mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 20:33:31 +01:00
Don't allow tor2web-mode Tors to connect to non-HS addresses
The client's anonymity when accessing a non-HS address in tor2web-mode would be easily nuked by inserting an inline image with a .onion URL, so don't even pretend to access non-HS addresses through Tor.
This commit is contained in:
parent
5f3e6eb0b9
commit
ebf524b48b
@ -1892,6 +1892,14 @@ connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn,
|
|||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (options->Tor2webMode) {
|
||||||
|
log_warn(LD_APP, "Refusing to connect to non-hidden-service hostname %s "
|
||||||
|
"because tor2web mode is enabled.",
|
||||||
|
safe_str_client(socks->address));
|
||||||
|
connection_mark_unattached_ap(conn, END_STREAM_REASON_ENTRYPOLICY);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
if (socks->command == SOCKS_COMMAND_RESOLVE) {
|
if (socks->command == SOCKS_COMMAND_RESOLVE) {
|
||||||
uint32_t answer;
|
uint32_t answer;
|
||||||
struct in_addr in;
|
struct in_addr in;
|
||||||
|
Loading…
Reference in New Issue
Block a user