[tor-bugs] #13006 [TorBirdy]: EHLO 127.0.0.1 is not a good choice

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Nov 2 13:36:45 UTC 2014


#13006: EHLO 127.0.0.1 is not a good choice
--------------------------+----------------------
     Reporter:  ww        |      Owner:  ioerror
         Type:  defect    |     Status:  reopened
     Priority:  major     |  Milestone:
    Component:  TorBirdy  |    Version:
   Resolution:            |   Keywords:
Actual Points:            |  Parent ID:
       Points:            |
--------------------------+----------------------
Changes (by ww):

 * status:  closed => reopened
 * resolution:  wontfix =>


Comment:

 I agree creating special names is a bit icky because DNS is too
 centralised. localhost -> 127.0.0.1 is a special name, though.

 However I disagree that an email server with this problem is broken --
 such an email server is expecting clients to follow the SMTP RFCs (i.e.
 822, 1869) which say that a conversation starts by identifying yourself.
 If a client falsely identifies itself as localhost, it makes sense for the
 server to say, "you're lying, go away". Using localhost/127.0.0.1 is an
 ugly kludge.

 A correct way to solve this would be to make a name like "anonymous" with
 an RFC that says "in protocols like SMTP where a host is expected to
 identify itself with a name it MAY use 'anonymous' if it does not wish to
 reveal its true name" possibly together with an address allocation from
 one of the reserved blocks. Want to write an internet draft to create
 anonymity in the naming infrastructure? Could be fun.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13006#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list