[tahoe-lafs-trac-stream] [tahoe-lafs] #517: make tahoe Tor- and I2P-friendly

tahoe-lafs trac at tahoe-lafs.org
Fri Apr 19 20:13:58 UTC 2013


#517: make tahoe Tor- and I2P-friendly
-------------------------+-------------------------------------------------
     Reporter:  warner   |      Owner:  ioerror
         Type:           |     Status:  new
  enhancement            |  Milestone:  undecided
     Priority:  minor    |    Version:  1.2.0
    Component:  code-    |   Keywords:  easy privacy anonymity anti-
  network                |  censorship
   Resolution:           |
Launchpad Bug:           |
-------------------------+-------------------------------------------------

Old description:

> Jake Appelbaum and I were talking at the last hackfest about what it
> would take to run Tahoe safely through the Tor (anonymizing onion-router)
> proxy.
>
> I figured it wouldn't take much: just removing the automatically-added
> local IP addresses from the advertised FURLs. You'd treat the tubid as a
> pseudonym (i.e. never run this node without Tor). Listeners would be a
> complete loss (that is, other nodes would not be able to establish
> connections to yours, until 1: we get SOCKS4A client-side support into
> Twisted, 2: make sure Foolscap can use .onion names in connection hints,
> and 3: add a Foolscap Listener that establishes itself on a Tor hidden-
> service port).
>
> But beyond that, it should just be a question of running Tahoe under
> 'tsocks', so that all of its outbound connections go through the socks
> proxy and then through Tor to the other servers.
>
> So the task for this ticket: provide a configuration knob to override the
> default "find all my IP addresses and add them to the connection hints
> (via Tub.setLocation)" behavior, and instead provide a hard-coded list of
> hints instead.

New description:

 Jake Appelbaum and I were talking at the last hackfest about what it would
 take to run Tahoe safely through the Tor (anonymizing onion-router) proxy.

 I figured it wouldn't take much: just removing the automatically-added
 local IP addresses from the advertised FURLs. You'd treat the tubid as a
 pseudonym (i.e. never run this node without Tor). Listeners would be a
 complete loss (that is, other nodes would not be able to establish
 connections to yours, until 1: we get SOCKS4A client-side support into
 Twisted, 2: make sure Foolscap can use .onion names in connection hints,
 and 3: add a Foolscap Listener that establishes itself on a Tor hidden-
 service port).

 But beyond that, it should just be a question of running Tahoe under
 'tsocks', so that all of its outbound connections go through the socks
 proxy and then through Tor to the other servers.

 So the task for this ticket: provide a configuration knob to override the
 default "find all my IP addresses and add them to the connection hints
 (via Tub.setLocation)" behavior, and instead provide a hard-coded list of
 hints instead.

--

Comment (by leif):

 Running a grid on Tor hidden services works for me (by setting
 `tub.location` to an onion address and running tahoe under usewithtor),
 but I've noticed two IP address leaks so far (#1942 and #1947).

-- 
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/517#comment:13>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list