On Tue, 19 Apr 2011, intrigeri wrote:
> > In relation to this matter, there's an extremely interesting point
> > that I've found to accomplish this, and it's very very simple to
> > achieve: A better solution on Debian would be to use Tor's
> > ControlSocket, which allows Vidalia to talk to Tor via a Unix domain
> > socket, and could possibly be enabled by default in Tor's Debian
> > packages. Vidalia can then authenticate to Tor using
> > filesystem-based (cookie) authentication if the user running Vidalia
> > is also in the debian-tor group.
That was the reason why I patched Tor to support unix domain sockets in
the first place. It has taken a while to get there, and I'm afraid we
still aren't quite at the goal yet.
> 1. In the default torrc: set ControlSocket to /var/run/tor/control.socket
You will need to make sure Tor creates the socket with correct
permissions, I think. Once it does that, enabling it in the Debian
package seens doable.
Editing /etc/tor/torrc is a no-go. That just becomes a horrible mess.
Ideally tor would start to support an /etc/tor/torrc.d/ style directory,
but for now I guess we can add it to the default debian config we patch
into the tor binary.
So:
- ensure the socket is created with sane permissions that allow things
to work (or tell me that isn't necessary),
- then we enable it by default.
--
| .''`. ** Debian **
Peter Palfrader | : :' : The universal
http://www.palfrader.org/ | `. `' Operating System
| `- http://www.debian.org/
--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]