If a Tor users wishes to use a system Tor with a user service they may encounter problems with not being able to utilize the hidden service due to directory permissions.
An option "HiddenServiceDirGroupReadable" similar to "ControlPortFileGroupReadable" and "CookieAuthFileGroupReadable" would resolve this issue.
Trac: Username: anon
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Some notes: check_private_dir() knows only of user privacy, not group and is used extensively to verify the permissions on hidden service directories and files.
A naive approach of changing the permissions after created/updated gets clobbered during other start-up process, and thus is not even a workable quick hack. See rend_config_services().
Things still wrong with that patch: overriding perms after call to check_private_dir(), the CPD_GROUP_READ vs. CPD_GROUP_OK not elegantness, and the way check perms only checks for need to make more restrictive, rather than set to specific desired value if not just testing.
Will provide a better patch before asking for review... once brain re-charged... nom nom brains.
This patch is now doing what it should, and the tests confirm.
It would be nice to replace other existing magic stat constants (0700, etc.) with the new defines (STAT_RWXO, etc.) however that refactoring will go in another patch...