[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #8749 [Tor]: Return information about the leaking application
#8749: Return information about the leaking application
-------------------------+--------------------------------------------------
Reporter: bastik | Owner:
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Log from where the leaking request came.
When Tor says (in the Vidalia log):
> Potentially Dangerous Connection! - One of your applications established
a connection through Tor to "!IP:PORT" using a protocol that may leak
information about your destination. Please ensure you configure your
applications to use only SOCKS4a or SOCKS5 with remote hostname
resolution.
could Tor tell what port the connection was made from? Maybe the log could
include SOCKS details (like username). I don't think it isn't able to
identify the application.
Sure it's bad to use random stuff with Tor, but this information makes it
easier to sort out applications that leak.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8749>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs