Re: [tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).

2016-07-22 Thread Yawning Angel
On Fri, 22 Jul 2016 15:20:00 + Patrick Schleizer wrote: > I think this could be wrong: > > TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie That block was supposed to be in a bunch of if statements. Fixed. The default path that gets set is unchanged. > Debian /usr/share/tor/t

Re: [tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).

2016-07-22 Thread Patrick Schleizer
I think this could be wrong: TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie Debian /usr/share/tor/tor-service-defaults-torrc uses: CookieAuthFile /var/run/tor/control.authcookie Common paths are: - /var/run/tor/control.authcookie - /var/lib/tor/control_auth_cookie I suggested to

Re: [tor-dev] Tor with collective signatures

2016-07-22 Thread bancfc
On 2016-07-21 17:05, isis agora lovecruft wrote: Nicolas Gailly transcribed 59K bytes: Hi, Here's a new version of the proposal with some minor fixes discussed with teor last time. 0.4: - changed *included* to *appended* - 3.2: end of paragraph, a valid consensus document contains a m

Re: [tor-dev] tor-dev Digest, Vol 66, Issue 17

2016-07-22 Thread Nathan Kettle
r >instance's AF_LOCAL sockets. > > Random thoughts: > > * The stub should be adequate for using other similar sandboxing >solutions (eg: flatpak's bubblewrap, Google's thing, whatever). The >code is compact, and is something anyone half way competent co