On Fri, Jun 10, 2011 at 2:19 AM, Christoph A. <firstname.lastname@example.org> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
On 06/07/2011 04:06 PM, Fennix wrote:
> Umm, you could just download the source file and compile yourself...
Yes, *I* could, but if Fedora ships a vulnerable package this affects a
lot more people then just me.
Compiling is always a possibility but the last one I would choose.
F14 contains latest stable (0.2.1.30) now and in future I (and hopefully
others) will give some karma to Enricos packages
> I always compile the latest alpha/beta and the current is 0.2.2.27-beta
> which is working perfectly well for me.
Actually it is 0.2.2.28-beta
You don't have to compile, you can use unofficial repos if you want Tor
(packages usually take some time after the a new Tor version was released)
I don't use the unofficial packages because I don't know if they fit
with the SELinux policy.
Does your self compiled tor daemon run in tor_t?
As to the SELinux policy questions...I am not sure. I have always compiled and the TOR package has always worked without any SELinux complaints so for this question I have never looked into this.* The reason that I try to run the latest alpha/beta is due to that I am living in China and I need this to allow me to access some websites that for reasons unknown to me are blocked.* I just use TOR for routing...have no concern to hide my usage...
users mailing list
To unsubscribe or change subscription options: