[tor-bugs] #10777 [Tor]: Remotely triggerable circuit destruction by path bias code

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Feb 11 00:29:03 UTC 2014


#10777: Remotely triggerable circuit destruction by path bias code
-----------------------------+-----------------------------------
     Reporter:  cypherpunks  |      Owner:
         Type:  defect       |     Status:  needs_review
     Priority:  major        |  Milestone:  Tor: 0.2.4.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-client regression
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------------------------

Comment (by mikeperry):

 bug10777_netunreach_024 seems ok. However, I am not a fan of
 bug10777_nointernal_024..
 This branch would prevent us from detecting that entire class of route
 manipulation (tagging the initial relay cells after a circuit was
 established).

 Specifically, in circuit_receive_relay_cell(), we use
 END_STREAM_REASON_INTERNAL to mean that the relay cell was not recognized,
 which is exactly what we'd see for a simple XOR tag that was meant to be
 undone by a cooperating exit node, but hit an honest exit node instead.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10777#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list