[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #18157 [- Select a component]: Which hidden services am I running?



#18157: Which hidden services am I running?
--------------------------------------+-----------------
     Reporter:  cypherpunks           |      Owner:
         Type:  defect                |     Status:  new
     Priority:  Medium                |  Milestone:
    Component:  - Select a component  |    Version:
     Severity:  Normal                |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |    Sponsor:
--------------------------------------+-----------------
 Please create an easy way for the user, to query the onion addresses
 currently running by the tor client, and their respective port mappings,
 using the control port.

 To get the onion addresses from the control port, the user has to go
 through the data dump of "getinfo circuit-status", and try and locate the
 "REND_QUERY=" lines.

 There is no way for seeing the assigned port mapping of those onion
 addresses using the control port.

 The only available mean is to log at debug level and look for the lines
 [debug] rend_add_service(): Service maps port 80 to 127.0.0.1:8080

 I think this is important to allow the users to investigate, what
 applications, that use ADD_ONION, and has access to the tor control port,
 are doing exactly.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18157>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs