diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-01-18 15:25:29 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-01-18 15:25:29 -0500 |
commit | ceb6dee4652567fd503e5ceb9345354efd935a1b (patch) | |
tree | b245889e938b8babddc581a8e2338a1160e6a62f /src/or/directory.c | |
parent | 2329d9fe3739aca46d00b47222db2f78bd23e4d3 (diff) | |
download | tor-ceb6dee4652567fd503e5ceb9345354efd935a1b.tar.gz tor-ceb6dee4652567fd503e5ceb9345354efd935a1b.zip |
Increase limit for status vote download size by a factor of 5.
We've started to hit the limit here. We introduced the limit in
0.1.2.5-alpha. This fixes bug 14261, but we should have a smarter way
to not actually do the behavior this permits. See #14267 for a ticket
about fixing that.
Diffstat (limited to 'src/or/directory.c')
-rw-r--r-- | src/or/directory.c | 9 |
1 files changed, 8 insertions, 1 deletions
diff --git a/src/or/directory.c b/src/or/directory.c index 298271f366..50863d0c7e 100644 --- a/src/or/directory.c +++ b/src/or/directory.c @@ -2183,12 +2183,15 @@ connection_dir_reached_eof(dir_connection_t *conn) */ #define MAX_DIRECTORY_OBJECT_SIZE (10*(1<<20)) +#define MAX_VOTE_DL_SIZE (MAX_DIRECTORY_OBJECT_SIZE * 5) + /** Read handler for directory connections. (That's connections <em>to</em> * directory servers and connections <em>at</em> directory servers.) */ int connection_dir_process_inbuf(dir_connection_t *conn) { + size_t max_size; tor_assert(conn); tor_assert(conn->base_.type == CONN_TYPE_DIR); @@ -2207,7 +2210,11 @@ connection_dir_process_inbuf(dir_connection_t *conn) return 0; } - if (connection_get_inbuf_len(TO_CONN(conn)) > MAX_DIRECTORY_OBJECT_SIZE) { + max_size = + (TO_CONN(conn)->purpose == DIR_PURPOSE_FETCH_STATUS_VOTE) ? + MAX_VOTE_DL_SIZE : MAX_DIRECTORY_OBJECT_SIZE; + + if (connection_get_inbuf_len(TO_CONN(conn)) > max_size) { log_warn(LD_HTTP, "Too much data received from directory connection: " "denial of service attempt, or you need to upgrade?"); connection_mark_for_close(TO_CONN(conn)); |