On Tue, 19 Apr 2011, intrigeri wrote:

> > In relation to this matter, there's an extremely interesting point
> > that I've found to accomplish this, and it's very very simple to
> > achieve:  A better solution on Debian would be to use Tor's
> > ControlSocket, which allows Vidalia to talk to Tor via a Unix domain
> > socket, and could possibly be enabled by default in Tor's Debian
> > packages. Vidalia can then authenticate to Tor using
> > filesystem-based (cookie) authentication if the user running Vidalia
> > is also in the debian-tor group.

That was the reason why I patched Tor to support unix domain sockets in
the first place.  It has taken a while to get there, and I'm afraid we
still aren't quite at the goal yet.

>   1. In the default torrc: set ControlSocket to /var/run/tor/control.socket

You will need to make sure Tor creates the socket with correct
permissions, I think.  Once it does that, enabling it in the Debian
package seens doable.

Editing /etc/tor/torrc is a no-go.  That just becomes a horrible mess.

Ideally tor would start to support an /etc/tor/torrc.d/ style directory,
but for now I guess we can add it to the default debian config we patch
into the tor binary.

So:
 - ensure the socket is created with sane permissions that allow things
   to work (or tell me that isn't necessary),
 - then we enable it by default.

-- 
                           |  .''`.       ** Debian **
      Peter Palfrader      | : :' :      The  universal
 http://www.palfrader.org/ | `. `'      Operating System
                           |   `-    http://www.debian.org/



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to