FINDING · DEPLOYMENT
Localhost TCP connections between the pluggable transport, load balancer, and Tor processes exhaust the ephemeral port space because source and destination IP addresses are both 127.0.0.1, leaving only port numbers to distinguish sockets. The mitigation uses distinct addresses across the full 127.0.0.0/8 loopback range combined with a custom orport-srcaddr option that assigns random source addresses from 127.0.1.0/24, expanding available socket four-tuples by a factor of 256.
From 2023-fifield-running — Running a high-performance pluggable transports Tor bridge · §4 · 2023 · Free and Open Communications on the Internet
Implications
- High-traffic PT bridge deployments must allocate distinct loopback subnets (e.g., 127.0.1.0/24, 127.0.2.0/24) for each IPC hop and implement randomized source-address selection to avoid ephemeral port exhaustion at scale.
- Future PT IPC designs should prefer Unix domain sockets or the in-process PT API over localhost TCP to eliminate the ephemeral port constraint entirely.
Tags
Extracted by claude-sonnet-4-6 — review before relying.