Debian Bug report logs -
#758112
tor: CookieAuthFileGroupReadable has no effect
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Peter Palfrader <weasel@debian.org>:
Bug#758112; Package tor.
(Thu, 14 Aug 2014 10:33:06 GMT) (full text, mbox, link).
Acknowledgement sent
to intrigeri@debian.org:
New Bug report received and forwarded. Copy sent to Peter Palfrader <weasel@debian.org>.
(Thu, 14 Aug 2014 10:33:06 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: tor
Version: 0.2.5.6-alpha-1
Severity: normal
Hi,
with current sid's tor, CookieAuthFileGroupReadable works just fine.
Upgrading to experimental's tor makes this parameter a no-op in
practice:
$ ls -l /run/tor/control.authcookie
-rw------- 1 debian-tor debian-tor 32 Aug 14 12:17 /run/tor/control.authcookie
This breaks Vidalia's default configuration on Debian.
Relevant configuration settings:
$ grep Cookie /etc/tor/torrc /usr/share/tor/tor-service-defaults-torrc
/usr/share/tor/tor-service-defaults-torrc:CookieAuthentication 1
/usr/share/tor/tor-service-defaults-torrc:CookieAuthFileGroupReadable 1
/usr/share/tor/tor-service-defaults-torrc:CookieAuthFile /var/run/tor/control.authcookie
Cheers,
--
intrigeri
Added indication that 758112 affects vidalia
Request was from intrigeri <intrigeri@debian.org>
to control@bugs.debian.org.
(Thu, 14 Aug 2014 10:45:04 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#758112; Package tor.
(Mon, 20 Oct 2014 16:06:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Peter Palfrader <weasel@debian.org>:
Extra info received and forwarded to list.
(Mon, 20 Oct 2014 16:06:05 GMT) (full text, mbox, link).
Message #14 received at submit@bugs.debian.org (full text, mbox, reply):
On Thu, 14 Aug 2014, intrigeri@debian.org wrote:
> Package: tor
> Version: 0.2.5.6-alpha-1
> Severity: normal
>
> Hi,
>
> with current sid's tor, CookieAuthFileGroupReadable works just fine.
> Upgrading to experimental's tor makes this parameter a no-op in
> practice:
>
> $ ls -l /run/tor/control.authcookie
> -rw------- 1 debian-tor debian-tor 32 Aug 14 12:17 /run/tor/control.authcookie
>
> This breaks Vidalia's default configuration on Debian.
>
> Relevant configuration settings:
>
> $ grep Cookie /etc/tor/torrc /usr/share/tor/tor-service-defaults-torrc
> /usr/share/tor/tor-service-defaults-torrc:CookieAuthentication 1
> /usr/share/tor/tor-service-defaults-torrc:CookieAuthFileGroupReadable 1
> /usr/share/tor/tor-service-defaults-torrc:CookieAuthFile /var/run/tor/control.authcookie
I think this was fixed in 0.2.5.7-rc.
Cheers,
--
| .''`. ** Debian **
Peter Palfrader | : :' : The universal
http://www.palfrader.org/ | `. `' Operating System
| `- http://www.debian.org/
Reply sent
to Peter Palfrader <weasel@debian.org>:
You have taken responsibility.
(Mon, 20 Oct 2014 16:12:15 GMT) (full text, mbox, link).
Notification sent
to intrigeri@debian.org:
Bug acknowledged by developer.
(Mon, 20 Oct 2014 16:12:15 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Tue, 18 Nov 2014 07:26:30 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Tue Nov 2 02:00:03 2021;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.