[tor-bugs] #9998 [Tor]: resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Nov 11 16:31:55 UTC 2013


#9998: resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1
-----------------------------+---------------------------------------
     Reporter:  proper       |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-client needs-proposal
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+---------------------------------------
Changes (by nickm):

 * keywords:  tor-relay => tor-client needs-proposal


Comment:

 Ah, that does sound like a good idea. You could do it with a general hosts
 file mechanism in the dns client code.

 I do worry a bit about cross-site attacks here; do we have somebody with
 the appropriate expertise that can help us figure those out?  In
 particular, the "visit http://localhost/" thing makes me a bit nervous
 that there could be somebody using a Tor-enabled web browser to see
 whether localhost is running a web server, or something like that.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9998#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list