Skip to content
Snippets Groups Projects
  1. Nov 21, 2011
  2. Nov 05, 2011
  3. Nov 03, 2011
  4. Oct 25, 2011
  5. Sep 28, 2011
  6. Sep 22, 2011
  7. Sep 02, 2011
  8. Aug 29, 2011
  9. Aug 25, 2011
  10. Jul 20, 2011
  11. Jul 19, 2011
  12. Jul 14, 2011
  13. Jul 06, 2011
  14. Jun 21, 2011
  15. Jun 20, 2011
  16. Jun 17, 2011
  17. Jun 12, 2011
  18. Jun 10, 2011
  19. Jun 03, 2011
  20. Jun 02, 2011
  21. May 16, 2011
    • Sebastian Hahn's avatar
      Clean up the 2972 implementation a little · 41982612
      Sebastian Hahn authored and Nick Mathewson's avatar Nick Mathewson committed
      41982612
    • Jérémy Bobbio's avatar
      Add UnixSocketsGroupWritable config flag · d41ac64a
      Jérémy Bobbio authored and Nick Mathewson's avatar Nick Mathewson committed
      When running a system-wide instance of Tor on Unix-like systems, having
      a ControlSocket is a quite handy mechanism to access Tor control
      channel.  But it would be easier if access to the Unix domain socket can
      be granted by making control users members of the group running the Tor
      process.
      
      This change introduces a UnixSocketsGroupWritable option, which will
      create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows
      ControlSocket to offer same access control measures than
      ControlPort+CookieAuthFileGroupReadable.
      
      See <http://bugs.debian.org/552556> for more details.
      d41ac64a
  22. May 13, 2011
  23. May 12, 2011
  24. May 11, 2011
  25. May 05, 2011
  26. May 04, 2011
  27. May 02, 2011
  28. Apr 29, 2011
  29. Apr 27, 2011
Loading