aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--proposals/339-udp-over-tor.md13
1 files changed, 13 insertions, 0 deletions
diff --git a/proposals/339-udp-over-tor.md b/proposals/339-udp-over-tor.md
index 2db0341..813531e 100644
--- a/proposals/339-udp-over-tor.md
+++ b/proposals/339-udp-over-tor.md
@@ -237,6 +237,19 @@ TODO: Various kinds of traffic we want to avoid
- Excessive sends to a host that has never replied (DoS)
- Excessive number of peers (makes port scanning too much easier)
+See also RFC 7675, on the concept of "Send consent".
+
+# Anonymity risks
+
+TODO: ICE connectivity checks, as mentioned elsewhere.
+
+TODO: Are there plaintext identifiers in these telecom apps?
+
+TODO: Is there any chance we make the anonymity risk worse by providing UDP exits than it would be with an application-provided TCP relay server?
+
+# Alternative designs
+
+TODO: Comparison vs. an entirely out-of-protocol and potentially out-of-process TURN server. Is this complexity warranted?
# Tor protocol design