[tor-bugs] #28300 [Core Tor/Stem]: Scrolling support for tor-prompt is needed

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Mar 3 09:10:29 UTC 2019


#28300: Scrolling support for tor-prompt is needed
---------------------------+------------------------------
 Reporter:  wagon          |          Owner:  atagar
     Type:  enhancement    |         Status:  closed
 Priority:  Medium         |      Milestone:
Component:  Core Tor/Stem  |        Version:  Tor: 0.3.4.8
 Severity:  Normal         |     Resolution:  wontfix
 Keywords:  tor-prompt     |  Actual Points:
Parent ID:                 |         Points:
 Reviewer:                 |        Sponsor:
---------------------------+------------------------------

Comment (by wagon):

 > Fixed the typo and adjusted the wording a tad...
 Thanks!

 > I assumed by presenting additional terminal commands that the reader
 would realize they needed another prompt, but no harm in calling it out.
 I wrote my example assuming that reader doesn't need another prompt. It
 was correct. When you change instruction to the case when 2nd prompt is
 used, you have to adjust the commands appropriately.

 Just read your [[https://stem.torproject.org/faq.html|current version]].
 You see that `CookieString` and `ClientNonce` were defined as variables
 only in the first prompt, where telnet was called. So, if you run the
 command
 {{{
 printf '%s%s%s\n' "${CookieString}" "${ClientNonce}" "${ServerNonce}" |
 xxd -r -p ...
 }}}
 in the second prompt, variables `CookieString` and `ClientNonce` will not
 be known there.

 I would fix it as follows. I'ld remove the line
 {{{
 CookieString="$(xxd -u -p -c32 < /home/atagar/.tor/control_auth_cookie)"
 }}}
 from the place, where it is now (as telnet doesn't needs it at the first
 step), but after your words
 > we have our authentication cookie without divulging its content...
 I would write these commands:
 {{{
 CookieString="$(xxd -u -p -c32 < /home/atagar/.tor/control_auth_cookie)"
 ClientNonce="9C653314CC4CC2C695999CE84EB1B0045E3D59B6AFFE615D624DB4870DD7041E"
 ServerNonce="1C2E73C41FA8537FDD3A59C2ECBE26DFC85E0A05389373AD8C130C0F5795A036"
 printf '%s%s%s\n' "${CookieString}" "${ClientNonce}" "${ServerNonce}" |
 xxd -r -p \
 > | openssl dgst -sha256 -binary -hmac "Tor safe cookie authentication
 controller-to-server hash" \
 > | xxd -p -u -c32
 A733E09A65E2A6030BF6710D800370FC3AD28E1D2545E1692D160545D93CEE68
 }}}
 Now it should be fine.
 > were you the person that pointed out that tor-prompt is a bit slow? If
 so then I just improved that a bit...
 Yes. Thanks! I copy your comment to
 [[http://ea5faa5po25cf7fb.onion/projects/tor/ticket/28877#comment:6|original
 ticket thread]].

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28300#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list