[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17949 [Tor]: Make loopback address search more efficient
#17949: Make loopback address search more efficient
------------------------------------+------------------------------------
Reporter: teor | Owner: rl1987
Type: enhancement | Status: accepted
Priority: Medium | Milestone: Tor: 0.2.8.x-final
Component: Tor | Version:
Severity: Normal | Resolution:
Keywords: easy TorCoreTeam201602 | Actual Points:
Parent ID: #17991 | Points:
Sponsor: |
------------------------------------+------------------------------------
Comment (by teor):
Replying to [comment:6 bugzilla]:
> In general, localhost is a TLD, and it must be resolved through DNS. In
one of related tickets stated that 127.0.0.1 can be seamlessly redirected
to public IP by the system. DNS can return "not found". So, there are
enough reasons to stop rely on localhost as a security solution.
> General practice is that services listen on 0 (0.0.0.0 and/or [::]).
Address filtering is a task of firewall. To handle all tasks by tor
instance is not a good practice.
Tor aims to be secure by design and by default. Having secure defaults
means that even if operators are unaware of or forget a particular
security best practice, they will end up with an acceptably secure
configuration.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17949#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs