On 2015/11/14 00:50, Uwe Werler wrote: > On Sat, Nov 14, 2015 at 12:35:32AM +0100, Stefan Sperling wrote: > > On Sat, Nov 14, 2015 at 01:05:12AM +0100, Rafael Sadowski wrote: > > > I prefer to enable by default: > > > > " Using Tor2web trades off security for convenience and usability." > > https://tor2web.org/ > > > > Please don't. > > > From man: > > Tor2webMode 0|1 > When this option is set, Tor connects to hidden services > non-anonymously. This option also disables client connections to > non-hidden-service hostnames through Tor. It must only be used when > running a tor2web Hidden Service web proxy. To enable this option > the compile time flag --enable-tor2webmode must be specified. > (Default: 0) > > I think it shouldn't be turned on per default - even if it's not enabled per > default in config. > > There are three scenarios therefore this mode is usefull: > > 1. You want to provide a http proxy which is able to connect to tor HS for > clients (resolving onion domains). > 2. You want to connect a reverse proxy to a HS. > 3. You want to inter connect two (or more) machines within the tor network in > client-server-mode. > > Regards Uwe > > -- >
So we have to balance the possibility of users shooting themselves in the foot by enabling the config option by mistake, with the possibility that someone will build their own "--enable-tor2webmode" package and either not update to a newer version when a security fix comes out because packages aren't available, or that will accidentally update to a version without this config option. So from what I've seen, I think that probably having this in a non- default FLAVOR with a good but concise explanation in DESCR of what it actually does is probably going to be the best idea. But the final decision should rest with the maintainer.