[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #21284 [Core Tor/Tor]: Add torrc option for non-anonymous SocksPort
#21284: Add torrc option for non-anonymous SocksPort
--------------------------------------------+------------------------------
Reporter: teor | Owner:
Type: enhancement | Status: new
Priority: Very Low | Milestone: Tor: very
| long term
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-hs, single-onion, wontfix? | Actual Points:
Parent ID: | Points: 1
Reviewer: | Sponsor:
--------------------------------------------+------------------------------
Comment (by teor):
Replying to [comment:6 alecmuffett]:
> In terms of use cases, the goal is to simplify OnionBalance adoption to
drive scale; anyone who is running Single Hop Circuits is unlikely to care
about remaining anonymous, so it seems odd to ban them from SOCKS merely
to drive the point home?
As s7r noted, Exits already ban single-hop circuits, so if we had naïvely
allowed a single-hop SOCKSPort, it might only have worked when accessing
onion services as a client. Which would have been a terrible user
experience.
> It turns into administrative burden: if I am choosing to use Onions for
greater integrity and disintermediation/NAT-punching, that the software
inhibits me from accessing (say) Debian updates over Tor (unless I launch
another daemon to overcome this handicap) seems bizarre.
>
> Surely it took more code to deny everyone this feature, than it would
take to enable it?
The code to deny the feature is ~10 lines of boilerplate. It's easily
removed or made conditional.
Replying to [comment:7 alecmuffett]:
> tl;dr - you appear to be complaining about writing code that is
necessary for this scenario to bypass code that has already been written
on the presumption that my intention was/is "a bad thing" ?
No, your intention is fine. It's completely understandable that you want
to connect to other onion services or internet sites through the same tor
instance you have running a single onion service. We just didn't discover
this use case during the proposal process, or the discussions on tor-dev
about single onion service use cases. That's on me - I could have asked
better questions, or asked more people.
(We've prevented or warned against combinations like this in the past
because they have anonymity implications, but that's not an issue here.)
I have no issue with implementing this feature, I just want to design it
so that it works (it must be multi-hop to access exits), and that it has
an appropriate user interface (clearly documented torrc option(s)).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21284#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs