aboutsummaryrefslogtreecommitdiff
path: root/doc/spec
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2008-01-20 05:54:15 +0000
committerRoger Dingledine <arma@torproject.org>2008-01-20 05:54:15 +0000
commitff62154ba3cb79b4b38f937552fdced04d2d950d (patch)
tree537dc1c42f159314af9e97a848bffab12840a3e9 /doc/spec
parenta1f2817307ee2d4b4754db1d76f96f8019f5e857 (diff)
downloadtor-ff62154ba3cb79b4b38f937552fdced04d2d950d.tar
tor-ff62154ba3cb79b4b38f937552fdced04d2d950d.tar.gz
New config options WarnPlaintextPorts and RejectPlaintextPorts so
Tor can warn and/or refuse connections to ports commonly used with vulnerable-plaintext protocols. We still need to figure out some good defaults for them. svn:r13198
Diffstat (limited to 'doc/spec')
-rw-r--r--doc/spec/control-spec.txt17
1 files changed, 15 insertions, 2 deletions
diff --git a/doc/spec/control-spec.txt b/doc/spec/control-spec.txt
index 98e511436..5448394a6 100644
--- a/doc/spec/control-spec.txt
+++ b/doc/spec/control-spec.txt
@@ -1300,9 +1300,22 @@ $Id$
to do so.}
[Note: only REASON=CLOCK_JUMPED is implemented currently.]
+ DANGEROUS_PORT
+ "PORT=" port
+ "RESULT=" "REJECT" / "WARN"
+ A stream was initiated to a port that's commonly used for
+ vulnerable-plaintext protocols. If the Result is "reject", we
+ refused the connection; whereas if it's "warn", we allowed it.
+
+ {Controllers should warn their users when this occurs, unless they
+ happen to know that the application using Tor is in fact doing so
+ correctly (e.g., because it is part of a distributed bundle). They
+ might also want some sort of interface to let the user configure
+ their RejectPlaintextPorts and WarnPlaintextPorts config options.}
+
DANGEROUS_SOCKS
- "PROTOCOL=SOCKS4/SOCKS5"
- "ADDRESS=IP:port"
+ "PROTOCOL=" "SOCKS4" / "SOCKS5"
+ "ADDRESS=" IP:port
A connection was made to Tor's SOCKS port using one of the SOCKS
approaches that doesn't support hostnames -- only raw IP addresses.
If the client application got this address from gethostbyname(),