[tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).
yawning at schwanenlied.me
Fri Jul 22 15:59:46 UTC 2016
On Fri, 22 Jul 2016 15:20:00 +0000
Patrick Schleizer <patrick-mailinglists at whonix.org> wrote:
> I think this could be wrong:
That block was supposed to be in a bunch of if statements. Fixed.
The default path that gets set is unchanged.
> Debian /usr/share/tor/tor-service-defaults-torrc uses:
> CookieAuthFile /var/run/tor/control.authcookie
So? I don't use Debian for development.
> Common paths are:
> - /var/run/tor/control.authcookie
> - /var/lib/tor/control_auth_cookie
I write software for me, default configs will continue to reflect how my
development environment is setup.
I assume people can use setenv/export to override it, or if it
bothers them that much, use vi/nano/pico/ed/ex/emacs/xemacs.
As a side note, there's zero real reason for this particular env var to
exist at all (See #16017), beyond "no one has cared enough to write
what should be a simple branch".
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the tor-dev