[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17142 [Tor]: allow remote portforwarding on exit nodes



#17142: allow remote portforwarding on exit nodes
-----------------------------+---------------------------------
     Reporter:  iwtcitp      |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  minor        |  Milestone:  Tor: very long term
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+---------------------------------

Comment (by iwtcitp):

 Replying to [comment:2 yawning]:
 >"this would be a legal nightmare"
 ofc exit nodes should be given the choice and it should be off by default
 but if still some of them are willing to offer that service why shouldnt
 they. if they dont want evrybody to use the service they could also allow
 it just to a whitelist.
 >"this would be a nightmare to make robust against people being malicious"
 i dont see how this can be more malicious than a tor2web service. and if
 end to end encryption is being used which is strrongly advised then its
 even more safe because at least the content of the connection stays
 secret. its about as safe as using a vpn then. if you're speaking about
 something like botnets: if someone cares about anonymity then he would
 also use tor on the client side and it would be easy for the exit nodes to
 block that kind of traffic.
 i agree that its more important to complete what is implemented now before
 starting with new features. just leep it on the table.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17142#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs