[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8093 [Tor]: Jan 29 23:32:20.066 [Warning] Bug/attack: unexpected sendme cell from client. Closing circ.
#8093: Jan 29 23:32:20.066 [Warning] Bug/attack: unexpected sendme cell from
client. Closing circ.
--------------------------+-------------------------------------
Reporter: Gravitas | Owner: nickm
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.6.x-final
Component: Tor | Version: Tor: 0.2.4.9-alpha
Resolution: | Keywords: tor-client, 025-triaged
Actual Points: | Parent ID:
Points: |
--------------------------+-------------------------------------
Comment (by cypherpunks):
> I wonder why using Google's DNS settings would result in this behaviour?
Google do not filters DNS replies, and as said:
> OpenDNS and many other DNS providers heavily filter and manipulate DNS
replies
Client that triggers that message tried streams with target address
filtered by OpenDNS. If stream failed then no circuit used and no broken
number of sendme cells.
It's theory that could explain something.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8093#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs