Tor mod installed.

To remove the mod, go to special options mode (reboot while touching the screen) and select 'Restore Factory Defaults'. This will also remove all local network settings on the device.

You should see something like this at the bottom of this status page:
[notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
If you do not, then it's likely your router is not allowing the tor port through to your chumby. You will need to configure your router to forward port 443 to your chumby's IP. See http://portforward.com for help on how to do this.

torrc file:

Using torrc file at /mnt/storage/tor/torrc (turn on sshd and login to modify this):

DataDirectory /mnt/storage/tor/.tor/ AvoidDiskWrites 1 RunAsDaemon 1 BandwidthRate 24 KB BandwidthBurst 64 KB MaxAdvertisedBandwidth 64 KB GeoIPFile /mnt/storage/tor/geoip Log notice file /mnt/storage/tor/torlog.txt SocksPort 0 ORPort 443 BridgeRelay 1 Exitpolicy reject *:*

Top process info

Mem: 57680K used, 2100K free, 0K shrd, 420K buff, 12440K cached
Load average: 2.20 1.83 1.63
  PID USER     STATUS   RSS    VSZ  PPID %CPU %MEM COMMAND
 1575 root     SW     25212  45900  1475 21.6 42.1 chumbyflashplay
 2655 root     SW     16624  27528     1  6.5 27.8 tor
26401 root     RW       616   2908 26399  3.7  1.0 top
 1211 root     SW       380   1544     1  1.8  0.6 acceld
22613 root     SW      1744   5960  1233  0.0  2.9 sshd
  422 root     SW      1580   1612     1  0.0  2.6 watchdog
 1574 root     SW       980   5180  1475  0.0  1.6 btplayd
22616 root     SW       936   3232 22613  0.0  1.5 ash
 1233 root     SW       812   3276     1  0.0  1.3 sshd
 1577 root     SW       760   3212  1576  0.0  1.2 chumbpipe
 1374 root     SW       740  21024     1  0.0  1.2 chumbhowld
 1399 root     SW       720  11496     1  0.0  1.2 mDNSResponder
 1362 root     SW       712   3228     1  0.0  1.1 crond
 1186 root     SW       656   4280     1  0.0  1.0 chumbradiod
26399 root     SW       600   2912 26398  0.0  1.0 torlog
 1475 root     SW       556   2912     1  0.0  0.9 start_control_p
 1092 root     SW       536   3108     1  0.0  0.8 syslogd
 1440 root     SW       504   2916     1  0.0  0.8 mDNSPublish
    1 root     SW       468   2908     0  0.0  0.7 init
 1576 root     SW       464   2908  1575  0.0  0.7 sh
 1256 root     SW       460   2768     1  0.0  0.7 wpa_supplicant
26398 root     SW       420   2916  1360  0.0  0.7 httpd
  448 root     SW<      344   1944     1  0.0  0.5 udevd
 1360 root     SW       340   2916     1  0.0  0.5 httpd
 1474 root     SW<      320   3492     1  0.0  0.5 chumbalarmd
 1258 root     SW       316   1584     1  0.0  0.5 wpa_cli
 1214 root     SW       288   1588     1  0.0  0.4 cpid
  396 root     SW       212   2908     1  0.0  0.3 init
 1287 root     SW       148   2912     1  0.0  0.2 udhcpc
 1043 root     SW<        0      0     2  0.0  0.0 phy1
  378 root     SW<        0      0     2  0.0  0.0 mmcqd
    4 root     RW<        0      0     2  0.0  0.0 events/0
  187 root     SW<        0      0     2  0.0  0.0 kswapd0
    5 root     SW<        0      0     2  0.0  0.0 khelper
    3 root     SW<        0      0     2  0.0  0.0 ksoftirqd/0
  156 root     SW<        0      0     2  0.0  0.0 kmmcd
  440 root     SW<        0      0     2  0.0  0.0 kjournald
 1581 root     SW<        0      0     2  0.0  0.0 ipolldevd
  186 root     SW         0      0     2  0.0  0.0 pdflush
  957 root     SW<        0      0     2  0.0  0.0 khubd
    2 root     SW<        0      0     0  0.0  0.0 kthreadd
   10 root     SW<        0      0     2  0.0  0.0 suspend
  141 root     SW<        0      0     2  0.0  0.0 kblockd/0
  152 root     SW<        0      0     2  0.0  0.0 kseriod
  185 root     SW         0      0     2  0.0  0.0 pdflush
  230 root     SW<        0      0     2  0.0  0.0 aio/0
  248 root     SW<        0      0     2  0.0  0.0 unionfs_siod/0
  249 root     SW<        0      0     2  0.0  0.0 nfsiod
  255 root     SW<        0      0     2  0.0  0.0 cifsoplockd
  256 root     SW<        0      0     2  0.0  0.0 cifsdnotifyd
  357 root     DW<        0      0     2  0.0  0.0 freeze-thaw
  360 root     SW<        0      0     2  0.0  0.0 kondemand/0
  373 root     SW<        0      0     2  0.0  0.0 rpciod/0
  387 root     SW<        0      0     2  0.0  0.0 kjournald
  427 root     SW<        0      0     2  0.0  0.0 kjournald
  946 root     SW<        0      0     2  0.0  0.0 ksuspend_usbd
26402 root     Z          0      0   422  0.0  0.0 watchdog

Memory usage stats

MemTotal:          59780 kB
MemFree:            2092 kB
Buffers:             420 kB
Cached:            12440 kB
SwapCached:          476 kB
Active:            22332 kB
Inactive:          24416 kB
Active(anon):      16944 kB
Inactive(anon):    18888 kB
Active(file):       5388 kB
Inactive(file):     5528 kB
Unevictable:        1580 kB
Mlocked:            1580 kB
SwapTotal:        131064 kB
SwapFree:         125756 kB
Dirty:                 0 kB
Writeback:             0 kB
AnonPages:         35172 kB
Mapped:             9660 kB
Slab:               3300 kB
SReclaimable:        840 kB
SUnreclaim:         2460 kB
PageTables:          560 kB
NFS_Unstable:          0 kB
Bounce:                0 kB
WritebackTmp:          0 kB
CommitLimit:      160952 kB
Committed_AS:     100056 kB
VmallocTotal:     188416 kB
VmallocUsed:         124 kB
VmallocChunk:     186332 kB

Tor log file

back
Dec 30 05:36:05.638 [notice] Tor 0.2.1.21 opening new log file.
Dec 30 05:36:05.668 [notice] Parsing GEOIP file.
Dec 30 05:36:17.055 [warn] You are running Tor as root. You don't need to, and you probably shouldn't.
Dec 30 05:36:22.850 [notice] Your Tor server's identity key fingerprint is 'chumbyonexx A8BDB9E9F2DC45924A20832'
Dec 30 05:36:44.110 [notice] We now have enough directory information to build circuits.
Dec 30 05:36:44.111 [notice] Bootstrapped 80%: Connecting to the Tor network.
Dec 30 05:36:44.460 [notice] Bootstrapped 85%: Finishing handshake with first hop.
Dec 30 05:36:44.559 [notice] Guessed our IP address as xx.xx.xx.xx (source: 149.9.0.57).
Dec 30 05:36:47.026 [notice] Bootstrapped 90%: Establishing a Tor circuit.
Dec 30 05:36:54.122 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
Dec 30 05:36:54.123 [notice] Bootstrapped 100%: Done.
Dec 30 05:36:54.123 [notice] Now checking whether ORPort xx.xx.xx.xx:443 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Dec 30 05:37:49.534 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
Dec 30 05:38:12.150 [notice] Performing bandwidth self-test...done.
Dec 30 05:39:13.192 [notice] Your DNS provider gave an answer for "pptcc3qmnj6zjkt.com", which is not supposed to exist.  Apparently they are hijacking DNS failures. Trying to correct for this.  We've noticed 1 possibly bad address so far.
Dec 30 05:39:13.322 [notice] Your DNS provider has given "xx.xx.xx.xx" as an answer for 8 different invalid addresses. Apparently they are hijacking DNS failures. I'll try to correct for this by treating future occurrences of "xx.xx.xx.xx" as 'not found'.

back