[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #9998 [Tor]: resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1
#9998: resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1
-----------------------------+---------------------------------------
Reporter: proper | Owner:
Type: enhancement | Status: new
Priority: normal | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-client needs-proposal
Actual Points: | Parent ID:
Points: |
-----------------------------+---------------------------------------
Changes (by nickm):
* keywords: tor-relay => tor-client needs-proposal
Comment:
Ah, that does sound like a good idea. You could do it with a general hosts
file mechanism in the dns client code.
I do worry a bit about cross-site attacks here; do we have somebody with
the appropriate expertise that can help us figure those out? In
particular, the "visit http://localhost/" thing makes me a bit nervous
that there could be somebody using a Tor-enabled web browser to see
whether localhost is running a web server, or something like that.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9998#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs