[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #14905 [Tor]: client descriptor-cookies are wrong for stealth auth



#14905: client descriptor-cookies are wrong for stealth auth
------------------------+------------------------------
     Reporter:  meejah  |      Owner:
         Type:  defect  |     Status:  new
     Priority:  normal  |  Milestone:
    Component:  Tor     |    Version:  Tor: unspecified
   Resolution:          |   Keywords:
Actual Points:          |  Parent ID:
       Points:          |
------------------------+------------------------------

Comment (by dgoulet):

 Hrm, just above the auth type value is actually put in the + 1 location:

 {{{
       extended_desc_cookie[REND_DESC_COOKIE_LEN] =
         ((int)s->auth_type - 1) << 4;
 }}}

 So, I'm guessing that the auth type needs to be b64 encoded thus passing
 the +1 len. Now why this is done only in the hostname field and not
 client_keys, I don't know.

 Did you encounteer an issue with this behaviour?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14905#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs