I wonder if #curl could follow the wonderful example from the #Radicle project on how to properly support #Tor onion service endpoints.
daniel.haxx.se/blog/2025/05/16…
#TorProject #libcurl #HumanRights
Leeks and leaks
On the completely impossible situation of blocking the Tor .onion TLD to avoid leaks, but at the same time not block it to make users able to do what they want.daniel.haxx.se
feld
in reply to Shawn Webb • • •daniel:// stenberg://
in reply to Shawn Webb • • •Shawn Webb
in reply to daniel:// stenberg:// • • •daniel:// stenberg://
in reply to Shawn Webb • • •Shawn Webb
in reply to daniel:// stenberg:// • • •.onion
lookups are prohibited by libcurl, so a curl is broken for transparent proxying setups--effectively a prohibition.daniel:// stenberg://
in reply to Shawn Webb • • •Leeks and leaks
daniel.haxx.seShawn Webb
in reply to Shawn Webb • • •@bagder Essentially, #curl commit
0ae0abbe72514a75c10bfc4108d9f254f594c086
broke updating #HardenedBSD packages for certain users who use HardenedBSD behind a fully Tor-ified network (a network that uses transparent Tor proxying).Those users were unable to update their HardenedBSD systems since the package manager uses libcurl behind-the-scenes. Some of these users live in malicious environments (malicious to human life), with actively-exploited applications.
So, this prohibition had a real negative impact, putting our users in harm's way.
If curl had a way to bypass the prohibition, we would've been able to keep our users safe.
This is why I mention #Radicle: they, too, do not support the
.onion
TLD by default, but can be configured to provide that support.Radicle has three options:
.onion
domain lookups will fail..onion
lookups succeed..onion
lookups succeedcurl is missing that third option.
daniel:// stenberg://
in reply to Shawn Webb • • •Shawn Webb
in reply to daniel:// stenberg:// • • •@bagder because you seem to me to be somewhat confused. Like statements like "if they're transparent, what's there to support?"
But, whatever, I already maintain a patch for #HardenedBSD users to remove the prohibition. The problem is solved on HardenedBSD.
daniel:// stenberg://
in reply to Shawn Webb • • •right, but you also re-introduce the problem to those who mistakenly use .onion without the proxy setup. Like the RFC tries to address... So right, you opt the other option of the two.
I don't have the solution.