[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #20487 [Core Tor/Tor]: Should HiddenServiceNonAnonymousMode change default SocksPort to 0?
#20487: Should HiddenServiceNonAnonymousMode change default SocksPort to 0?
------------------------------+----------------------------------
Reporter: teor | Owner:
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor: 0.3.0.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Keywords: single-onion, tor-hs
Actual Points: | Parent ID:
Points: 0.5 | Reviewer:
Sponsor: |
------------------------------+----------------------------------
If a user enables single onion services using:
{{{
HiddenServiceSingleHopMode 1
HiddenServiceNonAnonymousMode 1
}}}
The immediately see:
{{{
Oct 28 13:28:46.087 [warn] Failed to parse/validate config:
HiddenServiceNonAnonymousMode is incompatible with using Tor as an
anonymous client. Please set Socks/Trans/NATD/DNSPort to 0, or
HiddenServiceNonAnonymousMode to 0, or use the non-anonymous Tor2webMode.
}}}
I think it would be better if we automatically disabled the socks port in
this case.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20487>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs