Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
Implements bug3630.
|
|
Conflicts:
src/or/dirserv.c
src/or/networkstatus.c
Conflicts were related to routerinfo->node shift.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Asciidoc was inserting <pre> tags for paragraphs that started with a
'+' at the beginning of the line. Instead, we need a space in front of
the plus.
|
|
|
|
otherwise you scp a tarball up but only one version of the website has it.
|
|
|
|
Conflicts:
src/or/config.c
src/or/or.h
|
|
This reverts commit 40cfad1b5ae90b06eb74861a4fdc1310f8611111.
|
|
Thanks to Nick for the idea for the fix.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When running a system-wide instance of Tor on Unix-like systems, having
a ControlSocket is a quite handy mechanism to access Tor control
channel. But it would be easier if access to the Unix domain socket can
be granted by making control users members of the group running the Tor
process.
This change introduces a UnixSocketsGroupWritable option, which will
create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows
ControlSocket to offer same access control measures than
ControlPort+CookieAuthFileGroupReadable.
See <http://bugs.debian.org/552556> for more details.
|
|
Conflicts:
src/or/config.c
src/or/dirserv.c
src/or/or.h
|
|
|
|
|
|
This is the major part of the implementation for trac issue 3076.
|
|
|
|
|
|
|
|
|
|
Conflicts:
src/or/directory.c
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fixes bug 2379
|
|
|