>
>
> The use of different [address], dedicated only for incoming tor,
> is some workaround, but it has the obvious downside that if somebody
> manages to reach it and connect outside of tor, then the target
> application will perceive it as an incoming tor connection.
>

Hi Vasil!

The rest of the document, at length, describes how to prevent someone
reaching it and connecting from outside the machine which is running Tor.

Unix sockets are also a very good solution.  I use them in EOTK, for that
reason, and also because it reduces the risk of a port-exhaustion attack.

- alec

-- 
http://dropsafe.crypticide.com/aboutalecm
_______________________________________________
tor-onions mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions

Reply via email to