From 301ffb71a695e89f2e4905e2260fce15439259f1 Mon Sep 17 00:00:00 2001 From: David Goulet Date: Tue, 29 Jun 2021 09:56:44 -0400 Subject: hs: Send back 0xF6 for a v2 onion address Fixes #40421 Signed-off-by: David Goulet --- src/core/or/connection_edge.c | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'src/core/or/connection_edge.c') diff --git a/src/core/or/connection_edge.c b/src/core/or/connection_edge.c index a307249967..6f6f22a0d4 100644 --- a/src/core/or/connection_edge.c +++ b/src/core/or/connection_edge.c @@ -2536,6 +2536,10 @@ connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn, "https://blog.torproject.org/v2-deprecation-timeline."); control_event_client_status(LOG_WARN, "SOCKS_BAD_HOSTNAME HOSTNAME=%s", escaped(socks->address)); + /* Send back the 0xF6 extended code indicating a bad hostname. This is + * mostly so Tor Browser can make a proper UX with regards to v2 + * addresses. */ + conn->socks_request->socks_extended_error_code = SOCKS5_HS_BAD_ADDRESS; connection_mark_unattached_ap(conn, END_STREAM_REASON_TORPROTOCOL); return -1; } -- cgit v1.2.3-54-g00ecf