ; USER
Jan 10 11:22:55 server.domain.com sudo[17033]: pam_unix(sudo:session): session opened for user
lines 1685-1716/1716 (END)
The text was updated successfully, but these errors were encountered:
I need support
OS DEBIAN9
/etc/tor2web.conf
systemctl status tor2web.service
The text was updated successfully, but these errors were encountered: