Skip to content
Snippets Groups Projects
  1. Dec 27, 2011
  2. Nov 30, 2011
  3. Nov 29, 2011
  4. Nov 28, 2011
  5. Nov 24, 2011
  6. Nov 23, 2011
  7. Nov 21, 2011
  8. Nov 05, 2011
  9. Nov 03, 2011
  10. Oct 25, 2011
  11. Sep 28, 2011
  12. Sep 22, 2011
  13. Sep 02, 2011
  14. Aug 29, 2011
  15. Aug 25, 2011
  16. Jul 20, 2011
  17. Jul 19, 2011
  18. Jul 14, 2011
  19. Jul 06, 2011
  20. Jun 21, 2011
  21. Jun 20, 2011
  22. Jun 17, 2011
  23. Jun 12, 2011
  24. Jun 10, 2011
  25. Jun 03, 2011
  26. Jun 02, 2011
  27. May 16, 2011
    • Sebastian Hahn's avatar
      Clean up the 2972 implementation a little · 41982612
      Sebastian Hahn authored and Nick Mathewson's avatar Nick Mathewson committed
      41982612
    • Jérémy Bobbio's avatar
      Add UnixSocketsGroupWritable config flag · d41ac64a
      Jérémy Bobbio authored and Nick Mathewson's avatar Nick Mathewson committed
      When running a system-wide instance of Tor on Unix-like systems, having
      a ControlSocket is a quite handy mechanism to access Tor control
      channel.  But it would be easier if access to the Unix domain socket can
      be granted by making control users members of the group running the Tor
      process.
      
      This change introduces a UnixSocketsGroupWritable option, which will
      create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows
      ControlSocket to offer same access control measures than
      ControlPort+CookieAuthFileGroupReadable.
      
      See <http://bugs.debian.org/552556> for more details.
      d41ac64a
  28. May 13, 2011
Loading