After installing EOTK and building the necessary tools (see install scripts in opt.d) the installation should be something like:
# optional: if you have/use `mkcert`, edit `demo/tpo.tconf` to enable it before proceeding
./eotk config demo/tpo.tconf
./eotk make-scripts
./eotk start tpo
...and then follow the instructions in eotk-init.sh and eotk-housekeeping.sh to set up launch-on-boot and the logfile rotation/housekeeping cronjob.
You can see what's going on, with:
./eotk ps
./eotk status -a
./eotk maps -a
For purposes of demonstration, the configuration file at demo/tpo.tconf - which will be actualised as tpo.conf - disables POST requests in order to prevent people logging in, etc.
After installing EOTK and building the necessary tools (see install scripts in
opt.d
) the installation should be something like:...and then follow the instructions in
eotk-init.sh
andeotk-housekeeping.sh
to set up launch-on-boot and the logfile rotation/housekeeping cronjob.You can see what's going on, with:
For purposes of demonstration, the configuration file at
demo/tpo.tconf
- which will be actualised astpo.conf
- disables POST requests in order to prevent people logging in, etc.If you have installed @FiloSottile's
mkcert
for certificate generation, there's a process described at https://dropsafe.crypticide.com/article/12826 for how to add yourmkcert
CA-certificate to TorBrowser.