#2813 closed defect (fixed)
allow tor socks.port= to use unix-domain sockets
Reported by: | warner | Owned by: | warner |
---|---|---|---|
Priority: | normal | Milestone: | 1.12.0 |
Component: | code-network | Version: | 1.11.0 |
Keywords: | anonymity tor | Cc: | |
Launchpad Bug: |
Description
Ideally the tahoe.cfg [tor] socks.port= value would be an arbitrary endpoint specification, and it would be possible to speak SOCKS over a unix-domain socket to the Tor daemon. But foolscap is currently limited to accepting TCP hostname+port, so we cannot accept the full range of endpoint specifiers yet.
This ticket tracks the changes necessary to lift this restriction. We need Foolscap#265 to be fixed first, which may require changes to txtorcon. Then we can change allmydata.node.Node._make_tor_handler to use endpoints.clientFromString(socksport).
Change History (5)
comment:1 Changed at 2016-08-29T01:14:40Z by Brian Warner <warner@…>
comment:2 Changed at 2016-08-31T11:29:07Z by dawuud
i think we should simplify and remove some code; i've removed the parsing of the SOCKS port because it should be a twisted endpoint descriptor string and we can simply call clientFromString and then pass the resulting endpoint object to the Foolscap Tor SOCKS handler constructor:
https://github.com/tahoe-lafs/tahoe-lafs/pull/327
please review
comment:3 Changed at 2016-08-31T11:29:27Z by dawuud
- Owner set to warner
comment:4 Changed at 2016-09-02T03:29:18Z by David Stainton <dstainton415@…>
- Resolution set to fixed
- Status changed from new to closed
In 1307c72/trunk:
comment:5 Changed at 2016-09-02T17:24:16Z by warner
- Milestone changed from soon to 1.12.0
In a099b92/trunk: