[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).



On Fri, 22 Jul 2016 15:20:00 +0000
Patrick Schleizer <patrick-mailinglists@xxxxxxxxxx> wrote:

> I think this could be wrong:
> 
> TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie

That block was supposed to be in a bunch of if statements.  Fixed.
The default path that gets set is unchanged.

> Debian /usr/share/tor/tor-service-defaults-torrc uses:
> CookieAuthFile /var/run/tor/control.authcookie

So?  I don't use Debian for development.

> Common paths are:
> - /var/run/tor/control.authcookie
> - /var/lib/tor/control_auth_cookie

I write software for me, default configs will continue to reflect how my
development environment is setup.

I assume people can use setenv/export to override it, or if it
bothers them that much, use vi/nano/pico/ed/ex/emacs/xemacs.

As a side note, there's zero real reason for this particular env var to
exist at all (See #16017), beyond "no one has cared enough to write
what should be a simple branch".

Regards,

-- 
Yawning Angel

Attachment: pgprAa8XZpcrP.pgp
Description: OpenPGP digital signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev