document Tor Browser local connections workaround

Information

ID: 343
PHID: PHID-TASK-inpyl5zaajgrqujrqfxw
Author: Patrick
Status at Migration Time: invalid
Priority at Migration Time: Normal

Description

Tor Browser Local Connections situation is a mess. With no sane (fingerprinting issue free) documented workaround.

! In T291#5255, @HulaHoop wrote:
Or maybe we can use something like rinetd somehow for a safer solution.

Interesting idea. For example, the yacy (or i2p) webinterface could bind to 127.0.0.1:<some-port> (the default, no magic). rinetd (or so) could listen on 10.152.152.11:<some-port> and forward to 127.0.0.1:<some-port>.

TODO:

  • #research if that works
  • add to documentation
  • bonus: (Disadvantage: other workstations can connect to the service listening on 10.152.152.11. A warning needs to be added. But perhaps a separate, virtual, firewalled interface could be added for that purpose.)

Comments


Patrick

2015-06-06 01:56:18 UTC