[tor-bugs] #27451 [Core Tor/Tor]: Refactor socket closing in tor_tls_free()

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Sep 12 15:42:36 UTC 2018


#27451: Refactor socket closing in tor_tls_free()
-------------------------------------------------+-------------------------
 Reporter:  nickm                                |          Owner:  nickm
     Type:  defect                               |         Status:
                                                 |  needs_review
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.3.5.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  035-roadmap-master, 035-triaged-     |  Actual Points:
  in-20180711                                    |
Parent ID:  #26631                               |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------
Changes (by nickm):

 * status:  assigned => needs_review


Comment:

 I have a patch here as `nss_27451`, with PR at
 https://github.com/torproject/tor/pull/322 .

 It takes a hybrid approach: by default, the TLS connection object owns the
 socket and closes it when it's freed.  But if something else needs to free
 the socket, ownership is wrested from the TLS connection object.

 The unit tests pass for me, but chutney+nss is failing because of #27664.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27451#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list