[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #8585 [Core Tor/Torsocks]: Figure out why weechat+ssl don't play nice with torsocks



#8585: Figure out why weechat+ssl don't play nice with torsocks
-------------------------------+-------------------------
 Reporter:  sysrqb             |          Owner:  sysrqb
     Type:  defect             |         Status:  closed
 Priority:  Medium             |      Milestone:
Component:  Core Tor/Torsocks  |        Version:
 Severity:  Normal             |     Resolution:  wontfix
 Keywords:                     |  Actual Points:
Parent ID:                     |         Points:
 Reviewer:                     |        Sponsor:
-------------------------------+-------------------------
Changes (by dgoulet):

 * status:  assigned => closed
 * resolution:   => wontfix
 * severity:   => Normal


Comment:

 Ok I took a quick look and this is because of multi process. It seems that
 the DNS resolution is done in a separate process, then connection to it as
 well. Once it's all good, that process passes it back to the main process
 through Unix socket FD passing which is something torsocks denies because
 there is no way we can really confirm that we did open that socket through
 Tor.

 This to be fixed would require torsocks to support multi process which is
 very tricky. Irssi has a similar issue when resolving .onion where DNS
 resolution is done in a new process and the .onion pool is not shared
 between processes (#11727). Until we have a multi process support (shared
 memory or something), we won't be able to fix this. Closing in favor of
 the multi process ticket.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8585#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs