[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #13315 [Tor]: Our SOCKS hostname validation is overly lax.
#13315: Our SOCKS hostname validation is overly lax.
-------------------------+-------------------------------------
Reporter: yawning | Owner: rl1987
Type: defect | Status: needs_revision
Priority: normal | Milestone:
Component: Tor | Version: Tor: unspecified
Resolution: | Keywords: tor-client, easy, socks
Actual Points: | Parent ID:
Points: |
-------------------------+-------------------------------------
Changes (by yawning):
* status: needs_review => needs_revision
Comment:
Minor nitpicks:
* Instead of `inet_pton()`, use `tor_inet_pton()`. IIRC the only
platform that requires this isn't supported anymore (WinXP), but no reason
to make portability worse when the routine already exists.
* Do we want to separate ipv4 vs ipv6 string validation?
`string_is_ip_address(int family, const char* addr);` would be how I would
have done it, but that's just me.
* Per nickm: "my only question is whether we really want to do the "IP
address in place of a hostname means a dns leak" thing.". I will defer to
his judgement here, changing it is easy in any case.
* If we do end up rejecting such cases depending on `safe_socks`, use the
spiffy new error routine you wrote and
`socks_request_set_socks5_error(req, SOCKS5_NOT_ALLOWED);`.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13315#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs