[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #21295 [Core Tor/Tor]: Allow mixed anonymous and non-anonymous onion services in the same tor instance
#21295: Allow mixed anonymous and non-anonymous onion services in the same tor
instance
------------------------------+----------------------------------
Reporter: teor | Owner:
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Keywords: tor-hs, single-onion
Actual Points: | Parent ID:
Points: 2 | Reviewer:
Sponsor: |
------------------------------+----------------------------------
Similar to #21284, some single onion service users want to be able to use
hidden (double onion) services most of the time, and single onion services
occasionally with trusted peers.
For example, see the OnionShare use case in:
https://lists.torproject.org/pipermail/tor-dev/2017-January/011782.html
One potential anonymity issue is that any introduction and rendezvous
points see the single onion service's IP addresses, as does anyone with
access to the networks those relays are on.
But anyone with access to the network the single onion service is on also
sees its IP address, and that it is creating tor traffic. So I'm not sure
how much of a threat this is.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21295>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs