[tor-bugs] #16221 [Tor Browser]: Investiate WebRTC with TCP-ICE and hidden services

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jun 1 15:58:11 UTC 2015


#16221: Investiate WebRTC with TCP-ICE and hidden services
-----------------------------+----------------------
     Reporter:  mikeperry    |      Owner:  tbb-team
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:
    Component:  Tor Browser  |    Version:
   Resolution:               |   Keywords:  ff38-esr
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+----------------------

Comment (by cypherpunks):

 Replying to [comment:3 mikeperry]:
 > Skimming some docs makes it seem like  it may be possible to advertise a
 non-running HS address before agreeing to use it

 Is this just to prevent hidden services from being silently created when
 the user doesn't want them?

 I don't think it's necessary or desirable to do something with an
 ephemeral onion address before publishing its descriptor to the HSDirs.
 Instead, I think when a website tries to initiate WebRTC in Tor Browser it
 should initially fail (as it does now) but prompt the user (with the
 standard permissions prompt, like it does for canvas reads) asking
 something like "Do you want to allow incoming connections to your browser
 while you're viewing this site?". If the user says yes, an ephemeral onion
 should be created and the page should reload.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16221#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list