summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2009-03-09 00:53:42 +0000
committerRoger Dingledine <arma@torproject.org>2009-03-09 00:53:42 +0000
commit5d50bc3e1d4bf7312b39d5366cb1d374345f7bd0 (patch)
tree14334f3e247bdbc2029d62b1fdbe3579fe9239f9
parent5cb2e4efca5d3dccd664c20b99dfe4a9a63f4a75 (diff)
downloadtor-5d50bc3e1d4bf7312b39d5366cb1d374345f7bd0.tar.gz
tor-5d50bc3e1d4bf7312b39d5366cb1d374345f7bd0.zip
We were already rejecting relay begin cells with destination port
of 0. Now also reject extend cells with destination port or address of 0. Suggested by lark. svn:r18812
-rw-r--r--ChangeLog3
-rw-r--r--src/or/circuitbuild.c8
2 files changed, 10 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index 40649de45b..aee937c31d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -38,6 +38,9 @@ Changes in version 0.2.1.13-alpha - 2009-02-09
manner, to avoid platform-dependent behavior on malformed input.
- Build correctly when configured to build outside the main source
path. Patch from Michael Gold.
+ - We were already rejecting relay begin cells with destination port
+ of 0. Now also reject extend cells with destination port or address
+ of 0. Suggested by lark.
o Minor bugfixes (on 0.2.1.x):
- Don't re-extend introduction circuits if we ran out of RELAY_EARLY
diff --git a/src/or/circuitbuild.c b/src/or/circuitbuild.c
index 42da9e6fe0..1cda8e870d 100644
--- a/src/or/circuitbuild.c
+++ b/src/or/circuitbuild.c
@@ -762,7 +762,13 @@ circuit_extend(cell_t *cell, circuit_t *circ)
id_digest = cell->payload+RELAY_HEADER_SIZE+4+2+ONIONSKIN_CHALLENGE_LEN;
tor_addr_from_ipv4h(&n_addr, n_addr32);
- /* First, check if they asked us for 0000..0000. We support using
+ if (!n_port || !n_addr32) {
+ log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL,
+ "Client asked me to extend to zero destination port or addr.");
+ return -1;
+ }
+
+ /* Check if they asked us for 0000..0000. We support using
* an empty fingerprint for the first hop (e.g. for a bridge relay),
* but we don't want to let people send us extend cells for empty
* fingerprints -- a) because it opens the user up to a mitm attack,