[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17604 [Tor]: Try to use only one canonical connection
#17604: Try to use only one canonical connection
-----------------------+------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: defect | Status: needs_review
Priority: Medium | Milestone:
Component: Tor | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: #16861 | Points:
Sponsor: |
-----------------------+------------------------------
Comment (by teor):
Replying to [comment:7 mikeperry]:
> Replying to [comment:5 teor]:
> > Replying to [comment:4 mikeperry]:
> > > Oh, it also turns out that we're already vulnerable to the attack in
comment:1, because all a rogue node has to do is list its rogue address in
its NETINFO cells, and it gets marked canonical. It is only non-canonical
connections that get their real_addr checked by
channel_tls_matches_target_method(). Do we care about that? I did not
change that behavior in this patch at all. I merely noted the issue with
an XXX in the source.
> >
> > Can we check real_addr for all connections?
> > Will it take a long time to code up?
> > Does it impact performance?
>
> I think the main problem is that if we don't allow this netinfo
mechanism, we need to find a different way for IPv6 connections to become
'canonical'. If we do care about this (and maybe we do), I think it should
probably be a different ticket to change this behavior. The right way to
do it probably means checking that the netinfo cell stuff matches at least
*something* from the descriptor. But maybe that will have other issues?
Nick or Andrea probably need to chime in on that topic.
I'm working on IPv6 client support at the moment. These sort of
complexities are one of the reasons I don't even want to touch the IPv6
server code.
> > And a nitpick:
> >
> > In check_canonical_channels_callback:
> > * I think public_server_mode(options) is the standard way of saying
`!options->BridgeRelay && server_mode(options)`. I think they do the same
thing, but it might be worth checking.
>
> Fixed in another fixup commit.
The fixups all look good.
Are we going to merge this? (Pending comment from Nick or Andrea on
canonical IPv6 connections.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17604#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs