[tor-bugs] #3354 [Vidalia]: tor's auto bridge default and unintended Vidalia side effects

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Jun 15 06:45:12 UTC 2011


#3354: tor's auto bridge default and unintended Vidalia side effects
---------------------+------------------------------------------------------
 Reporter:  erinn    |          Owner:  chiiph         
     Type:  defect   |         Status:  needs_review   
 Priority:  blocker  |      Milestone:  Vidalia: 0.2.13
Component:  Vidalia  |        Version:  Vidalia: 0.2.12
 Keywords:           |         Parent:                 
   Points:           |   Actualpoints:                 
---------------------+------------------------------------------------------

Comment(by arma):

 Replying to [comment:16 arma]:
 > B) I wonder if we should resolve this issue by backing the "feature" out
 of Tor
 [...]
 > I don't actually remember how [Tails] intended to deploy their hack.

 I'm imagining a config option like __DontTouchNetwork=1 that you can stick
 on the commandline when you launch Tor. Then later you can turn it off
 when everything is configured as desired.

 The benefit there is that you, the packager, can make sure that the config
 option only gets set when Tor is bundled with other components that know
 how to do the hack you're doing.

 The way we've set it up now, people upgrading from a certain combination
 of components and configs automatically enable the hack. That's not nice.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3354#comment:18>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list