[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8908 [Core Tor/Tor]: Tor systemd socket activation support
#8908: Tor systemd socket activation support
-------------------------------------------------+-------------------------
Reporter: cypherpunks | Owner: intgr
Type: enhancement | Status:
Priority: Very Low | needs_revision
Component: Core Tor/Tor | Milestone: Tor:
Severity: Normal | unspecified
Keywords: tor-relay, systemd, lorax, | Version: Tor:
027-triaged-1-in, 028-triaged, pre028-patch | 0.2.7
Parent ID: | Resolution:
Reviewer: | Actual Points:
| Points: small
| Sponsor:
-------------------------------------------------+-------------------------
Comment (by cypherpunks):
Replying to [comment:23 nickm]:
> So, these two main questions from above still sit in my mind:
> > * Does it actually work to only start Tor when Tor receives a
SocksPort or ControlPort request? When Tor first starts after significant
downtime, it needs to download a pretty big amount of directory data, and
build enough circuits for user traffic. Does that happen fast enough to
answer the request that made systemd launch Tor?
> > * A Tor is _supposed_ to actually turn itself nearly off when it sees
no user traffic. Does your need for this feature mean that feature is not
working?
>
> I'm thinking that because of the latter point, it might be a better idea
to work on #2149 than on this, since #2149 has more general applicability.
Note that I'm not the OP, just a passer-by.
For me, systemd socket activation would serve the purpose of on-
demand/lazy startup, rather than setting up the system to start Tor as
soon as Internet access has been established. My use-case is a laptop that
could potentially connect to the Internet from a variety of geographical
locations and network access routes. This would solve the real or
perceived privacy or security problem of connecting, or at least
attempting to connect, to the Tor network at certain times and places, as
it would only connect to the network when actually used, whether through a
Tor-enabled web browser or torify or whatever other Tor-using application.
It could also be a problem for metered bandwidth connections.
Maybe I'm just misinformed about Tor's startup procedure, or maybe I
should be using traffic obfuscation features. If these are legitimate
concerns then they are orthogonal to #2149 (although metered bandwidth
seems related). Right now it is a minor inconvenience to manually start
the Tor service prior to launching a Tor-using application.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8908#comment:24>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs
- Prev by Author:
[tor-bugs] #19030 [Community]: Quickbooks error ((1.(8.8.8)).5.1.3.5.9.7.8))) Quickbooks error s.u.p.p.o.r.t p.h.o.n.e n.u.m.b.e.r Quickbooks error s.u.p.p.o.r.t n.u.m.b.e.r
- Next by Author:
[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17158, #18616, #18761, #18809, #18816, #18841, #18963, #19003
- Previous by thread:
[tor-bugs] #19030 [Community]: Quickbooks error ((1.(8.8.8)).5.1.3.5.9.7.8))) Quickbooks error s.u.p.p.o.r.t p.h.o.n.e n.u.m.b.e.r Quickbooks error s.u.p.p.o.r.t n.u.m.b.e.r
- Next by thread:
[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17158, #18616, #18761, #18809, #18816, #18841, #18963, #19003
- Index(es):