[tor-bugs] #4125 [Tor Relay]: Implement proposal 176 (renegotiation-free handshake)
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Sun Oct 2 18:40:54 UTC 2011
#4125: Implement proposal 176 (renegotiation-free handshake)
-------------------------+--------------------------------------------------
Reporter: nickm | Owner: nickm
Type: enhancement | Status: needs_review
Priority: normal | Milestone: Deliverable-Nov2011
Component: Tor Relay | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by asn):
* If `command_process_cert_cell` receives a CERT cell, with two
OR_CERT_TYPE_TLS_LINK certificates it will decode, ignore and *not* free
the second one, because of:
{{{
if (cert_type == OR_CERT_TYPE_TLS_LINK && !link_cert)
link_cert = cert;
...
else
tor_cert_free(cert);
}}}
The same goes for the other types of allowed certificates.
* In command_process_auth_challenge_cell() don't forget to use ERR() or
return in:
{{{
if (connection_or_send_authenticate_cell(conn, use_type) < 0) {
/* XXX log */
connection_mark_for_close(TO_CONN(conn));
}
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4125#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list