[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10777 [Tor]: Remotely triggerable circuit destruction by path bias code
#10777: Remotely triggerable circuit destruction by path bias code
-----------------------------+-----------------------------------
Reporter: cypherpunks | Owner:
Type: defect | Status: needs_review
Priority: major | Milestone: Tor: 0.2.4.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-client regression
Actual Points: | Parent ID:
Points: |
-----------------------------+-----------------------------------
Comment (by mikeperry):
Replying to [comment:17 mikeperry]:
> bug10777_netunreach_024 seems ok. However, I am not a fan of
bug10777_nointernal_024..
> This branch would prevent us from detecting that entire class of route
manipulation (tagging the initial relay cells after a circuit was
established).
>
> Specifically, in circuit_receive_relay_cell(), we use
END_STREAM_REASON_INTERNAL to mean that the relay cell was not recognized,
which is exactly what we'd see for a simple XOR tag that was meant to be
undone by a cooperating exit node, but hit an honest exit node instead.
Actually, no I'm wrong. We only return INTERNAL if the decryption itself
fails, not for unrecognized. Still digging for other cases...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10777#comment:18>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs