[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #19910 [Applications/Tor Browser]: Rip out optimistic data socks handshake variant (#3875)



#19910: Rip out optimistic data socks handshake variant (#3875)
------------------------------------------+----------------------
     Reporter:  cypherpunks               |      Owner:  tbb-team
         Type:  defect                    |     Status:  new
     Priority:  Medium                    |  Milestone:
    Component:  Applications/Tor Browser  |    Version:
     Severity:  Normal                    |   Keywords:
Actual Points:                            |  Parent ID:
       Points:                            |   Reviewer:
      Sponsor:                            |
------------------------------------------+----------------------
 Optimistic data socks handshake variant violates RFC we could to ignore
 except total code logic brokenness.

 For something like https transport code functionality depends timing of
 socks proxy. If socks-proxy answer before TLS handshake can to start then
 browser process socks handshake as server hello therefore violates TLS
 session.

 You can't to use code fully based on race condition. You can't to fix code
 so it never process any input data as soon as you start TLS handshake.
 Only solution to rip out that code entirely.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19910>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs