[tor-bugs] #21284 [Core Tor/Tor]: Add torrc option for non-anonymous SocksPort

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Jan 24 20:00:24 UTC 2017


#21284: Add torrc option for non-anonymous SocksPort
--------------------------------------------+------------------------------
 Reporter:  teor                            |          Owner:
     Type:  enhancement                     |         Status:  new
 Priority:  Very Low                        |      Milestone:  Tor: very
                                            |  long term
Component:  Core Tor/Tor                    |        Version:
 Severity:  Normal                          |     Resolution:
 Keywords:  tor-hs, single-onion, wontfix?  |  Actual Points:
Parent ID:                                  |         Points:  1
 Reviewer:                                  |        Sponsor:
--------------------------------------------+------------------------------

Comment (by s7r):

 Replying to [comment:7 alecmuffett]:
 > tl;dr - you appear to be complaining about writing code that is
 necessary for this scenario to bypass code that has already been written
 on the presumption that my intention was/is "a bad thing" ?

 Your intention is perfectly fine (downloading files non-anonymously over
 Tor is what was described initially). I am not complaining about writing
 code in any way, I am complaining that we might add code that will be
 useless, will not help and just make things even more confusing for users.

 For example, it's false to say non-anonymous SocksPort, because it has to
 be 3 hops, otherwise it won't work for exit traffic. So, it might be as
 anonymous as in a normal Tor, it might be less anonymous in some unknown
 ways, or it might be totally non anonymous but to assume something would
 be false. This is the initial reason why the restriction to run in
 anonymous way and RSOS in the same instance was introduced, and I think it
 was our best move in this context, where we can't just assume something.

 While I do understand your (maybe unique) complicated use case, there are
 two existent options which seam reasonable and fulfill the requirements:
 - run another instance for the SocksPort only - this will preserve
 anonymity as well if desired;

 - compile with `--enable-tor2web-mode` - since the code for this already
 exists, does the job just fine and will be more light on the resources in
 the network if anonymity is not desired (won't use a guard and just do 1
 hop circuits).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21284#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list