[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #2659 [Vidalia]: Vidalia should let Torbutton NEWNYM



#2659: Vidalia should let Torbutton NEWNYM
-------------------------+--------------------------------------------------
 Reporter:  mikeperry    |          Owner:  chiiph  
     Type:  enhancement  |         Status:  accepted
 Priority:  major        |      Milestone:          
Component:  Vidalia      |        Version:          
 Keywords:               |         Parent:          
   Points:               |   Actualpoints:          
-------------------------+--------------------------------------------------

Comment(by rransom):

 Replying to [comment:3 chiiph]:
 > Replying to [ticket:2659 mikeperry]:
 > > 2. Create a 'Least Privilege' Control Port that does not require
 authentication, that implements a safe subset of the Tor control port,
 including SIGNAL NEWNYM.
 > >
 > > Option 2 can be done either in Tor (hard), or as a proxy filter in
 Vidalia (easier).

 Why would it be easier to write a new parser/unparser for the control port
 protocol (and hope that it parses and unparses exactly the same syntax
 that Tor does) than to add access-control checks to Tor's existing
 ControlPort code?

 > > Either of these options requires just about the same amount of work in
 Torbutton, and if done correctly, Torbutton should conceivably be able to
 use either Control Port, because they should both have the same exact
 syntax for the relevant commands and events.
 >
 > I'd go for option (2). It gives TorButton controller functionality
 without implementing an actual controller there, and it gives the
 possibility of TorButton<->Vidalia communication for (may be) specific
 commands regarding TBB usability that don't concern Tor directly.

 Torbutton will need to support part of Tor's control-port protocol in
 either case.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2659#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs