DNF torproxy #6395
Labels
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
R: not applicable
E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
The problem you're addressing (if any)
dnf updates for Fedora qubes are currently configured to implicitly use a Whonix tor gateway as a transport. An option that could be discussed is explicitly using the dnf torproxy plugin instead.
Describe the solution you'd like
I'm ambivalent currently, editing the configuration file to comment out the proxy is convenient because the default behavior is reset on reboot. It's handy to temporarily switch tunnels when one is slow or being deliberately disrupted. Exit nodes will be getting systems fingerprinted, some tor exit nodes are always going to be attack vectors.
However it's usually better to be explicit in design then to rely upon implicit behaviors. Using the torproxy plugin allows the system's default configuration to say, "use tor, or fail"
However an additional software module introduces additional points of attack and failure.
Where is the value to a user, and who might that user be?
Describe alternatives you've considered
Additional context
Relevant documentation you've consulted
https://dnf-plugins-extras.readthedocs.io/en/latest/torproxy.html
Related, non-duplicate issues
The text was updated successfully, but these errors were encountered: