[tor-bugs] #16221 [Tor Browser]: Investiate WebRTC with TCP-ICE and hidden services
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jun 1 15:58:11 UTC 2015
#16221: Investiate WebRTC with TCP-ICE and hidden services
-----------------------------+----------------------
Reporter: mikeperry | Owner: tbb-team
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor Browser | Version:
Resolution: | Keywords: ff38-esr
Actual Points: | Parent ID:
Points: |
-----------------------------+----------------------
Comment (by cypherpunks):
Replying to [comment:3 mikeperry]:
> Skimming some docs makes it seem like it may be possible to advertise a
non-running HS address before agreeing to use it
Is this just to prevent hidden services from being silently created when
the user doesn't want them?
I don't think it's necessary or desirable to do something with an
ephemeral onion address before publishing its descriptor to the HSDirs.
Instead, I think when a website tries to initiate WebRTC in Tor Browser it
should initially fail (as it does now) but prompt the user (with the
standard permissions prompt, like it does for canvas reads) asking
something like "Do you want to allow incoming connections to your browser
while you're viewing this site?". If the user says yes, an ephemeral onion
should be created and the page should reload.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16221#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list