[tor-bugs] #10777 [Tor]: Remotely triggerable circuit destruction by path bias code

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Feb 11 00:31:34 UTC 2014


#10777: Remotely triggerable circuit destruction by path bias code
-----------------------------+-----------------------------------
     Reporter:  cypherpunks  |      Owner:
         Type:  defect       |     Status:  needs_review
     Priority:  major        |  Milestone:  Tor: 0.2.4.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-client regression
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------------------------

Comment (by mikeperry):

 Replying to [comment:17 mikeperry]:
 > bug10777_netunreach_024 seems ok. However, I am not a fan of
 bug10777_nointernal_024..
 > This branch would prevent us from detecting that entire class of route
 manipulation (tagging the initial relay cells after a circuit was
 established).
 >
 > Specifically, in circuit_receive_relay_cell(), we use
 END_STREAM_REASON_INTERNAL to mean that the relay cell was not recognized,
 which is exactly what we'd see for a simple XOR tag that was meant to be
 undone by a cooperating exit node, but hit an honest exit node instead.

 Actually, no I'm wrong. We only return INTERNAL if the decryption itself
 fails, not for unrecognized. Still digging for other cases...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10777#comment:18>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list