Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Tor Tor
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 824
    • Issues 824
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 34
    • Merge requests 34
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • Core
  • TorTor
  • Issues
  • #3501
Closed
Open
Created Jun 29, 2011 by Jacob Appelbaum@ioerror

Teach Tor to run the Control Port over TLS

I've been discussing how we can use Vidalia with chiiph as a Tor controller over a network - this would be useful for the Torouter for example.

I think that a TOFU (Trust On First Use) model is probably best and that would mean we'd simply need a Tor Control Port that uses a static TLS cert/key combo. I guess we could do a bare key or we could do the full x509 nightmare. I don't really have a preference.

This would allow us to control Tor safely as the control port data exported by Vidalia doesn't seem safe to expose to an attacker.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking