diff options
author | Roger Dingledine <arma@torproject.org> | 2008-01-20 05:54:15 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2008-01-20 05:54:15 +0000 |
commit | ff62154ba3cb79b4b38f937552fdced04d2d950d (patch) | |
tree | 537dc1c42f159314af9e97a848bffab12840a3e9 /doc/spec | |
parent | a1f2817307ee2d4b4754db1d76f96f8019f5e857 (diff) | |
download | tor-ff62154ba3cb79b4b38f937552fdced04d2d950d.tar tor-ff62154ba3cb79b4b38f937552fdced04d2d950d.tar.gz |
New config options WarnPlaintextPorts and RejectPlaintextPorts so
Tor can warn and/or refuse connections to ports commonly used with
vulnerable-plaintext protocols.
We still need to figure out some good defaults for them.
svn:r13198
Diffstat (limited to 'doc/spec')
-rw-r--r-- | doc/spec/control-spec.txt | 17 |
1 files changed, 15 insertions, 2 deletions
diff --git a/doc/spec/control-spec.txt b/doc/spec/control-spec.txt index 98e511436..5448394a6 100644 --- a/doc/spec/control-spec.txt +++ b/doc/spec/control-spec.txt @@ -1300,9 +1300,22 @@ $Id$ to do so.} [Note: only REASON=CLOCK_JUMPED is implemented currently.] + DANGEROUS_PORT + "PORT=" port + "RESULT=" "REJECT" / "WARN" + A stream was initiated to a port that's commonly used for + vulnerable-plaintext protocols. If the Result is "reject", we + refused the connection; whereas if it's "warn", we allowed it. + + {Controllers should warn their users when this occurs, unless they + happen to know that the application using Tor is in fact doing so + correctly (e.g., because it is part of a distributed bundle). They + might also want some sort of interface to let the user configure + their RejectPlaintextPorts and WarnPlaintextPorts config options.} + DANGEROUS_SOCKS - "PROTOCOL=SOCKS4/SOCKS5" - "ADDRESS=IP:port" + "PROTOCOL=" "SOCKS4" / "SOCKS5" + "ADDRESS=" IP:port A connection was made to Tor's SOCKS port using one of the SOCKS approaches that doesn't support hostnames -- only raw IP addresses. If the client application got this address from gethostbyname(), |