aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2018-01-17 11:12:15 -0500
committerNick Mathewson <nickm@torproject.org>2018-01-17 11:12:15 -0500
commit4e653ac2cab08edf0e811ae38204e61bc13f1871 (patch)
tree01a084e5532ae7d6b3616069b638bfee06233d5a
parentf02c6bcad08754e0946c1ae5199cfebc9e30fe7b (diff)
parentaf8cadf3a9febe3dbe22899b828f9f7946a82cef (diff)
downloadtor-4e653ac2cab08edf0e811ae38204e61bc13f1871.tar.gz
tor-4e653ac2cab08edf0e811ae38204e61bc13f1871.zip
Merge branch 'maint-0.3.1' into maint-0.3.2
-rw-r--r--changes/bug248988
-rw-r--r--src/or/command.c6
-rw-r--r--src/or/connection_or.c6
-rw-r--r--src/rust/Cargo.lock12
4 files changed, 20 insertions, 12 deletions
diff --git a/changes/bug24898 b/changes/bug24898
new file mode 100644
index 0000000000..f64340d71b
--- /dev/null
+++ b/changes/bug24898
@@ -0,0 +1,8 @@
+ o Major bugfixes (relays):
+ - Fix a set of false positives where relays would consider connections
+ to other relays as being client-only connections (and thus e.g.
+ deserving different link padding schemes) if those relays fell out
+ of the consensus briefly. Now we look only at the initial handshake
+ and whether the connection authenticated as a relay. Fixes bug
+ 24898; bugfix on 0.3.1.1-alpha.
+
diff --git a/src/or/command.c b/src/or/command.c
index ae419ad068..bd70e37a07 100644
--- a/src/or/command.c
+++ b/src/or/command.c
@@ -328,12 +328,6 @@ command_process_create_cell(cell_t *cell, channel_t *chan)
if (connection_or_digest_is_known_relay(chan->identity_digest)) {
rep_hist_note_circuit_handshake_requested(create_cell->handshake_type);
- // Needed for chutney: Sometimes relays aren't in the consensus yet, and
- // get marked as clients. This resets their channels once they appear.
- // Probably useful for normal operation wrt relay flapping, too.
- channel_clear_client(chan);
- } else {
- channel_mark_client(chan);
}
if (create_cell->handshake_type != ONION_HANDSHAKE_TYPE_FAST) {
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index 9e34063609..fd8c5fc7f2 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -1954,6 +1954,12 @@ connection_or_set_state_open(or_connection_t *conn)
connection_or_change_state(conn, OR_CONN_STATE_OPEN);
control_event_or_conn_status(conn, OR_CONN_EVENT_CONNECTED, 0);
+ /* Link protocol 3 appeared in Tor 0.2.3.6-alpha, so any connection
+ * that uses an earlier link protocol should not be treated as a relay. */
+ if (conn->link_proto < 3) {
+ channel_mark_client(TLS_CHAN_TO_BASE(conn->chan));
+ }
+
or_handshake_state_free(conn->handshake_state);
conn->handshake_state = NULL;
connection_start_reading(TO_CONN(conn));
diff --git a/src/rust/Cargo.lock b/src/rust/Cargo.lock
index 4ac9606ce8..e208e14320 100644
--- a/src/rust/Cargo.lock
+++ b/src/rust/Cargo.lock
@@ -1,14 +1,14 @@
-[root]
+[[package]]
+name = "libc"
+version = "0.2.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+
+[[package]]
name = "tor_util"
version = "0.0.1"
dependencies = [
"libc 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)",
]
-[[package]]
-name = "libc"
-version = "0.2.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-
[metadata]
"checksum libc 0.2.22 (registry+https://github.com/rust-lang/crates.io-index)" = "babb8281da88cba992fa1f4ddec7d63ed96280a1a53ec9b919fd37b53d71e502"