Closed eklitzke closed 5 years ago
This issue has been selected for development.
The complexity of searching for a 6-character base64 prefix should be about 1011 operations --- probably not worth it?
Couple of roadblocks:
/tmp/oragono
. (The connection failure did not produce an audit logline; this was a source of great puzzlement.) Switching to loopback TCP fixed it, but it would be preferable to rewrite the apparmor profile to allow this access.127.0.0.1
. This is problematic in terms of anti-abuse protections, since 127.0.0.0/8
is whitelisted from connection limits and throttling. One option would be to insert an additional layer that issues a PROXY
line, describing these clients as coming from a fictional IP in, e.g., 10.0.0.0/8
.It's worth considering HiddenServiceSingleHopMode
as an option for this (since the IP of the server is public information).
This is up now, but the circuits don't seem to stay open for more than a couple minutes, even with regular traffic:
Host: v7k2huxf5b353zgo7zgoo5tapsf6lkarcykkn7qdgx3kwugw4syzihqd.onion
Port: 6667
SSL/TLS: false
Password: smellyoulater
Channel: #darwin
The circuit lifetime issue is (to my considerable surprise) a bug in Tor: https://bugs.torproject.org/29665
Workarounds:
HiddenServiceSingleHopMode
(this likely requires changing the address)Option 2 was implemented in oragono/oragono#441, which seems to have fixed things. This is done.
Please setup a .onion domain (preferably with a vanity prefix like
darwinU5w2kbC6aeKVmeIR.onion
) so I can continue to use IRC when the globalists (ICANN) shut down DNS.