[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #22461 [Core Tor/Tor]: Tor emits inaccurate safesocks warning event whenever you visit a naked IP address



#22461: Tor emits inaccurate safesocks warning event whenever you visit a naked IP
address
--------------------------+------------------------------------
 Reporter:  arma          |          Owner:  (none)
     Type:  defect        |         Status:  closed
 Priority:  Medium        |      Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |        Version:  Tor: 0.2.6.2-alpha
 Severity:  Normal        |     Resolution:  fixed
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------------------
Changes (by dgoulet):

 * status:  reopened => closed
 * resolution:   => fixed


Comment:

 Ok so after getting clarifications from arma, the bottom line is that tor
 should NOT warn if we have a SOCKS5 hostname + IP address that is `ATYP
 0x03` with an IPv4/6 address. Application should always use tor that way
 if they did get an IP address from the user in the first place and no DNS
 resolution happened.

 Tor is doing that correctly, only warning for IPv4/v6 atyp + IP string.

 Torsocks is the one not doing that correctly (#23667).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22461#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs