Information
ID: 343
PHID: PHID-TASK-inpyl5zaajgrqujrqfxw
Author: Patrick
Status at Migration Time: invalid
Priority at Migration Time: Normal
Description
Tor Browser Local Connections situation is a mess. With no sane (fingerprinting issue free) documented workaround.
! In T291#5255, @HulaHoop wrote:
Or maybe we can use something like rinetd somehow for a safer solution.
Interesting idea. For example, the yacy (or i2p) webinterface could bind to 127.0.0.1:<some-port>
(the default, no magic). rinetd
(or so) could listen on 10.152.152.11:<some-port>
and forward to 127.0.0.1:<some-port>
.
TODO:
- #research if that works
- add to documentation
- bonus: (Disadvantage: other workstations can connect to the service listening on 10.152.152.11. A warning needs to be added. But perhaps a separate, virtual, firewalled interface could be added for that purpose.)
Comments
Patrick
2015-06-06 01:56:18 UTC