-
Notifications
You must be signed in to change notification settings - Fork 455
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LAN and Tor #958
Comments
This is intentional so Tor won't leak traffic from/to your local network. |
But the same can be said for VPN. But all remained still for VPN interface. |
It is inconsistent, yes. I did it this way is because I don't know much about Android GUI design and didn't want to over complicate the feature addition. |
This behavior needs to change. |
How would the user indicate they want all traffic to be Torified? |
If only Tor checkbox is enabled then traffic goes only through Tor. Just like with VPN. |
How do we tell if the Tor client is enabled or disabled? |
Add the option to define Tor client address. |
Does Orbot give a notification? |
Why get attached to Orbot? |
AFWall has to get notified that Tor is up or down from somewhere. |
By checking the binding address. |
How often will it do this? Will it wake the device up? |
Also add option to define timeout in seconds. |
But unless Orbot is checked for running status now? |
I don't know enough Android programming to implement this feature. |
You don't have to add a new checking necessary. |
It's not checked. |
Then don't check anything :) |
But then won't that mean if you check LAN and Tor, traffic won't be redirected to Tor? Ignoring the Tor checkbox, AFWall lists destinations that traffic can go. Changing this so that if Tor isn't running the application will mean people's firewalls will now open if Tor is disabled rather than block connections. For extra safety I'd like this to somehow be tied to how Orbot is configured- not just if Tor is down but whether it's disabled or enabled. That way if a bad guy somehow kills Tor connections it won't bypass while Orbot is reconnecting. @ukanth: Any thoughts? I could be up for implementing this. |
Well. |
Now we have to check a few checkboxes for Tor. And if Tor checkbox was disabled then we can forget to remove other checkboxes and traffic redirects through other network interfaces. This is dangerous too. |
The same can be said about VPN too. But if VPN is reconnecting and other network interfaces are enabled for app then app traffic would be redirected to other enabled network interfaces. |
Please separate LAN/VPN and Tor control for apps.
If LAN/VPN and Tor is allowed for app and Orbot is down then no access to devices over LAN/VPN.
The text was updated successfully, but these errors were encountered: