[tor-dev] Further sandboxing Tor Browser (aka Tor + Firejail redux).

Yawning Angel yawning at schwanenlied.me
Fri Jul 22 15:59:46 UTC 2016


On Fri, 22 Jul 2016 15:20:00 +0000
Patrick Schleizer <patrick-mailinglists at whonix.org> wrote:

> I think this could be wrong:
> 
> TOR_CONTROL_COOKIE_AUTH_FILE=/var/run/tor/control_auth_cookie

That block was supposed to be in a bunch of if statements.  Fixed.
The default path that gets set is unchanged.

> Debian /usr/share/tor/tor-service-defaults-torrc uses:
> CookieAuthFile /var/run/tor/control.authcookie

So?  I don't use Debian for development.

> Common paths are:
> - /var/run/tor/control.authcookie
> - /var/lib/tor/control_auth_cookie

I write software for me, default configs will continue to reflect how my
development environment is setup.

I assume people can use setenv/export to override it, or if it
bothers them that much, use vi/nano/pico/ed/ex/emacs/xemacs.

As a side note, there's zero real reason for this particular env var to
exist at all (See #16017), beyond "no one has cared enough to write
what should be a simple branch".

Regards,

-- 
Yawning Angel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20160722/c905adf1/attachment.sig>


More information about the tor-dev mailing list