[tor-bugs] #8215 [Tor]: Simple Relay: random unknown UDP port in listen mode
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Wed Feb 20 13:14:14 UTC 2013
    
    
  
#8215: Simple Relay: random unknown UDP port in listen mode
--------------------------+-------------------------------------------------
    Reporter:  elgo       |       Owner:                  
        Type:  defect     |      Status:  closed          
    Priority:  normal     |   Milestone:  Tor: unspecified
   Component:  Tor        |     Version:                  
  Resolution:  not a bug  |    Keywords:  tor-relay       
      Parent:             |      Points:                  
Actualpoints:             |  
--------------------------+-------------------------------------------------
Comment(by elgo):
 Ok, now I understand what is said (I wasn't sure at first), but I really,
 really, don't get it. Why on earth a software would need to open a
 listening ("server") socket to make a DNS request??
 Seriously?
 Don't tell me this is not simpler to actually directly call the "callback
 function" behind this listening socket than open 2 sockets (the listening
 one and the one to communicate with it) to do a DNS request...
 It seems pretty insane to me. :/
 Don't get me wrong, I'm first trying to understand how Tor works, abd I'm
 not telling you what to do "your work" ;)
 But basically, I can't run a piece of software 24/24 on a 100Mbps node if
 I can't trust it.
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8215#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list