[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: critical security vulnaribility fixed in Tor 0.1.2.16
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: critical security vulnaribility fixed in Tor 0.1.2.16
- From: coderman <coderman@xxxxxxxxx>
- Date: Sat, 4 Aug 2007 04:25:49 -0700
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sat, 04 Aug 2007 07:26:03 -0400
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=MkRmgxhaMsdW7+LPgKya9uANOH5vwgmxmP3cySsMq7DlIvrtasWtEKTOx62SqBDlhi9HcOnAp41MWui8ntDZCmPL4dbvZO53Onl6X2NQntMZPwgjNGDUQaCRCAN6oFI4B7czMxlh9wwjOXF02ZyPn/e5jZMU3QsTzlqRjbAlFVU=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=utjHO8tgkoj8zuH8OiQWbBZgVbhc8C3PqOl4L1cxJHfXODNF0b29o0TJVewXTtNS7Ras0OSbUqtuXZhx3LTp4CgAOLK3ZW6XJLMoUVtuXx/QCFS496sjr9EcZgyVZdwSO26E5KPL58zM8opRVjxY7LQuRAKWE1pklDrfDqyJYFo=
- In-reply-to: <46B44F87.7000902@xxxxxxxxx>
- References: <20070802221918.GF20786@xxxxxxxxxxxxxx> <46B44F87.7000902@xxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On 8/4/07, vikingserver@xxxxxxxxx <vikingserver@xxxxxxxxx> wrote:
> ...
> To my understanding any Tor client or server behind a well-configured
> physical firewall aren't vulnerable to this type of attack.
> ...
> (Please tell me if I'm wrong.
you're wrong. upgrade to the latest version (0.1.2.16 or
0.2.0.4-alpha) to avoid this type of attack.
best regards,