summaryrefslogtreecommitdiff
path: root/doc/torify.1.txt
diff options
context:
space:
mode:
authorJérémy Bobbio <lunar@debian.org>2011-04-23 02:35:02 +0200
committerNick Mathewson <nickm@torproject.org>2011-05-15 20:20:28 -0400
commitd41ac64ad68811d8575db6e456fba470b0c3fde7 (patch)
tree36c7e6b5e560f6dfe60d0734f6085ece6e3defee /doc/torify.1.txt
parent2b9c5ee301f705cbf69c725ca749d4ac752c06d3 (diff)
downloadtor-d41ac64ad68811d8575db6e456fba470b0c3fde7.tar.gz
tor-d41ac64ad68811d8575db6e456fba470b0c3fde7.zip
Add UnixSocketsGroupWritable config flag
When running a system-wide instance of Tor on Unix-like systems, having a ControlSocket is a quite handy mechanism to access Tor control channel. But it would be easier if access to the Unix domain socket can be granted by making control users members of the group running the Tor process. This change introduces a UnixSocketsGroupWritable option, which will create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows ControlSocket to offer same access control measures than ControlPort+CookieAuthFileGroupReadable. See <http://bugs.debian.org/552556> for more details.
Diffstat (limited to 'doc/torify.1.txt')
0 files changed, 0 insertions, 0 deletions