[tor-bugs] #26294 [Core Tor/Tor]: attacker can force intro point rotation by ddos

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Aug 6 11:30:35 UTC 2019


#26294: attacker can force intro point rotation by ddos
-------------------------------------------------+-------------------------
 Reporter:  arma                                 |          Owner:  asn
     Type:  defect                               |         Status:
                                                 |  merge_ready
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  0.4.2.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tor-hs, tor-dos, network-team-       |  Actual Points:  6
  roadmap-august                                 |
Parent ID:  #29999                               |         Points:  7
 Reviewer:  dgoulet                              |        Sponsor:
                                                 |  Sponsor27-must
-------------------------------------------------+-------------------------
Changes (by asn):

 * status:  needs_revision => merge_ready


Comment:

 Replying to [comment:24 nickm]:
 > It looks like there are assertion failures reported in the chutney test
 here on travis.


 Oops. I managed to reproduce this with chutney and fixed it. I pushed a
 fixup. The cause was that v2 initializes the replay cache upon receiving
 an INTRO2 cell, so it can be uninitialized in the beginning; I added a
 test against that.

 I also pushed a squashed branch because there were some conflicts with
 autosquash:
 https://github.com/torproject/tor/pull/1207

 Marking as merge_ready assuming that all CI passes.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26294#comment:25>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list