[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #11512 [Tor Launcher]: Tor Launcher should set ClientTransportPlugin according to the bridge list



#11512: Tor Launcher should set ClientTransportPlugin according to the bridge list
------------------------------+-------------------
     Reporter:  anonym        |      Owner:  brade
         Type:  defect        |     Status:  new
     Priority:  normal        |  Milestone:
    Component:  Tor Launcher  |    Version:
   Resolution:                |   Keywords:
Actual Points:                |  Parent ID:
       Points:                |
------------------------------+-------------------

Comment (by anonym):

 Replying to [comment:6 mcs]:
 > Kathy Brade and I did some evaluation of this issue.  We would prefer to
 have Tor Launcher know as little as possible about the
 ClientTransportPlugin configuration, especially since this issue should
 disappear when #8402 is completed.
 >
 > Our proposal is to store the ClientTransportPlugin values as hidden
 preferences, like so:
 > {{{
 > pref("extensions.torlauncher.transport_plugin.fte",
 >   "fte exec ${TORPATH}/PluggableTransports/fteproxy --managed");
 > pref("extensions.torlauncher.transport_plugin.obfs2,obfs3",
 >   "obfs2,obfs3 exec ${TORPATH}/PluggableTransports/obfsproxy.bin
 managed");
 > pref("extensions.torlauncher.transport_plugin.flashproxy",
 >   "flashproxy exec ${TORPATH}/PluggableTransports/flashproxy-client
 --register :0 :9000");
 > }}}
 >
 > Tor Launcher would simply replace ${TORPATH} and use the resulting
 string for the SETCONF ClientTransportPlugin commands.

 This looks good enough for me (and Tails). It will add a slight
 maintenance burden for us but it may actually be good that we're forced to
 pay attention to which transports we pull in via `obfsproxy` etc.

 Note that even when we have #8402, my (more complex) approach would
 actually add some value since there would be no need to configure
 `ClientTransportPlugin` lines in `torrc`. However, I do not mind scrapping
 it in favour of your simpler approach. KISS.

 > Also, we can avoid the IPv6 issue if we assume that the first token in
 the bridge configuration may be a transport type; if it happens to be an
 IPv4 or IPv6 address, it won't match any known types so it will be
 ignored.  The only downside we see for this simple approach is that Tor
 Launcher will not be able to display a warning for unknown types.  A
 slightly smarter approach might be to check that the first token consists
 entirely of 0-9, A-F, ":" and "." (in which case it should be an IPv4 or
 IPv6 address with optional :port and not a transport type).

 Then I should reconsider the name of my "DEADBEEF" transport plugin.
 </joke>

 Seriously, doesn't xulrunner provide libraries? Interfaces to internal
 Firefox functions, where an IP validator certainly must exist?

 > For the UI, we will need to think more about how to handle the fact that
 the proxy and bridge options are mutually exclusive.

 Right, but I suppose that actually is a separate issue deserving a new
 ticket.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11512#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs