[or-cvs] r9333: Fix a crash bug in the presence of DNS hijacking. (in tor/trunk: . src/or)

nickm at seul.org nickm at seul.org
Thu Jan 11 14:13:15 UTC 2007


Author: nickm
Date: 2007-01-11 09:13:13 -0500 (Thu, 11 Jan 2007)
New Revision: 9333

Modified:
   tor/trunk/
   tor/trunk/ChangeLog
   tor/trunk/src/or/dns.c
Log:
 r11931 at Kushana:  nickm | 2007-01-11 09:12:49 -0500
 Fix a crash bug in the presence of DNS hijacking.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r11931] on c95137ef-5f19-0410-b913-86e773d04f59

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-01-11 14:13:04 UTC (rev 9332)
+++ tor/trunk/ChangeLog	2007-01-11 14:13:13 UTC (rev 9333)
@@ -1,4 +1,8 @@
 Changes in version 0.1.2.7-alpha - 2007-??-??
+ o Major bugfixes:
+    - Fix a crash bug in the presence of DNS hijacking  (reported by Andrew
+      Del Vecchio).
+
  o Minor bugfixes:
     - When computing clock skew from directory HTTP headers, consider what
       time it was when we finished asking for the directory, not what time it

Modified: tor/trunk/src/or/dns.c
===================================================================
--- tor/trunk/src/or/dns.c	2007-01-11 14:13:04 UTC (rev 9332)
+++ tor/trunk/src/or/dns.c	2007-01-11 14:13:13 UTC (rev 9333)
@@ -1625,12 +1625,10 @@
       status = DNS_RESOLVE_FAILED_TRANSIENT;
   }
   if (was_wildcarded) {
-    int is_test_addr = is_test_address(hostname);
-
-    if (is_test_addr) {
+    if (is_test_address(string_address)) {
       /* Ick.  We're getting redirected on known-good addresses.  Our DNS
        * server must really hate us.  */
-      add_wildcarded_test_address(hostname);
+      add_wildcarded_test_address(string_address);
     }
   }
   if (result != DNS_ERR_SHUTDOWN)
@@ -1744,16 +1742,19 @@
 static void
 add_wildcarded_test_address(const char *address)
 {
-  int n;
+  int n, n_test_addrs;
   if (!dns_wildcarded_test_address_list)
     dns_wildcarded_test_address_list = smartlist_create();
 
   if (smartlist_string_isin_case(dns_wildcarded_test_address_list, address))
     return;
 
+  n_test_addrs = get_options()->ServerDNSTestAddresses ?
+    smartlist_len(get_options()->ServerDNSTestAddresses) : 0;
+
   smartlist_add(dns_wildcarded_test_address_list, tor_strdup(address));
   n = smartlist_len(dns_wildcarded_test_address_list);
-  if (n > smartlist_len(get_options()->ServerDNSTestAddresses)/2) {
+  if (n > n_test_addrs/2) {
     log(dns_wildcarded_test_address_notice_given ? LOG_INFO : LOG_NOTICE,
         LD_EXIT, "Your DNS provider tried to redirect \"%s\" to a junk "
         "address.  It has done this with %d test addresses so far.  I'm "



More information about the tor-commits mailing list