[tor-bugs] #8749 [Tor]: Return information about the leaking application

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Apr 20 11:07:44 UTC 2013


#8749: Return information about the leaking application
-------------------------+--------------------------------------------------
 Reporter:  bastik       |          Owner:     
     Type:  enhancement  |         Status:  new
 Priority:  normal       |      Milestone:     
Component:  Tor          |        Version:     
 Keywords:               |         Parent:     
   Points:               |   Actualpoints:     
-------------------------+--------------------------------------------------
 Log from where the leaking request came.

 When Tor says (in the Vidalia log):

 > Potentially Dangerous Connection! - One of your applications established
 a connection through Tor to "!IP:PORT" using a protocol that may leak
 information about your destination. Please ensure you configure your
 applications to use only SOCKS4a or SOCKS5 with remote hostname
 resolution.

 could Tor tell what port the connection was made from? Maybe the log could
 include SOCKS details (like username). I don't think it isn't able to
 identify the application.

 Sure it's bad to use random stuff with Tor, but this information makes it
 easier to sort out applications that leak.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8749>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list