[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #6297 [Tor Client]: SOCKS issues with bitcoin in .2.3.18-rc vs .2.2.37



#6297: SOCKS issues with bitcoin in .2.3.18-rc vs .2.2.37
-------------------------+--------------------------------------------------
 Reporter:  jrmithdobbs  |          Owner:                  
     Type:  defect       |         Status:  new             
 Priority:  normal       |      Milestone:                  
Component:  Tor Client   |        Version:  Tor: 0.2.3.18-rc
 Keywords:               |         Parent:                  
   Points:               |   Actualpoints:                  
-------------------------+--------------------------------------------------

Comment(by jrmithdobbs):

 Ok, I re-read what you were saying and did some checking on how that
 initial handshake packet was being generated. There was an OBO in the code
 sending an extra 0x00 (thanks std:string -> char array conversions) so it
 looks like there's a bug on both ends.

 Will get the bitcoin issue fixed but for really should be throwing the
 general failure or some other error message after the first malformed
 packet not leaving the trailing end of it on the receive buffer and then
 parsing it as the beginning of the next?

 Don't know how high a priority that is really but couldn't this be used
 for some form of abuse with some imagination?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6297#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs