[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
#1827: binding a socket for 18.0.0.1 to learn our interface address is freaking
out users
------------------------+---------------------------------------------------
Reporter: arma | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor Client | Version:
Keywords: | Parent:
------------------------+---------------------------------------------------
People who use little snitch on OS X are being told that their Tor
mysteriously sends udp packets to 18.0.0.1 on startup.
This is false -- no packets are sent. grep for 18.0.0.1 in
src/common/address.c to learn what's going on.
But the number of reports from users is increasing. I imagine they think
it looks like spyware behavior -- sekrit undocumented spyware behavior,
too.
We should explore other ways to learn the user's interface address that
don't trigger software like little snitch.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1827>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs