New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
default to /var/run/tor/control and /var/run/tor/control.authcookie #11
Comments
Agreed. I wanted to use cookie authentication from the beginning, but the lack of standardized paths is off-putting. For example, using the Debian specific |
|
Rusty Bird:
It surely should be fixed upstream if it was an upstream issue. I was |
It's only Then it can be enabled using |
|
The Tor Project upstream bug report: |
|
Can you implement this ticket please? Or do you wish to wait until this gets fixed upstream? Or should I send a pull request for a Debian specific configuration snippet? (Untested for now.) |
Can you do it this way for now? I'd like to at least wait for a response from upstream (though not necessarily until they implement it). |
|
Yes. Done. |
since rustybird#11 was fixed upstream in corridor
Defaulting to localhost:9051 with an empty Tor control password is not great. I doubt any distribution / user has such settings set.
I guess defaulting to
/var/run/tor/controland/var/run/tor/control.authcookiehas a higher chance of working for a bigger amount of people out of the box. By now, all distributions should have updated to providing Tor control cookies authentication by default?Implementing this ticket would ease Debian packaging. (#10) Otherwise the Debian packaging would have to add a patch to add a "debian specific" configuration file
/etc/corridor.conf/50-debian.conf.The text was updated successfully, but these errors were encountered: