[tor-dev] [PATCH] torify/torsocks and TCP Fast Open

Tim Ruehsen tim.ruehsen at gmx.de
Wed Jan 14 15:25:17 UTC 2015


Upps, I made a last second failure...

Here is the amended (and working) patch.

Tim

On Wednesday 14 January 2015 14:55:58 Tim Ruehsen wrote:
> Hi,
> 
> no answer yet, so I created a first 'works for me' patch to let torified TFO
> aware clients not leak silently.
> 
> (I hope I am on the right list here)
> 
> Please review and apply|comment.
> 
> On Tuesday 13 January 2015 15:25:35 Tim Ruehsen wrote:
> > Hi,
> > 
> > I tried to torify my wget-like application
> > (https://github.com/rockdaboot/mget) and after some struggling I found
> > that
> > TFO is enabled by default (where available).
> > 
> > I guess, the problem is TFO not using connect() but sendto().
> > 
> > Please enlighten me, what I can do (despite turning off TFO).
> > 
> > Is it worth a patch or do you think patching libtorsocks has pitfalls or
> > unwanted side-effects ?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-Allow-TCP-Fast-Open-clients-go-through-tor.patch
Type: text/x-patch
Size: 5304 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150114/cfc6c834/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150114/cfc6c834/attachment.sig>


More information about the tor-dev mailing list