[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #3354 [Vidalia]: tor's auto bridge default and unintended Vidalia side effects
#3354: tor's auto bridge default and unintended Vidalia side effects
---------------------+------------------------------------------------------
Reporter: erinn | Owner: chiiph
Type: defect | Status: needs_review
Priority: blocker | Milestone: Vidalia: 0.2.13
Component: Vidalia | Version: Vidalia: 0.2.12
Keywords: | Parent:
Points: | Actualpoints:
---------------------+------------------------------------------------------
Comment(by arma):
Replying to [comment:16 arma]:
> B) I wonder if we should resolve this issue by backing the "feature" out
of Tor
[...]
> I don't actually remember how [Tails] intended to deploy their hack.
I'm imagining a config option like __DontTouchNetwork=1 that you can stick
on the commandline when you launch Tor. Then later you can turn it off
when everything is configured as desired.
The benefit there is that you, the packager, can make sure that the config
option only gets set when Tor is bundled with other components that know
how to do the hack you're doing.
The way we've set it up now, people upgrading from a certain combination
of components and configs automatically enable the hack. That's not nice.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3354#comment:18>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs