[tor-bugs] #1074 [Tor Client]: Tor sends clock_skew status event warn too liberally

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue Feb 22 17:21:52 UTC 2011


#1074: Tor sends clock_skew status event warn too liberally
---------------------------+------------------------------------------------
    Reporter:  arma        |       Owner:  AltF4           
        Type:  defect      |      Status:  needs_review    
    Priority:  minor       |   Milestone:  Tor: unspecified
   Component:  Tor Client  |     Version:  0.2.1.19        
  Resolution:  None        |    Keywords:                  
      Parent:              |      Points:                  
Actualpoints:              |  
---------------------------+------------------------------------------------

Comment(by nickm):

 The "tor_addr_from_ipv4n" part looks wrong: the n at the end means that
 the input IPv4 address is in network order, but I am 99% sure that the one
 in routersatus_t.addr is in host order (so tor_addr_from_ipv4h would be
 appropriate).  Also, if you're going to do a connection_or_connect(), the
 third parameter needs to be identity digest (the hash of the public key of
 the host you're connecting to), rather than the descriptor digest (the
 hash of the descriptor you have for that host).

 It looks like we only do "received_netinfo_from_trusted_dir = 2" if we get
 a netinfo from an authority *and* it's not very skewed.  Is that right?

 This is a decent first step: I wonder if we can merge this with the skew
 detection from authenticated Http to directory servers, and I also think
 we should switch the logic to use a timeout rather than a simple "have we
 ever checked" flag.  But this is the perfect being the enemy of the good:
 once the above stuff is fixed, the patch is probably mergeable.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1074#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list