Replies: 4 comments 1 reply
-
looks like tor does attempt to negotiate a handshake
but the server discards it
something worth noting there is that the server name is different from the hidden service name I'm connecting to (I made a separate one for testing this feature, nothing about the log from inspircd seems to indicate that it should matter but I haven't looked the code over for the inspircd haproxy module yet, https://thc420.xyz/inspircd/commit/09c5439c02f31e9875083e51966dad535af005a9.html |
Beta Was this translation helpful? Give feedback.
-
also the connect class is another interesting point about this module with regards to identifying clients. It will connect via ipv4 which is fine, but Tor wants to identify the protocol handshake (also fine) using this ULA |
Beta Was this translation helpful? Give feedback.
-
InspIRCd only supports the PROXY v2 protocol not the v1 protocol. I can't tell for sure without seeing your config but that error suggests that it is not sending a v2 header. |
Beta Was this translation helpful? Give feedback.
-
I wanted to use this with tor which now supports
HiddenServiceExportCircuitID protocol
but it's for v1, which I assume is why it's not working but I'm not sure.https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt
https://manpages.debian.org/testing/tor/torrc.5.en.html
it will fail with this error
tor_dmz_1 | Fri Jan 21 2022 04:54:42 USERS: QuitUser: 50XAAAAAB=50XAAAAAB 'Invalid HAProxy PROXY signature'
which
could just mean that tor isn't doing what it says its supposed to do but it's not failing on that option either and that's always been pretty reliable.it is actually trying as is evidenced by the packet dump (refer to next few comments)not a huge problem for me just a nice to have. also nice if it can just pass through ssl connections since they're just coming from tor anyway.
Beta Was this translation helpful? Give feedback.
All reactions