Skip to content

Conversation

@TheBlueMatt
Copy link
Contributor

Kind of ugly hack to pass a fWeAreUsingThisAtConnecTime flag through to LookupIntern which disables the resgular tor-lookup bypass.
With this I can successfully connect to *.onion from my machines (which are always behind a VPN which has a *.onion transparent proxy setup).

@TheBlueMatt TheBlueMatt force-pushed the tornoproxy branch 2 times, most recently from 3a4fe40 to 9776819 Compare November 18, 2014 00:23
@Diapolo
Copy link

Diapolo commented Nov 18, 2014

Could you look into this ancient pull (#4871) and perhaps check or base this one on mine? Also I'd like to get a more detailed description of what your patch does... I didn't quite understand everything.

@sipa
Copy link
Member

sipa commented Nov 18, 2014

Any reason why you're not just using fTorNoProxy in LookupIntern?

@laanwj laanwj added the P2P label Nov 18, 2014
@TheBlueMatt
Copy link
Contributor Author

@sipa Yea, that breaks unrelated things (eg you end up not sending the right version message as the *.onion is now mapped to a (probably local) IP instead). Also, you would break getpeerinfo.

@TheBlueMatt
Copy link
Contributor Author

@Diapolo Hmm? It looks like any merge conflicts with that should be cosmetic in nature (ie take no effort to fix). I'd rather keep them separate.

@Diapolo
Copy link

Diapolo commented Nov 19, 2014

@TheBlueMatt My intention was to get some review and perhaps discover changed behaviour of my pull, as it seems no one tested it (and I'm missing a testplan yes...).

@laanwj
Copy link
Member

laanwj commented Nov 19, 2014

@Diapolo at least the issue is the same here: we don't have any proxy tests

@gmaxwell
Copy link
Contributor

Can you convince me that this is really needed? I see it being a pain to maintain and keep secure (e.g. avoid leaks) esp if in the future we get better integration with tor for hidden services, like being able to provide HS keys for dos mitigation.

@laanwj
Copy link
Member

laanwj commented Mar 19, 2015

NACK. I agree with @gmaxwell and think this complicates the code for a feature I'd expect no one but @TheBlueMatt will use. No tests are provided either, so it could break any time.

@TheBlueMatt
Copy link
Contributor Author

Tests should be written, agreed, but this is incredibly useful for anyone using a tor middlebox. There are several of those around these days, and its not that much code to support a case like that.

@TheBlueMatt
Copy link
Contributor Author

Closing due to the changing-exit-every-time change, as this would be inherintly less anonymous than using the proxy exlicitly thereafter.

@bitcoin bitcoin locked as resolved and limited conversation to collaborators Sep 8, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants