mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
d41ac64ad6
When running a system-wide instance of Tor on Unix-like systems, having a ControlSocket is a quite handy mechanism to access Tor control channel. But it would be easier if access to the Unix domain socket can be granted by making control users members of the group running the Tor process. This change introduces a UnixSocketsGroupWritable option, which will create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows ControlSocket to offer same access control measures than ControlPort+CookieAuthFileGroupReadable. See <http://bugs.debian.org/552556> for more details. |
||
---|---|---|
.. | ||
contrib | ||
spec | ||
asciidoc-helper.sh | ||
HACKING | ||
Makefile.am | ||
TODO | ||
TODO.021 | ||
TODO.022 | ||
TODO.external | ||
TODO.future | ||
tor-gencert.1.txt | ||
tor-resolve.1.txt | ||
tor-rpm-creation.txt | ||
tor-win32-mingw-creation.txt | ||
tor.1.txt | ||
torify.1.txt | ||
translations.txt | ||
v3-authority-howto.txt |