[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17027 [Tor]: policies_parse_exit_policy_internal should block all IPv4 and IPv6 local addresses
#17027: policies_parse_exit_policy_internal should block all IPv4 and IPv6 local
addresses
-------------------------+-------------------------------------------------
Reporter: teor | Owner:
Type: defect | Status: new
Priority: major | Milestone: Tor: 0.2.7.x-final
Component: Tor | Version: Tor: unspecified
Resolution: | Keywords: TorCoreTeam201509 security
Actual Points: | 026-backport
Points: | Parent ID:
-------------------------+-------------------------------------------------
Changes (by teor):
* version: Tor: 0.2.7.2-alpha => Tor: unspecified
Comment:
Further notes:
This is a patch on 42b8fb5a1523 (11 Nov 2007), released in 0.2.0.11-alpha.
This fix will automatically benefit from changes that find more
interfaces/addresses, perhaps #12377 will do this for some platforms.
We should log an info-level (notice?) message for each address blocked
Internal addresses are blocked anyway by `reject private *:*`, so this
patch doesn't need to block them.
This change will include all addresses in non-internal blocks in the
publicly available exit policy, but these addresses are typically globally
visible on the Internet anyway. I believe the security benefits outweigh
the small risk of leaking public server addresses from unusual
configurations (and operators can always set `ExitPolicyRejectPrivate 0`
and block only the private and server addresses they want to block).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17027#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs