[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #6710 [Tor Relay]: Tor Relays accept arbitrary destination address and port and leak information about reachability



#6710: Tor Relays accept arbitrary destination address and port and leak
information about reachability
-----------------------+----------------------------------------------------
 Reporter:  thejh      |          Owner:                    
     Type:  defect     |         Status:  needs_review      
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: unspecified  
 Keywords:             |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------

Comment(by arma):

 A) I'm fine with this going into 0.2.3. Though you'll probably be
 decreasing the chances that future debians take this 0.2.3 update -- I
 think this would be fine as an 0.2.4 fix too. I think it is not a critical
 bug (we've known about it for years, and this fix isn't much of a fix) and
 thus doesn't need to go into 0.2.2.

 B) I doubt this is a bug on 'all released versions of tor'. For example,
 before 0.0.8pre1 relays would only extend on connections that already had
 a tcp connection open.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6710#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs