diff options
| author | Wladimir J. van der Laan <[email protected]> | 2015-03-16 16:30:49 +0100 |
|---|---|---|
| committer | Wladimir J. van der Laan <[email protected]> | 2015-04-17 13:26:47 +0200 |
| commit | 67a79493976a3d5f5dac6ec64993fc3f415cac43 (patch) | |
| tree | 347b15fb2f4b0020160bf45a3ee91da9b4d12689 /src/rpcnet.cpp | |
| parent | Merge pull request #6012 (diff) | |
| download | discoin-67a79493976a3d5f5dac6ec64993fc3f415cac43.tar.xz discoin-67a79493976a3d5f5dac6ec64993fc3f415cac43.zip | |
privacy: Stream isolation for Tor
According to Tor's extensions to the SOCKS protocol
(https://gitweb.torproject.org/torspec.git/tree/socks-extensions.txt)
it is possible to perform stream isolation by providing authentication
to the proxy. Each set of credentials will create a new circuit,
which makes it harder to correlate connections.
This patch adds an option, `-proxyrandomize` (on by default) that randomizes
credentials for every outgoing connection, thus creating a new circuit.
2015-03-16 15:29:59 SOCKS5 Sending proxy authentication 3842137544:3256031132
Diffstat (limited to 'src/rpcnet.cpp')
| -rw-r--r-- | src/rpcnet.cpp | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/src/rpcnet.cpp b/src/rpcnet.cpp index 6306fd440..bdee5b9f2 100644 --- a/src/rpcnet.cpp +++ b/src/rpcnet.cpp @@ -371,7 +371,8 @@ static Array GetNetworksInfo() obj.push_back(Pair("name", GetNetworkName(network))); obj.push_back(Pair("limited", IsLimited(network))); obj.push_back(Pair("reachable", IsReachable(network))); - obj.push_back(Pair("proxy", proxy.IsValid() ? proxy.ToStringIPPort() : string())); + obj.push_back(Pair("proxy", proxy.IsValid() ? proxy.proxy.ToStringIPPort() : string())); + obj.push_back(Pair("proxy_randomize_credentials", proxy.randomize_credentials)); networks.push_back(obj); } return networks; |