[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #12585 [Tor]: Implement new option SocksSocket



#12585: Implement new option SocksSocket
-----------------------------+-----------------
     Reporter:  ioerror      |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------

Comment (by dgoulet):

 The "is_socks_socket" is added to an entry_connection_t object which is
 then used in src/or/relay.c +1325 to bypass the check to the IPv4/IPV6
 traffic OK variable.

 However, it seems that SocksSocket is parsed as a SocksPort option which
 means that the entry connection created is set with the possible flag that
 can be passed to the SocksPort option like "IPv6Traffic" or "CacheDNS",
 etc...

 I see that the man page entry you've added does not mention "flags" or
 "isolation flags" like SocksPort does but they are still set with the
 default value. Is this the intended behavior to have one single possible
 way to configure that Unix port and don't offer to the user the
 possibility to deny IPv6 traffic through it for instance like a normal
 SocksPort?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/12585#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs