[tahoe-lafs-trac-stream] [tahoe-lafs] #517: make tahoe Tor- and I2P-friendly

tahoe-lafs trac at tahoe-lafs.org
Tue Jan 14 17:54:01 UTC 2014


#517: make tahoe Tor- and I2P-friendly
-------------------------+-------------------------------------------------
     Reporter:  warner   |      Owner:  ioerror
         Type:           |     Status:  new
  enhancement            |  Milestone:  undecided
     Priority:  minor    |    Version:  1.2.0
    Component:  code-    |   Keywords:  easy privacy anonymity anti-
  network                |  censorship i2p tor
   Resolution:           |
Launchpad Bug:           |
-------------------------+-------------------------------------------------
Changes (by zooko):

 * keywords:  easy privacy anonymity anti-censorship => easy privacy
     anonymity anti-censorship i2p tor


Old description:

> Jake Appelbaum and I were talking at the last hackfest about what it
> would take to run Tahoe safely through the Tor (anonymizing onion-router)
> proxy.
>
> I figured it wouldn't take much: just removing the automatically-added
> local IP addresses from the advertised FURLs. You'd treat the tubid as a
> pseudonym (i.e. never run this node without Tor). Listeners would be a
> complete loss (that is, other nodes would not be able to establish
> connections to yours, until 1: we get SOCKS4A client-side support into
> Twisted, 2: make sure Foolscap can use .onion names in connection hints,
> and 3: add a Foolscap Listener that establishes itself on a Tor hidden-
> service port).
>
> But beyond that, it should just be a question of running Tahoe under
> 'tsocks', so that all of its outbound connections go through the socks
> proxy and then through Tor to the other servers.
>
> So the task for this ticket: provide a configuration knob to override the
> default "find all my IP addresses and add them to the connection hints
> (via Tub.setLocation)" behavior, and instead provide a hard-coded list of
> hints instead.

New description:

 Jake Appelbaum and I were talking at the last hackfest about what it would
 take to run Tahoe safely through the Tor (anonymizing onion-router) proxy.

 I figured it wouldn't take much: just removing the automatically-added
 local IP addresses from the advertised FURLs. You'd treat the tubid as a
 pseudonym (i.e. never run this node without Tor). Listeners would be a
 complete loss (that is, other nodes would not be able to establish
 connections to yours, until 1: we get SOCKS4A client-side support into
 Twisted, 2: make sure Foolscap can use .onion names in connection hints,
 and 3: add a Foolscap Listener that establishes itself on a Tor hidden-
 service port).

 But beyond that, it should just be a question of running Tahoe under
 'tsocks', so that all of its outbound connections go through the socks
 proxy and then through Tor to the other servers.

 So the task for this ticket: provide a configuration knob to override the
 default "find all my IP addresses and add them to the connection hints
 (via Tub.setLocation)" behavior, and instead provide a hard-coded list of
 hints instead.

--

-- 
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/517#comment:14>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list