-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tor integration #16
Comments
As far as I see, there are three options for implementing (aside from bundling precompiled tor binaries):
|
Using |
I still think it's the best option. The alternative is routing our transport over a proxy which has the same exact issues. Of course, we cannot with absolute certainty guarantee the same level of security as a sandboxed environemnt (Tails or Whonix). |
We might also remove or change the Identity behaviour |
#196 added support for dialing over tor using arti_client. |
This pull requests - Adds rust native support for the `asb` to listen on an onion service. Previously we were depedent on a seperately running `torc` client. Instead we now use [arti](https://tpo.pages.torproject.net/core/arti/), a rust implementation of the tor protocol. - Removes the `tor.control_port` and `tor.socks5_port` property from the config of the `asb` - Adds a new `tor.register_hidden_service` boolean property to the config of the `asb` which when enabled automatically runs a hidden service at startup - Adds a new `tor.hidden_service_num_intro_points` config property to specify how many introduction points to register the onion service at - Adds support for the `cli` to dial onion addresses This is dependent on umgefahren/libp2p-tor#24 Closes #16
We need to allow the user to start tor from within the GUI. We previously did this by bundling precompiled tor binaries. We can do better now by using libtor
The text was updated successfully, but these errors were encountered: