[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #14905 [Tor]: client descriptor-cookies are wrong for stealth auth
#14905: client descriptor-cookies are wrong for stealth auth
------------------------+------------------------------
Reporter: meejah | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor | Version: Tor: unspecified
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
------------------------+------------------------------
Comment (by dgoulet):
Hrm, just above the auth type value is actually put in the + 1 location:
{{{
extended_desc_cookie[REND_DESC_COOKIE_LEN] =
((int)s->auth_type - 1) << 4;
}}}
So, I'm guessing that the auth type needs to be b64 encoded thus passing
the +1 len. Now why this is done only in the hostname field and not
client_keys, I don't know.
Did you encounteer an issue with this behaviour?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14905#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs