[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #29487 [Core Tor/Tor]: SOCKS5 handshake fail when client sending user/pass auth method
#29487: SOCKS5 handshake fail when client sending user/pass auth method
---------------------------+------------------------------
Reporter: access_denied | Owner: (none)
Type: defect | Status: new
Priority: High | Component: Core Tor/Tor
Version: Tor: 0.3.5.7 | Severity: Normal
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
---------------------------+------------------------------
After updating Tor to 0.3.5.7 on my Debian system, Proxychains won't
connect to Tor via SOCKS5 (SOCKS4 works normally). In handshake,
proxychains sents auth methods "no auth" and "user/pass", Tor selects
"user/pass", proxychains sents empty username and pass, Tor returns
success status, proxychains sents connection request, Tor returns general
failure status. If application don't send "user/pass" auth method, Tor
selects "no auth" in socks handshake and connection establishes normally.
In log:
Tor[]: socks5: parsing failed - invalid user/pass authentication message.
Tor[]: Fetching socks handshake failed. Closing.
Wireshark log is in attachment.
Sorry for bad English.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29487>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs