summaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2012-06-28 14:00:01 -0400
committerNick Mathewson <nickm@torproject.org>2012-07-18 10:23:04 -0400
commitc1bd10411116c549326f74b09658a50bbae812b4 (patch)
treeca33a270b3c3da6d68f68fdd847ef807abdaac48 /changes
parentb355ddb20f534d772dcb42737ceb1d0264e2c3f1 (diff)
downloadtor-c1bd10411116c549326f74b09658a50bbae812b4.tar.gz
tor-c1bd10411116c549326f74b09658a50bbae812b4.zip
Detect bug 6252 (unexpected sendme cell)
I only check on circuits, not streams, since bloating your stream window past the initial circuit window can't help you much. Also, I compare to CIRCWINDOW_START_MAX so we don't have surprising races if we lower CIRCWINDOW_START for an experiment.
Diffstat (limited to 'changes')
-rw-r--r--changes/bug62528
1 files changed, 8 insertions, 0 deletions
diff --git a/changes/bug6252 b/changes/bug6252
new file mode 100644
index 0000000000..0d29203fab
--- /dev/null
+++ b/changes/bug6252
@@ -0,0 +1,8 @@
+ o Security fixes:
+ - Tear down the circuit if we get an unexpected SENDME cell. Clients
+ could use this trick to make their circuits receive cells faster
+ than our flow control would have allowed, or to gum up the network,
+ or possibly to do targeted memory denial-of-service attacks on
+ entry nodes. Fixes bug 6252. Bugfix on the 54th commit on Tor --
+ from July 2002, before the release of Tor 0.0.0.
+