[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8742 [Tor]: Byte history leaks information about local usage/hidden services
#8742: Byte history leaks information about local usage/hidden services
-------------------------+-------------------------------------------------
Reporter: | Owner:
alphawolf | Status: closed
Type: defect | Milestone: Tor: 0.2.8.x-final
Priority: major | Version: Tor: 0.2.7
Component: Tor | Keywords: byte-history, stats, tor-hs,
Resolution: fixed | privacy, tor-relay, 026-triaged-1,
Actual Points: | 027-triaged-1-in, PostFreeze027
Points: medium | Parent ID:
| Sponsor: SponsorR
-------------------------+-------------------------------------------------
Changes (by asn):
* status: assigned => closed
* resolution: => fixed
Comment:
Replying to [comment:12 asn]:
> Replying to [comment:9 cypherpunks]:
> > I've got the warning
> >
> > `Tor is currently configured as a relay and a hidden service. That's
not very secure: you should probably run your hidden service in a separate
Tor process, at least -- see https://trac.torproject.org/8742`
> >
> > while I'm running a hidden service ''and'' a bridge. Looks like a bug
to me, since by bandwidth graphs are not public, thus not leaking anything
useful.
>
> Bridge descriptors and extrainfos get published as well. There is a
sanitization procedure which does not clean up the bandwidth info:
https://collector.torproject.org/formats.html#bridge-descriptors
>
> In any case, this warning message seems well placed. Maybe we should
turn it into a REJECT or that's a bit too harsh? Maybe we should phrase it
better if we can?
I think this ticket can be closed based on the above message.
Please reopen if you disagree.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8742#comment:18>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs