[tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu Aug 12 23:29:13 UTC 2010


#1827: binding a socket for 18.0.0.1 to learn our interface address is freaking
out users
------------------------+---------------------------------------------------
 Reporter:  arma        |       Owner:     
     Type:  defect      |      Status:  new
 Priority:  normal      |   Milestone:     
Component:  Tor Client  |     Version:     
 Keywords:              |      Parent:     
------------------------+---------------------------------------------------
 People who use little snitch on OS X are being told that their Tor
 mysteriously sends udp packets to 18.0.0.1 on startup.

 This is false -- no packets are sent. grep for 18.0.0.1 in
 src/common/address.c to learn what's going on.

 But the number of reports from users is increasing. I imagine they think
 it looks like spyware behavior -- sekrit undocumented spyware behavior,
 too.

 We should explore other ways to learn the user's interface address that
 don't trigger software like little snitch.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1827>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list