[tor-bugs] #4125 [Tor Relay]: Implement proposal 176 (renegotiation-free handshake)

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Mon Oct 3 18:46:06 UTC 2011


#4125: Implement proposal 176 (renegotiation-free handshake)
-------------------------+--------------------------------------------------
 Reporter:  nickm        |          Owner:  nickm              
     Type:  enhancement  |         Status:  needs_review       
 Priority:  normal       |      Milestone:  Deliverable-Nov2011
Component:  Tor Relay    |        Version:                     
 Keywords:               |         Parent:                     
   Points:               |   Actualpoints:                     
-------------------------+--------------------------------------------------

Comment(by nickm):

 Replying to [comment:6 asn]:
 > * If `command_process_cert_cell` receives a CERT cell, with two
 OR_CERT_TYPE_TLS_LINK certificates it will decode, ignore and *not* free
 the second one, because of:
 > {{{
 >         if (cert_type == OR_CERT_TYPE_TLS_LINK && !link_cert)
 >           link_cert = cert;
 >         ...
 >         else
 >           tor_cert_free(cert);
 > }}}
 >
 > The same goes for the other types of allowed certificates.

 Are you sure there?  If we get through the loop a second time, link_cert
 is already set, so the first branch isn't taken (because !link_cert is now
 false), so we should call tor_cert_free(cert);

 > * In command_process_auth_challenge_cell() don't forget to use ERR() or
 return in:
 > {{{
 >     if (connection_or_send_authenticate_cell(conn, use_type) < 0) {
 >       /* XXX log */
 >       connection_mark_for_close(TO_CONN(conn));
 >     }
 > }}}

 fixed

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4125#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list