#30472: Implement a mechanism for PT reachability testing -----------------------------------------------+--------------------------- Reporter: phw | Owner: phw Type: project | Status: | needs_review Priority: High | Milestone: Component: Circumvention/Pluggable transport | Version: Severity: Major | Resolution: Keywords: reachability | Actual Points: Parent ID: #30471 | Points: Reviewer: | Sponsor: Sponsor19 -----------------------------------------------+---------------------------
Comment (by phw): Replying to [comment:8 cohosh]: > I think the `timeout` input to [https://github.com/NullHypothesis/obfs4PortScan/blob/fix/30472/handlers.go#L70 isTCPPortReachable] is redudant now. [[br]] Yes, good catch. [[br]] > As long as you're not logging IP addresses, this seems fine to me. You're also not exporting the data, it's mostly a consideration in the case that the machine or service is compromised. I don't see issues with an attacker getting ahold of the number of requests made and the times at which they are made. There are probably easier ways to find out whatever information they would hope to find out from these logs anyway. [[br]] Yes, agreed. Ok, I'll move forward with setting up the service on polyanthum. Thanks for the reviews! -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30472#comment:9> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs