I have connected to my hidden service with RFC 6455 web-socket and feel like a kid in a candy store streaming API requests and return data back and forth at good, reliable speeds. My concern is that I am missing something here.....

My mental model is that, once the connection and http upgrade request is established, TOR sees this as a long running http request and will will not close the circuit or change the route until the either side breaks the connection.

I would appreciate if someone could comment:

1) Am I correct in my mental model?

2) Am I perpetrating a security anti-pattern by holding the connection open indeterminately?

Thanks in advance.

tor-onions mailing list

Reply via email to