On Fri, 22 Jul 2016 15:20:00 +
Patrick Schleizer wrote:
> I think this could be wrong:
>
> TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie
That block was supposed to be in a bunch of if statements. Fixed.
The default path that gets set is unchanged.
> Debian /usr/share/tor/t
I think this could be wrong:
TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie
Debian /usr/share/tor/tor-service-defaults-torrc uses:
CookieAuthFile /var/run/tor/control.authcookie
Common paths are:
- /var/run/tor/control.authcookie
- /var/lib/tor/control_auth_cookie
I suggested to
I felt randomly inspired, so I spent some time poking at my firejail
Tor Browser sandboxing effort, and made progress towards something more
robust. In particular, I switched to using AF_LOCAL (aka AF_UNIX)
sockets, via a brute force-ish approach, which seems to be working
well, despite some cavea