[tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri Aug 13 01:54:07 UTC 2010


#1827: binding a socket for 18.0.0.1 to learn our interface address is freaking
out users
------------------------+---------------------------------------------------
 Reporter:  arma        |       Owner:     
     Type:  defect      |      Status:  new
 Priority:  normal      |   Milestone:     
Component:  Tor Client  |     Version:     
 Keywords:              |      Parent:     
------------------------+---------------------------------------------------

Comment(by nickm):

 Well, we could use the usual means to discover their DNS server, and if
 that's in a non-private network, open a testing UDP connection to that
 address.  But that would be more error prone.

 We could try changing the address to (say) 1.0.0.1 and hope that looks
 less disturbing.

 If we've opened any TCP sockets to public addresses at all, we could do a
 getsockname() on them rather than on a UDP socket.  This might be our best
 bet.  It would mean that we'd have to delay a little before coming up as a
 router if we needed to guess our address.

 We could file a bug report against "little snitch" and see if they can't
 teach their software that connecting() a UDP socket doesn't actually send
 any traffic.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1827#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list