[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #31455 [Circumvention/meek]: Redeploy meek-server instances using Go 1.11.13+ / 1.12.8+
#31455: Redeploy meek-server instances using Go 1.11.13+ / 1.12.8+
--------------------------------+--------------------------
Reporter: dcf | Owner: phw
Type: defect | Status: assigned
Priority: High | Milestone:
Component: Circumvention/meek | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------+--------------------------
Changes (by dcf):
* owner: dcf => phw
Old description:
> These versions fix a denial-of-service vulnerability in the HTTP/2 server
> code.
>
> https://groups.google.com/d/msg/golang-announce/65QixT3tcmg/DrFiG6vvCwAJ
> > We have just released Go 1.12.8 and Go 1.11.13 to address recently
> reported security issues. We recommend that all users update to one of
> these releases (if you’re not sure which, choose Go 1.12.8).
> > * net/http: Denial of Service vulnerabilities in the HTTP/2
> implementation
> >
> > net/http and golang.org/x/net/http2 servers that accept direct
> connections from untrusted clients could be remotely made to allocate an
> unlimited amount of memory, until the program crashes. Servers will now
> close connections if the send queue accumulates too many control
> messages.
> >
> > The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
> [https://golang.org/issue/33606 golang.org/issue/33606].
> >
> > This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
> golang.org/x/net/http2.
> >
> > * net/url: parsing validation issue
> >
> > url.Parse would accept URLs with malformed hosts, such that the Host
> field could have arbitrary suffixes that would appear in neither
> Hostname() nor Port(), allowing authorization bypasses in certain
> applications. Note that URLs with invalid, not numeric ports will now
> return an error from url.Parse.
> >
> > The issue is CVE-2019-14809 and Go issue
> [https://golang.org/issue/29098 golang.org/issue/29098].
>
> We need to redeploy the following servers:
> * cymrubridge02 (backend for meek-azure, run by inf0)
> * BridgeDB Moat (run by sysrqb, phw)
> * starman (throttled meek.bamsoftware.com, run by dcf)
> * maenad (unthrottled meek.bamsoftware.com, run by dcf)
> * GAEuploader (gaeuploader.meek.bamsoftware.com, run by dcf)
New description:
These versions fix a denial-of-service vulnerability in the HTTP/2 server
code.
https://groups.google.com/d/msg/golang-announce/65QixT3tcmg/DrFiG6vvCwAJ
> We have just released Go 1.12.8 and Go 1.11.13 to address recently
reported security issues. We recommend that all users update to one of
these releases (if you’re not sure which, choose Go 1.12.8).
> * net/http: Denial of Service vulnerabilities in the HTTP/2
implementation
>
> net/http and golang.org/x/net/http2 servers that accept direct
connections from untrusted clients could be remotely made to allocate an
unlimited amount of memory, until the program crashes. Servers will now
close connections if the send queue accumulates too many control messages.
>
> The issues are CVE-2019-9512 and CVE-2019-9514, and Go issue
[https://golang.org/issue/33606 golang.org/issue/33606].
>
> This is also fixed in version v0.0.0-20190813141303-74dc4d7220e7 of
golang.org/x/net/http2.
>
> * net/url: parsing validation issue
>
> url.Parse would accept URLs with malformed hosts, such that the Host
field could have arbitrary suffixes that would appear in neither
Hostname() nor Port(), allowing authorization bypasses in certain
applications. Note that URLs with invalid, not numeric ports will now
return an error from url.Parse.
>
> The issue is CVE-2019-14809 and Go issue
[https://golang.org/issue/29098 golang.org/issue/29098].
We need to redeploy the following servers:
* cymrubridge02 (backend for meek-azure, run by inf0)
* BridgeDB Moat (run by sysrqb, phw)
* ~~starman (throttled meek.bamsoftware.com, run by dcf)~~
* ~~maenad (unthrottled meek.bamsoftware.com, run by dcf)~~
* ~~GAEuploader (gaeuploader.meek.bamsoftware.com, run by dcf)~~
--
Comment:
I deployed these three using go1.12.9 at 2019-08-26 16:42:00:
* starman (throttled meek.bamsoftware.com, run by dcf)
* maenad (unthrottled meek.bamsoftware.com, run by dcf)
* GAEuploader (gaeuploader.meek.bamsoftware.com, run by dcf)
Now passing the baton to phw and inf0 for:
* cymrubridge02 (backend for meek-azure, run by inf0)
* BridgeDB Moat (run by sysrqb, phw)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31455#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs