[tor-bugs] #14450 [Tor]: tor-resolve should better handle .onion addresses

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Jan 28 19:12:39 UTC 2015


#14450: tor-resolve should better handle .onion addresses
-------------------------+-------------------------------
 Reporter:  weasel       |          Owner:
     Type:  enhancement  |         Status:  new
 Priority:  normal       |      Milestone:
Component:  Tor          |        Version:  Tor: 0.2.5.10
 Keywords:               |  Actual Points:
Parent ID:               |         Points:
-------------------------+-------------------------------
 In https://bugs.debian.org/776454, Russell Coker asks for a slight
 modification of tor-resolve's behavior wrt .onion addresses:

   $ tor-resolve zp7zwyd5t3aju57m.onion
   Jan 28 17:38:42.055 [warn] Got SOCKS5 status response '4': host is
 unreachable
   Jan 28 17:38:42.055 [warn] zp7zwyd5t3aju57m.onion is a hidden service;
 those don't have IP addresses. To connect to a hidden service, you need to
 send the hostname to Tor; we suggest an application that uses SOCKS 4a.

   The above output is informative, but not particularly useful for the
 case of
   scripts.

   https://www.howtoforge.com/anonymous-ssh-sessions-with-tor

   The above web site gives an example of how to use tor which btraks when
 used
   with .onion addresses.  One way to solve this would be for tor-resolve
 to
   give "zp7zwyd5t3aju57m.onion" on stdout and the warning message on
 stderr,
   that would inform users but work in the desired manner with scripts.

   A small change to tor-resolve will make it work better with existing
 documented
   practice and make it work with future use for .onion addresses in cases
 where
   admins only care about non-onion addresses now.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14450>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list