Your message dated Sun, 18 Oct 2015 18:56:42 +0530
with message-id <[email protected]>
and subject line Re: Bug#794845: freedombox-setup: Tor socks port should be
available on LAN networks
has caused the Debian Bug report #794845,
regarding freedombox-setup: Tor socks port should be available on LAN networks
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
794845: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794845
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: freedombox-setup
Version: 0.5
Severity: normal
Currently, Tor SOCKS listen address is set as 127.0.0.1:9050. This makes it
not available for using on LAN networks. Although for browsing using Tor
Browser Bundle is the recommended, many other services such as IRC which can
work okay behind Tor can't be used with Tor. The listen address should be
0.0.0.0:9050. Firewall opens this port for LAN networks and closes it for WAN
networks.
-- System Information:
Debian Release: stretch/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armhf
Kernel: Linux 4.0.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
Tor configuration is now moved to Plinth. Plinth also allows listening
on all local ports as discussed above.
With the release of freedombox-setup 0.6 and plinth 0.6-1, this bug is
now fixed.
--
Sunil
signature.asc
Description: OpenPGP digital signature
--- End Message ---