[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5112 [Tor Client]: Tor fails to bind to socket, SOCK_CLOEXEC unsupported on 2.6.18 kernel



#5112: Tor fails to bind to socket, SOCK_CLOEXEC unsupported on 2.6.18 kernel
------------------------+---------------------------------------------------
 Reporter:  fob         |          Owner:  nickm              
     Type:  defect      |         Status:  accepted           
 Priority:  normal      |      Milestone:  Tor: 0.2.3.x-final 
Component:  Tor Client  |        Version:  Tor: 0.2.3.12-alpha
 Keywords:              |         Parent:                     
   Points:              |   Actualpoints:                     
------------------------+---------------------------------------------------
Changes (by nickm):

  * owner:  => nickm
  * status:  new => accepted
  * milestone:  => Tor: 0.2.3.x-final


Comment:

 As an aside, you're aware of this part, right:
 {{{
 Feb 13 21:06:55.032 [warn] This copy of Tor was compiled to run in a non-
 anonymous mode. It will provide NO ANONYMITY.
 }}}
 ?

 I think most people haven't run into this, because they don't build their
 Tor with one set of kernel headers (supporting SOCK_CLOEXEC), and then try
 to run it on a different kernel.  As a workaround, are you able to compile
 with a set of headers that don't have SOCK_CLOEXEC?

 In any case, we should fix this for 0.2.3.x-final.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5112#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs