[tor-bugs] #8215 [Tor]: Simple Relay: random unknown UDP port in listen mode

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Feb 20 13:14:14 UTC 2013


#8215: Simple Relay: random unknown UDP port in listen mode
--------------------------+-------------------------------------------------
    Reporter:  elgo       |       Owner:                  
        Type:  defect     |      Status:  closed          
    Priority:  normal     |   Milestone:  Tor: unspecified
   Component:  Tor        |     Version:                  
  Resolution:  not a bug  |    Keywords:  tor-relay       
      Parent:             |      Points:                  
Actualpoints:             |  
--------------------------+-------------------------------------------------

Comment(by elgo):

 Ok, now I understand what is said (I wasn't sure at first), but I really,
 really, don't get it. Why on earth a software would need to open a
 listening ("server") socket to make a DNS request??
 Seriously?
 Don't tell me this is not simpler to actually directly call the "callback
 function" behind this listening socket than open 2 sockets (the listening
 one and the one to communicate with it) to do a DNS request...

 It seems pretty insane to me. :/

 Don't get me wrong, I'm first trying to understand how Tor works, abd I'm
 not telling you what to do "your work" ;)
 But basically, I can't run a piece of software 24/24 on a 100Mbps node if
 I can't trust it.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8215#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list