[tahoe-lafs-trac-stream] [Tahoe-LAFS] #3888: Handling Tor and i2p in NURLs

Tahoe-LAFS trac at tahoe-lafs.org
Mon Jul 25 14:19:17 UTC 2022


#3888: Handling Tor and i2p in NURLs
--------------------------+-----------------------------------
     Reporter:  itamarst  |      Owner:
         Type:  defect    |     Status:  new
     Priority:  normal    |  Milestone:  HTTP Storage Protocol
    Component:  unknown   |    Version:  n/a
   Resolution:            |   Keywords:
Launchpad Bug:            |
--------------------------+-----------------------------------

Comment (by itamarst):

 More notes: the way we've decided to implement listening (#3902) is by
 sharing the Foolscap TCP port, and therefore the Foolscap listening and
 configuration-parsing logic, specifically `tub.port` and `tub.location`.

 For the moment, then, the actual logic for _listening_ on these ports is
 implemented by Foolscap, there is no need for HTTP-specific code. However,
 we do need custom NURL generation for Tor (the `.onion` domain) and I2P.
 This can be done post-#3902, and sounds like we decided on `pb://` for Tor
 and `pb+i2p://` for I2P. Even though the Tor endpoint has same URL
 structure as normal endpoint, it still needs custom code to generate it.

 In the long term we will need to reimplement the listening logic, but that
 might take a while due to need for backwards compatibility.

 On the _client_ side we need two things:

 1. At minimum, HTTP client code that understands `.onion` URLs (#3910).
 2. An HTTP-specific Tor policy for additional privacy, specifically to
 address timing analysis attacks, which would work both with `.onion` and
 public servers. For example, the Tor Browser has a bunch of policies about
 how it routes to different domains and to a specific domain to reduce this
 risk. This is probably a long-term thing (#3911).

--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/3888#comment:9>
Tahoe-LAFS <https://Tahoe-LAFS.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list