[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #33873 [Core Tor/Tor]: client: Send back SOCKS extended error F6 in case of bad hostname
#33873: client: Send back SOCKS extended error F6 in case of bad hostname
------------------------------+---------------------------------------
Reporter: dgoulet | Owner: dgoulet
Type: defect | Status: assigned
Priority: Medium | Milestone: Tor: 0.4.4.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Keywords: tor-hs, tor-client, socks
Actual Points: | Parent ID:
Points: 0.1 | Reviewer: asn
Sponsor: |
------------------------------+---------------------------------------
With the new awesome TB 9.5a11, the SocksPort `ExtendedErrors` are being
handled.
Passing an invalid v3 address that is of the right length in bytes, will
send back the `F6` error but not for an invalid address like:
`asijdijasdoijqwoieqw.onion`.
Problem is that we only send back the `F6` code if the address was
identified, by length, as a v3. We should handle the `BAD_HOSTNAME` error
code from `parse_extended_hostname()` and thus send back that extended
error.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33873>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs