[tor-bugs] #31413 [Core Tor/Tor]: Check for internal IPv6 connects and extends (was: Check for null IPv6 addresses/extends in circuit_extend())

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Aug 25 00:04:32 UTC 2019


#31413: Check for internal IPv6 connects and extends
-----------------------------+----------------------------------
 Reporter:  neel             |          Owner:  (none)
     Type:  defect           |         Status:  new
 Priority:  Medium           |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor     |        Version:
 Severity:  Normal           |     Resolution:
 Keywords:  ipv6, tor-relay  |  Actual Points:
Parent ID:  #24403           |         Points:
 Reviewer:                   |        Sponsor:
-----------------------------+----------------------------------
Description changed by teor:

Old description:

> In teor's comment in #31088:
>
> > You've added some code that isn't needed yet. Please reject all IPv6
> extends in this patch, and open a separate child ticket of #24403 for
> allowing IPv6 extends.

New description:

 In teor's comment in #31088:

 > You've added some code that isn't needed yet. Please reject all IPv6
 extends in this patch, and open a separate child ticket of #24403 for
 allowing IPv6 extends.

 Edited to add:

 When we add support for IPv6 extends, we should check for internal IPv6
 addresses in extends. And we should check for internal IPv6 connects on
 non-bridge clients, relays, and authorities.

 ExtendAllowPrivateAddresses should disable these new checks.

--

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31413#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list