[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #8215 [Tor]: Simple Relay: random unknown UDP port in listen mode



#8215: Simple Relay: random unknown UDP port in listen mode
--------------------------+-------------------------------------------------
    Reporter:  elgo       |       Owner:                  
        Type:  defect     |      Status:  closed          
    Priority:  normal     |   Milestone:  Tor: unspecified
   Component:  Tor        |     Version:                  
  Resolution:  not a bug  |    Keywords:  tor-relay       
      Parent:             |      Points:                  
Actualpoints:             |  
--------------------------+-------------------------------------------------

Comment(by elgo):

 Ok, now I understand what is said (I wasn't sure at first), but I really,
 really, don't get it. Why on earth a software would need to open a
 listening ("server") socket to make a DNS request??
 Seriously?
 Don't tell me this is not simpler to actually directly call the "callback
 function" behind this listening socket than open 2 sockets (the listening
 one and the one to communicate with it) to do a DNS request...

 It seems pretty insane to me. :/

 Don't get me wrong, I'm first trying to understand how Tor works, abd I'm
 not telling you what to do "your work" ;)
 But basically, I can't run a piece of software 24/24 on a 100Mbps node if
 I can't trust it.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8215#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs