[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #12864 [Tor]: CookieAuthFileGroupReadable regression between 0.2.4.x and 0.2.5.6-alpha
#12864: CookieAuthFileGroupReadable regression between 0.2.4.x and 0.2.5.6-alpha
-----------------------+----------------------------------
Reporter: intrigeri | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor | Version: Tor: unspecified
Keywords: | Actual Points:
Parent ID: | Points:
-----------------------+----------------------------------
Hi,
with current Debian sid's tor (0.2.4.23-2), CookieAuthFileGroupReadable
works just fine.
Upgrading to experimental's tor (0.2.5.6-alpha-1) makes this parameter a
no-op in practice:
{{{
$ ls -l /run/tor/control.authcookie
-rw------- 1 debian-tor debian-tor 32 Aug 14 12:17
/run/tor/control.authcookie
}}}
This breaks Vidalia's default configuration on Debian.
Relevant configuration settings:
{{{
$ grep Cookie /etc/tor/torrc /usr/share/tor/tor-service-defaults-torrc
/usr/share/tor/tor-service-defaults-torrc:CookieAuthentication 1
/usr/share/tor/tor-service-defaults-torrc:CookieAuthFileGroupReadable 1
/usr/share/tor/tor-service-defaults-torrc:CookieAuthFile
/var/run/tor/control.authcookie
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/12864>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs