Package: tor Version: 0.2.5.6-alpha-1 Severity: normal Hi,
with current sid's tor, CookieAuthFileGroupReadable works just fine. Upgrading to experimental's tor makes this parameter a no-op in practice: $ ls -l /run/tor/control.authcookie -rw------- 1 debian-tor debian-tor 32 Aug 14 12:17 /run/tor/control.authcookie This breaks Vidalia's default configuration on Debian. Relevant configuration settings: $ grep Cookie /etc/tor/torrc /usr/share/tor/tor-service-defaults-torrc /usr/share/tor/tor-service-defaults-torrc:CookieAuthentication 1 /usr/share/tor/tor-service-defaults-torrc:CookieAuthFileGroupReadable 1 /usr/share/tor/tor-service-defaults-torrc:CookieAuthFile /var/run/tor/control.authcookie Cheers, -- intrigeri -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org