[tor-bugs] #2579 [Tor Client]: Hidden service directory permissions prevent Vidalia from displaying the hidden service hostname
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Fri Feb 18 21:23:40 UTC 2011
#2579: Hidden service directory permissions prevent Vidalia from displaying the
hidden service hostname
--------------------------------+-------------------------------------------
Reporter: T(A)ILS developers | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor Client | Version: Tor: unspecified
Keywords: | Parent:
Points: | Actualpoints:
--------------------------------+-------------------------------------------
Usecase: create and publish a new hidden service with Vidalia.
(Note for those who would like to reproduce this bug: the selected hidden
service directory must be owned by the user who runs the system-wide Tor
(e.g. `debian-tor`), which is not made clear, but this is Vidalia UI issue
is orthogonal to the current one and will be addressed separately.)
=> Vidalia shows "Directory not found" in the "Onion Address" column, and
the user has no easy way to get and share her hidden service hostname.
This is because Tor chmod's 700 this directory:
`[warn] Fixing permissions on directory /tmp/hidden`
`check_private_dir` being called from `rend_service_load_keys`.
It seems like the hostname cannot be asked by Vidalia using the control
protocol, so the user who runs Vidalia needs to be allowed to read the
"hostname" file in the configured hidden service directory.
When using a system-wide Tor daemon and cookie authentication,
`CookieAuthFileGroupReadable` is generally enabled, and the Vidalia user
is generally a member of the system-wide Tor group (e.g. `debian-tor`).
This is e.g. the case in T(A)ILS.
I thus propose we add a new Tor option that could be called
`HiddenServiceDirGroupReadable` or `HiddenServiceHostnameGroupReadable`,
and work like
`CookieAuthFileGroupReadable`. The exact semantics shall of course be
specified more accurately, which I volunteer to do if we decide to go this
way. In that case, I also volunteer to write the needed patch.
On the implementation side, adding a `group_readable` boolean argument to
the `check_private_dir` function may be needed.
What do you think?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2579>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list