[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #6710 [Tor Relay]: Tor Relays accept arbitrary destination address and port and leak information about reachability
#6710: Tor Relays accept arbitrary destination address and port and leak
information about reachability
-----------------------+----------------------------------------------------
Reporter: thejh | Owner:
Type: defect | Status: needs_review
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version: Tor: unspecified
Keywords: | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Comment(by arma):
A) I'm fine with this going into 0.2.3. Though you'll probably be
decreasing the chances that future debians take this 0.2.3 update -- I
think this would be fine as an 0.2.4 fix too. I think it is not a critical
bug (we've known about it for years, and this fix isn't much of a fix) and
thus doesn't need to go into 0.2.2.
B) I doubt this is a bug on 'all released versions of tor'. For example,
before 0.0.8pre1 relays would only extend on connections that already had
a tcp connection open.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6710#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs