mozilla actually cares about the reply version

tor can now interface directly with mozilla, as a socks 4 host.
but note that mozilla does the dns resolution itself, so you're leaking
anonymity.


svn:r119
This commit is contained in:
Roger Dingledine 2002-09-27 23:34:51 +00:00
parent 23264ebcb5
commit 6934eb9f10

View File

@ -341,7 +341,7 @@ int ap_handshake_socks_reply(connection_t *conn, char result) {
assert(conn); assert(conn);
socks4_info.version = 4; socks4_info.version = 0;
socks4_info.command = result; socks4_info.command = result;
socks4_info.destport[0] = socks4_info.destport[1] = 0; socks4_info.destport[0] = socks4_info.destport[1] = 0;
socks4_info.destip[0] = socks4_info.destip[1] = socks4_info.destip[2] = socks4_info.destip[3] = 0; socks4_info.destip[0] = socks4_info.destip[1] = socks4_info.destip[2] = socks4_info.destip[3] = 0;