[tor-bugs] #10777 [Tor]: Remotely triggerable circuit destruction by path bias code

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Feb 10 18:37:47 UTC 2014


#10777: Remotely triggerable circuit destruction by path bias code
-----------------------------+-----------------------------------
     Reporter:  cypherpunks  |      Owner:
         Type:  defect       |     Status:  needs_review
     Priority:  major        |  Milestone:  Tor: 0.2.4.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-client regression
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------------------------

Comment (by cypherpunks):

 >Are there instructions on how to reproduce this?

 Additional information from the bug reporter:
 {{{
 The problem also happens with unmodified torrc. It seems this way it
 happens less often.

 It is mostly entries like this, to block ad servers:

 MapAddress ad-emea.doubleclick.net 255.255.255.255
 MapAddress oglasi.slo-tech.com 255.255.255.255
 MapAddress ads.poraba.com 255.255.255.255
 MapAddress googleads.g.doubleclick.net 255.255.255.255
 MapAddress pagead2.googlesyndication.com 255.255.255.255
 MapAddress d2.zedo.com 255.255.255.255
 MapAddress cdn2.adexprt.com 255.255.255.255
 MapAddress d7.zedo.com 255.255.255.255
 MapAddress cdn1.clkads.com 255.255.255.255
 MapAddress cdn.adnxs.com 255.255.255.255
 MapAddress tpc.googlesyndication.com 255.255.255.255
 MapAddress ssl.google-analytics.com 255.255.255.255
 }}}

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10777#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list