[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #29487 [Core Tor/Tor]: SOCKS5 handshake fail when client sending user/pass auth method



#29487: SOCKS5 handshake fail when client sending user/pass auth method
---------------------------+------------------------------
 Reporter:  access_denied  |          Owner:  (none)
     Type:  defect         |         Status:  new
 Priority:  High           |      Component:  Core Tor/Tor
  Version:  Tor: 0.3.5.7   |       Severity:  Normal
 Keywords:                 |  Actual Points:
Parent ID:                 |         Points:
 Reviewer:                 |        Sponsor:
---------------------------+------------------------------
 After updating Tor to 0.3.5.7 on my Debian system, Proxychains won't
 connect to Tor via SOCKS5 (SOCKS4 works normally). In handshake,
 proxychains sents auth methods "no auth" and "user/pass", Tor selects
 "user/pass", proxychains sents empty username and pass, Tor returns
 success status, proxychains sents connection request, Tor returns general
 failure status. If application don't send "user/pass" auth method, Tor
 selects "no auth" in socks handshake and connection establishes normally.

 In log:
 Tor[]: socks5: parsing failed - invalid user/pass authentication message.
 Tor[]: Fetching socks handshake failed. Closing.

 Wireshark log is in attachment.

 Sorry for bad English.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29487>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs