[tor-bugs] #17949 [Tor]: Make loopback address search more efficient

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Feb 2 00:47:21 UTC 2016


#17949: Make loopback address search more efficient
------------------------------------+------------------------------------
 Reporter:  teor                    |          Owner:  rl1987
     Type:  enhancement             |         Status:  accepted
 Priority:  Medium                  |      Milestone:  Tor: 0.2.8.x-final
Component:  Tor                     |        Version:
 Severity:  Normal                  |     Resolution:
 Keywords:  easy TorCoreTeam201602  |  Actual Points:
Parent ID:  #17991                  |         Points:
  Sponsor:                          |
------------------------------------+------------------------------------

Comment (by teor):

 Replying to [comment:6 bugzilla]:
 > In general, localhost is a TLD, and it must be resolved through DNS. In
 one of related tickets stated that 127.0.0.1 can be seamlessly redirected
 to public IP by the system. DNS can return "not found". So, there are
 enough reasons to stop rely on localhost as a security solution.
 > General practice is that services listen on 0 (0.0.0.0 and/or [::]).
 Address filtering is a task of firewall. To handle all tasks by tor
 instance is not a good practice.

 Tor aims to be secure by design and by default. Having secure defaults
 means that even if operators are unaware of or forget a particular
 security best practice, they will end up with an acceptably secure
 configuration.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17949#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list