[tor-bugs] #25036 [Core Tor/Tor]: Tor 0.3.2 rejects connections to raw ipv6 addresses

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Jan 27 21:44:35 UTC 2018


#25036: Tor 0.3.2 rejects connections to raw ipv6 addresses
------------------------------------------+--------------------------------
 Reporter:  pastly                        |          Owner:  tbb-team
     Type:  defect                        |         Status:  new
 Priority:  High                          |      Milestone:  Tor:
                                          |  0.3.3.x-final
Component:  Core Tor/Tor                  |        Version:  Tor:
                                          |  0.3.2.1-alpha
 Severity:  Normal                        |     Resolution:
 Keywords:  regression ipv6 032-backport  |  Actual Points:
Parent ID:                                |         Points:
 Reviewer:                                |        Sponsor:
------------------------------------------+--------------------------------

Comment (by teor):

 Using string_is_valid_hostname() excludes IPv6 addresses.
 (It doesn't exclude IPv4 addresses, because they are numbers separated by
 dots. Let's deal with that in #25055.)

 {{{
 /** Return true iff <b>string</b> matches a pattern of DNS names
  * that we allow Tor clients to connect to.
  *
  * Note: This allows certain technically invalid characters ('_') to cope
  * with misconfigured zones that have been encountered in the wild.
  */
 int
 string_is_valid_hostname(const char *string)
 }}}

 We should check both calls introduced by this patch. I think the second
 call should be modified to include IPv4 and IPv6 addresses. And we should
 add a unit test for this use case.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25036#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list