Package: tor
Version: 0.2.5.6-alpha-1
Severity: normal

Hi,

with current sid's tor, CookieAuthFileGroupReadable works just fine.
Upgrading to experimental's tor makes this parameter a no-op in
practice:

  $ ls -l /run/tor/control.authcookie
  -rw------- 1 debian-tor debian-tor 32 Aug 14 12:17 /run/tor/control.authcookie

This breaks Vidalia's default configuration on Debian.

Relevant configuration settings:

  $ grep Cookie /etc/tor/torrc /usr/share/tor/tor-service-defaults-torrc 
  /usr/share/tor/tor-service-defaults-torrc:CookieAuthentication 1
  /usr/share/tor/tor-service-defaults-torrc:CookieAuthFileGroupReadable 1
  /usr/share/tor/tor-service-defaults-torrc:CookieAuthFile 
/var/run/tor/control.authcookie

Cheers,
--
intrigeri


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to