[tor-bugs] #6710 [Tor Relay]: Tor Relays accept arbitrary destination address and port and leak information about reachability

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Mon Aug 27 16:00:07 UTC 2012


#6710: Tor Relays accept arbitrary destination address and port and leak
information about reachability
-----------------------+----------------------------------------------------
 Reporter:  thejh      |          Owner:                    
     Type:  defect     |         Status:  needs_review      
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:  Tor: unspecified  
 Keywords:             |         Parent:                    
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------

Comment(by arma):

 A) I'm fine with this going into 0.2.3. Though you'll probably be
 decreasing the chances that future debians take this 0.2.3 update -- I
 think this would be fine as an 0.2.4 fix too. I think it is not a critical
 bug (we've known about it for years, and this fix isn't much of a fix) and
 thus doesn't need to go into 0.2.2.

 B) I doubt this is a bug on 'all released versions of tor'. For example,
 before 0.0.8pre1 relays would only extend on connections that already had
 a tcp connection open.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6710#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list