Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #21991

Closed (moved)
(moved)
Open
Created Apr 19, 2017 by teor@teor

Allow bandwidth scanners to use non-Exits to access onion addresses

Tor's bandwidth scanner passes the bandwidth server HTTPS address to Tor's SOCKSPort. So using an onion address should just work.

But to get the full benefit from onion addresses, we need to do two things:

  • run the bandwidth server as a single onion service (otherwise the variance is too high), and
  • allow the second relay in the path to be a middle or guard when connecting to onion addresses.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking