[tor-bugs] #17142 [Tor]: allow remote portforwarding on exit nodes
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Sep 25 08:38:55 UTC 2015
#17142: allow remote portforwarding on exit nodes
-----------------------------+---------------------------------
Reporter: iwtcitp | Owner:
Type: enhancement | Status: new
Priority: minor | Milestone: Tor: very long term
Component: Tor | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-----------------------------+---------------------------------
Comment (by iwtcitp):
Replying to [comment:2 yawning]:
>"this would be a legal nightmare"
ofc exit nodes should be given the choice and it should be off by default
but if still some of them are willing to offer that service why shouldnt
they. if they dont want evrybody to use the service they could also allow
it just to a whitelist.
>"this would be a nightmare to make robust against people being malicious"
i dont see how this can be more malicious than a tor2web service. and if
end to end encryption is being used which is strrongly advised then its
even more safe because at least the content of the connection stays
secret. its about as safe as using a vpn then. if you're speaking about
something like botnets: if someone cares about anonymity then he would
also use tor on the client side and it would be easy for the exit nodes to
block that kind of traffic.
i agree that its more important to complete what is implemented now before
starting with new features. just leep it on the table.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17142#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list