mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 22:03:31 +01:00
r14625@tombo: nickm | 2007-11-01 23:21:25 -0400
Merge revised behavior on proposal 105 svn:r12323
This commit is contained in:
parent
2136c82ae0
commit
dddff3acf9
@ -193,9 +193,17 @@ Proposal:
|
||||
traffic through his own computers to enable timing and packet-counting
|
||||
attacks.
|
||||
|
||||
If a party connects to an OR based on an EXTEND cell, and the address
|
||||
given in the EXTEND cell is not listed in the NETINFO cell, the first
|
||||
party SHOULD close the connection as a likely MITM attack.
|
||||
A Tor instance should use the other Tor's reported address
|
||||
information as part of logic to decide whether to treat a given
|
||||
connection as suitable for extending circuits to a given address/ID
|
||||
combination. When we get an extend request, we use an use an
|
||||
existing OR connection if the ID matches, and ANY of the following
|
||||
conditions hold:
|
||||
- The IP matches the requested IP.
|
||||
- We know that the IP we're using is canonical because it was
|
||||
listed in the NETINFO cell.
|
||||
- We know that the IP we're using is canonical because it was
|
||||
listed in the server descriptor.
|
||||
|
||||
[NOTE: The NETINFO cell is assigned the command number 8.]
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user