[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5547 [Tor]: Add support for resolving destination names to IPv6 and exiting to IPv6 destinations



#5547: Add support for resolving destination names to IPv6 and exiting to IPv6
destinations
-------------------------------------------------------+--------------------
 Reporter:  karsten                                    |          Owner:  nickm             
     Type:  project                                    |         Status:  needs_review      
 Priority:  normal                                     |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor                                        |        Version:                    
 Keywords:  SponsorF20121101 needs-proposal tor-relay  |         Parent:                    
   Points:                                             |   Actualpoints:                    
-------------------------------------------------------+--------------------

Comment(by nickm):

 Acting on Andrea's reviews:
 > In d39684896e93aefca1d1c738556c2943eae7ed29, it doesn't look like the
 cache actually becomes per-circuit, just that it now passes a circuit
 parameter around. This is intentional to allow for future implementation,
 I presume?

 Yes, that's right.

 > 9a7d1c27432f04bab21b0cbb5ddfc41bc53d8096 looks good and I agree that
 having parsed-cell data structures like this is better than the current
 ad-hocery, but I don't quite see the connection to IPv6. Might have made
 more sense in its own branch. I presume from this that
 tor_addr_port_split() already parses IPv6 addresses?

 The rationale for doing this on this branch was that BEGIN cells needed to
 begin taking a new 'flags' argument, and I wasn't confident in my ability
 to add it correctly without screwing anything up.

 > In 2245ef768094646e22c01caa4420f49fcf6c432e, where does/will the
 TAPMP_EXTENDED_STAR flag come from? It looks like the new flags argument
 to tor_addr_parse_mask_ports() is always being set to 0 so far. Also, I
 think comments should be added to the default config file documenting this
 syntax; it's convenient but strikes me as quite counterintuitive, in that
 my brain wants to read things like '*4' and '*6' as regular expressions.

 I added it to router_parse_addr_policy_item_from_string in 8e33d77e.
 Editing the default config file is something we don't want to do too
 often, since it messes with debian packages, but we should do so when
 we're close to an 0.2.4.x-beta or -rc. I'll add a ticket to that effect.

 It's not too late to come up with a better syntax!  Is there anything you
 like more?

 > I know this is a bit of an abstract concern, since we're unlikely to be
 worried about any protocols other than IPv4 and IPv6 at any point in the
 near future, but it bothers me a bit that we now have two protocols and in
 some places we're dealing with them by ad-hoc code that effectively embeds
 knowledge of what protocols we support in a hardwired way. Things like the
 expansion of AF_UNSPEC into AF_INET and AF_INET6 wildcards in
 policy_expand_unspec() of commit 8e33d77ee1cc73fc5638caff886d16a1a7779646
 feel like they should be more table-driven or something, I guess. Similar
 comments for exit_policy_remove_redundancies() in that commit.

 I don't agree here; if we need to add IPv7 support, we will have plenty of
 warning, and the likelihood of an IPv7 hitting in our lifetime seems a
 little low.  Although from an abstract POV I agree that "there are only 3
 numbers in cs: 0, 1, and infinity", I think that this number is so likely
 to remain 2 that it is going to be safe to keep it.

 >I can think of two other 'easy' cases I didn't see handled (correct me if
 I'm wrong): transparent proxying of IPv6 clients, and hidden service on an
 IPv6 address.
 > Then I can think of one harder one: a multiprotocol network where relays
 are allowed to support only a subset of all protocols means the
 connectivity graph among relays is no longer complete

 I think transparent proxying of IPv6 clients will be trivial to add after
 the nov15 deadline; it isn't much more code.  Hidden service to an IPv6
 address is orthogonal to this, but doable.  A network where some relays
 have no IPv4 address has the problem you mention where the topology of the
 network would change; it's something to contemplate, but also orthogonal
 IMO.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5547#comment:23>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs