[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10777 [Tor]: Remotely triggerable circuit destruction by path bias code



#10777: Remotely triggerable circuit destruction by path bias code
-----------------------------+-----------------------------------
     Reporter:  cypherpunks  |      Owner:
         Type:  defect       |     Status:  needs_review
     Priority:  major        |  Milestone:  Tor: 0.2.4.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-client regression
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------------------------

Comment (by cypherpunks):

 >We only return INTERNAL if the decryption itself fails, not for
 unrecognized. Still digging for other cases...
 All working end stream reasons can be sent only after success relay cell
 decryption. Exit or AP can't to send relay_end if digest or 'recognized'
 field was wrong. Any STREAM END reason, including
 END_STREAM_REASON_INTERNAL and END_STREAM_REASON_DESTROY. Exit sends end
 stream (it's not circuit!) only if plain text was invalid for some
 reasons.

 If you believe tagging attack can be undetectable by honest exit node
 during digest checking, why do you think checking end stream reason have
 any sense?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10777#comment:21>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs