Skip to content
Snippets Groups Projects
  1. Apr 01, 2012
  2. Feb 02, 2012
  3. Jan 18, 2012
  4. Nov 21, 2011
  5. Oct 25, 2011
  6. Sep 02, 2011
  7. Aug 25, 2011
  8. Jul 14, 2011
  9. Jul 06, 2011
  10. Jun 21, 2011
  11. Jun 17, 2011
  12. Jun 03, 2011
  13. Jun 02, 2011
  14. May 16, 2011
    • Sebastian Hahn's avatar
      Clean up the 2972 implementation a little · 41982612
      Sebastian Hahn authored and Nick Mathewson's avatar Nick Mathewson committed
      41982612
    • Jérémy Bobbio's avatar
      Add UnixSocketsGroupWritable config flag · d41ac64a
      Jérémy Bobbio authored and Nick Mathewson's avatar Nick Mathewson committed
      When running a system-wide instance of Tor on Unix-like systems, having
      a ControlSocket is a quite handy mechanism to access Tor control
      channel.  But it would be easier if access to the Unix domain socket can
      be granted by making control users members of the group running the Tor
      process.
      
      This change introduces a UnixSocketsGroupWritable option, which will
      create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows
      ControlSocket to offer same access control measures than
      ControlPort+CookieAuthFileGroupReadable.
      
      See <http://bugs.debian.org/552556> for more details.
      d41ac64a
  15. May 13, 2011
  16. May 12, 2011
  17. May 11, 2011
  18. May 05, 2011
  19. May 04, 2011
  20. May 02, 2011
  21. Apr 29, 2011
  22. Apr 27, 2011
  23. Mar 10, 2011
  24. Mar 08, 2011
  25. Mar 03, 2011
  26. Feb 22, 2011
  27. Feb 21, 2011
  28. Feb 10, 2011
  29. Feb 09, 2011
Loading