Add SOCKSAndDNS link to appropriate log message, since we wind up pointing everybody to it anyway

svn:r4695
This commit is contained in:
Nick Mathewson 2005-08-04 20:12:44 +00:00
parent 4cb89fd557
commit 4870877231

View File

@ -950,7 +950,7 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req)
req->port = ntohs(*(uint16_t*)(buf->cur+8)); req->port = ntohs(*(uint16_t*)(buf->cur+8));
buf_remove_from_front(buf, 10); buf_remove_from_front(buf, 10);
if (!have_warned_about_unsafe_socks) { if (!have_warned_about_unsafe_socks) {
log_fn(LOG_WARN,"Your application (using socks5 on port %d) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead.", req->port); log_fn(LOG_WARN,"Your application (using socks5 on port %d) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead. For more information, please see http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS", req->port);
// have_warned_about_unsafe_socks = 1; // (for now, warn every time) // have_warned_about_unsafe_socks = 1; // (for now, warn every time)
} }
return 1; return 1;