[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17949 [Tor]: Make loopback address search more efficient



#17949: Make loopback address search more efficient
------------------------------------+------------------------------------
 Reporter:  teor                    |          Owner:  rl1987
     Type:  enhancement             |         Status:  accepted
 Priority:  Medium                  |      Milestone:  Tor: 0.2.8.x-final
Component:  Tor                     |        Version:
 Severity:  Normal                  |     Resolution:
 Keywords:  easy TorCoreTeam201602  |  Actual Points:
Parent ID:  #17991                  |         Points:
  Sponsor:                          |
------------------------------------+------------------------------------

Comment (by teor):

 Replying to [comment:6 bugzilla]:
 > In general, localhost is a TLD, and it must be resolved through DNS. In
 one of related tickets stated that 127.0.0.1 can be seamlessly redirected
 to public IP by the system. DNS can return "not found". So, there are
 enough reasons to stop rely on localhost as a security solution.
 > General practice is that services listen on 0 (0.0.0.0 and/or [::]).
 Address filtering is a task of firewall. To handle all tasks by tor
 instance is not a good practice.

 Tor aims to be secure by design and by default. Having secure defaults
 means that even if operators are unaware of or forget a particular
 security best practice, they will end up with an acceptably secure
 configuration.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17949#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs