[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/master] Stop inadvertently upgrading client intro connections to ntor
commit 0a3009bb85d5675e1565020de08df1081e52253c
Author: teor <teor2345@xxxxxxxxx>
Date: Wed Aug 31 15:10:58 2016 +1000
Stop inadvertently upgrading client intro connections to ntor
Also stop logging the intro point details on error by default.
Fixes #20012, introduced with ntor in tor 0.2.4.8-alpha.
---
changes/bug20012 | 12 ++++++++++++
src/or/rendclient.c | 41 ++++++++---------------------------------
2 files changed, 20 insertions(+), 33 deletions(-)
diff --git a/changes/bug20012 b/changes/bug20012
new file mode 100644
index 0000000..f67ee65
--- /dev/null
+++ b/changes/bug20012
@@ -0,0 +1,12 @@
+ o Major bugfixes (hidden services):
+ - Clients require hidden services to include the TAP keys
+ for their intro points in the hidden service descriptor.
+ This prevents an inadvertent upgrade to ntor, which a
+ malicious hidden service could use to discover which
+ consensus a client has.
+ Fixes bug 20012; bugfix on 0.2.4.8-alpha. Patch by teor.
+ o Minor bugfixes (hidden services):
+ - Stop logging intro point details to the client log on
+ certain error conditions.
+ Fixed as part of bug 20012; bugfix on 0.2.4.8-alpha.
+ Patch by teor.
diff --git a/src/or/rendclient.c b/src/or/rendclient.c
index 3a742fe..263dd3d 100644
--- a/src/or/rendclient.c
+++ b/src/or/rendclient.c
@@ -1373,40 +1373,15 @@ rend_client_get_random_intro_impl(const rend_cache_entry_t *entry,
smartlist_del(usable_nodes, i);
goto again;
}
- /* Do we need to look up the router or is the extend info complete? */
+ /* All version 2 HS descriptors come with a TAP onion key.
+ * Clients used to try to get the TAP onion key from the consensus, but this
+ * meant that hidden services could discover which consensus clients have. */
if (!extend_info_supports_tap(intro->extend_info)) {
- const node_t *node;
- extend_info_t *new_extend_info;
- if (tor_digest_is_zero(intro->extend_info->identity_digest))
- node = node_get_by_hex_id(intro->extend_info->nickname);
- else
- node = node_get_by_id(intro->extend_info->identity_digest);
- if (!node) {
- log_info(LD_REND, "Unknown router with nickname '%s'; trying another.",
- intro->extend_info->nickname);
- smartlist_del(usable_nodes, i);
- goto again;
- }
-#ifdef ENABLE_TOR2WEB_MODE
- new_extend_info = extend_info_from_node(node, options->Tor2webMode);
-#else
- new_extend_info = extend_info_from_node(node, 0);
-#endif
- if (!new_extend_info) {
- const char *alternate_reason = "";
-#ifdef ENABLE_TOR2WEB_MODE
- alternate_reason = ", or we cannot connect directly to it";
-#endif
- log_info(LD_REND, "We don't have a descriptor for the intro-point relay "
- "'%s'%s; trying another.",
- extend_info_describe(intro->extend_info), alternate_reason);
- smartlist_del(usable_nodes, i);
- goto again;
- } else {
- extend_info_free(intro->extend_info);
- intro->extend_info = new_extend_info;
- }
- tor_assert(intro->extend_info != NULL);
+ log_info(LD_REND, "The HS descriptor is missing a TAP onion key for the "
+ "intro-point relay '%s'; trying another.",
+ safe_str_client(extend_info_describe(intro->extend_info)));
+ smartlist_del(usable_nodes, i);
+ goto again;
}
/* Check if we should refuse to talk to this router. */
if (strict &&
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits