[tor-commits] r24541: {arm} Only flagging inbound connections as possibly being private (arm/trunk/src/interface/connections)
Damian Johnson
atagar1 at gmail.com
Sun Apr 3 04:16:00 UTC 2011
Author: atagar
Date: 2011-04-03 04:16:00 +0000 (Sun, 03 Apr 2011)
New Revision: 24541
Modified:
arm/trunk/src/interface/connections/connEntry.py
Log:
Only flagging inbound connections as possibly being private if we're a guard or bridge.
Modified: arm/trunk/src/interface/connections/connEntry.py
===================================================================
--- arm/trunk/src/interface/connections/connEntry.py 2011-04-03 04:00:48 UTC (rev 24540)
+++ arm/trunk/src/interface/connections/connEntry.py 2011-04-03 04:16:00 UTC (rev 24541)
@@ -361,12 +361,13 @@
myType = self.getType()
if myType == Category.INBOUND:
- # if the connection doesn't belong to a known relay then it might be
- # client traffic
+ # if we're a guard or bridge and the connection doesn't belong to a
+ # known relay then it might be client traffic
conn = torTools.getConn()
- allMatches = conn.getRelayFingerprint(self.foreign.getIpAddr(), getAllMatches = True)
- return allMatches == []
+ if "Guard" in conn.getMyFlags() or conn.getOption("BridgeRelay") == "1":
+ allMatches = conn.getRelayFingerprint(self.foreign.getIpAddr(), getAllMatches = True)
+ return allMatches == []
elif myType == Category.EXIT:
# DNS connections exiting us aren't private (since they're hitting our
# resolvers). Everything else, however, is.
More information about the tor-commits
mailing list