[tor-bugs] #8215 [Tor]: Simple Relay: random unknown UDP port in listen mode

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Mar 6 14:05:01 UTC 2013


#8215: Simple Relay: random unknown UDP port in listen mode
----------------------------+-----------------------------------------------
    Reporter:  elgo         |       Owner:                  
        Type:  enhancement  |      Status:  reopened        
    Priority:  normal       |   Milestone:  Tor: unspecified
   Component:  Tor          |     Version:                  
  Resolution:               |    Keywords:  tor-relay       
      Parent:               |      Points:                  
Actualpoints:               |  
----------------------------+-----------------------------------------------

Comment(by elgo):

 Waaaw, that is quite an awesome answer :) Really many thanks for taking
 time to explain this to me. That is crystal clear now on the "how".
 Now, I have some questions about "why", but new ones ;)

 So, in the "multiple_requests" scenario of Tor, you designed your DNS
 client like a sort of "deamon" and then never close this client DNS
 socket? Is it really worthy rather than opening 1:1 UDP socket to DNS
 servers? I mean, 1:1 UDP socket have the advantage of not accepting data
 from any source (which could not be a previously requested DNS server),
 compared to a "listening" UDP socket (I'm not considering the case of
 having a stateful FW in protecting Tor running box, I'm considering
 security matter of Tor itself).
 This random "listening UDP DNS client socket" has the disadvantage of
 being persistent through the whole "life" of Tor process, and is a new
 potential entry point to Tor (beyond ORPort and DirPort for a simple
 relay).

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8215#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list