[tor-bugs] #16917 [Tor Browser]: Support torified torsocks ssh -D socks proxy ports (for wingnuts)

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Oct 15 22:03:21 UTC 2015


#16917: Support torified torsocks ssh -D socks proxy ports (for wingnuts)
----------------------------------------------+----------------------------
 Reporter:  mikeperry                         |          Owner:
     Type:  enhancement                       |  cypherpunks
 Priority:  Medium                            |         Status:  new
Component:  Tor Browser                       |      Milestone:
 Severity:  Normal                            |        Version:
 Keywords:  tbb-usability-stoppoint-wingnuts  |     Resolution:
Parent ID:                                    |  Actual Points:
  Sponsor:                                    |         Points:
----------------------------------------------+----------------------------
Changes (by isis):

 * severity:   => Normal


Comment:

 As one of the aforementioned wingnuts, I also do this from time to time to
 access things that I absolutely need to access which block tor.  The
 following patch to Torbutton will make Tor Browser work for this purpose
 again:

 {{{
 From d47796696555f34a5dba358ce47cbef9ec572097 Mon Sep 17 00:00:00 2001
 From: Isis Lovecruft <isis at torproject.org>
 Date: Fri, 28 Aug 2015 03:36:17 +0000
 Subject: [PATCH] Disable SocksAuth so that SSH tunnels work again.

 ---
  src/components/domain-isolator.js | 4 ++--
  1 file changed, 2 insertions(+), 2 deletions(-)

 diff --git a/src/components/domain-isolator.js b/src/components/domain-
 isolator.js
 index 93c7f65..26476ba 100644
 --- a/src/components/domain-isolator.js
 +++ b/src/components/domain-isolator.js
 @@ -71,8 +71,8 @@ tor.socksProxyCredentials = function (originalProxy,
 domain) {
    return mozilla.protocolProxyService
             .newSOCKSProxyInfo(proxy.host,
                                proxy.port,
 -                              domain, // username
 -                              tor.noncesForDomains[domain].toString(), //
 password
 +                              null, //domain, // username
 +                              null,
 //tor.noncesForDomains[domain].toString(), // password
                                proxy.flags,
                                proxy.failoverTimeout,
                                proxy.failoverProxy);
 --
 2.1.4
 }}}

 It's in my `fix/disable-socks-auth_r1`
 [https://github.com/isislovecruft/torbutton/compare/fix/disable-socks-
 auth_r1?expand=1 branch], and it should be applied to `master`.
 Afterwards, running `makexpi.sh` and then installing the produced .xpi
 addon in `pkg/` in a separate Tor Browser will enable that browser to work
 again through an SSH tunnel.

 However, I do not think this patch is suitable for merging.  Obviously,
 there should be some preference to enable us "wingnuts" to enable a
 feature that could prove dangerous and/or confusing for sane people. Any
 recommendations as to the best way to proceed are entirely welcome.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16917#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list