[tor-bugs] #29570 [Core Tor/Tor]: Enforce mutually exclusive logic for IPv6 ORPort flags
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Mar 4 14:25:58 UTC 2019
#29570: Enforce mutually exclusive logic for IPv6 ORPort flags
-------------------------------------------------+-------------------------
Reporter: s7r | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version: Tor:
| unspecified
Severity: Normal | Resolution:
Keywords: tor-relay, ipv6, reachability, | Actual Points:
needs-proposal |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by neel):
Replying to [comment:9 teor]:
> Allowing an IPv4 and an IPv6 advertised address to redirect to the same
underlying port:
> * makes 1 and 2 better for a few relays
> * makes 3, 4, and 5 slightly worse, all over the network
>
> Rejecting this rare case:
> * makes 1 and 2 worse for a few relays
> * makes 3, 4, and 5 slightly better, all over the network
> * makes 6 a tiny bit worse, because it requires a little bit of extra
code and documentation
I would also reject this case (redirecting IPv6 to IPv4).
It adds unnecessary complexity to the Tor code and network setup to be
worth it. (At least in my opinion) the costs would be more than the
benefits.
Why not just listen on IPv6 as well instead of giving "IPv6" which is
really a tunneled IPv4 socket?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29570#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list