[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8215 [Tor]: Simple Relay: random unknown UDP port in listen mode
#8215: Simple Relay: random unknown UDP port in listen mode
--------------------------+-------------------------------------------------
Reporter: elgo | Owner:
Type: defect | Status: closed
Priority: normal | Milestone: Tor: unspecified
Component: Tor | Version:
Resolution: not a bug | Keywords: tor-relay
Parent: | Points:
Actualpoints: |
--------------------------+-------------------------------------------------
Comment(by elgo):
Ok, now I understand what is said (I wasn't sure at first), but I really,
really, don't get it. Why on earth a software would need to open a
listening ("server") socket to make a DNS request??
Seriously?
Don't tell me this is not simpler to actually directly call the "callback
function" behind this listening socket than open 2 sockets (the listening
one and the one to communicate with it) to do a DNS request...
It seems pretty insane to me. :/
Don't get me wrong, I'm first trying to understand how Tor works, abd I'm
not telling you what to do "your work" ;)
But basically, I can't run a piece of software 24/24 on a 100Mbps node if
I can't trust it.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8215#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs