[tor-bugs] #5760 [Tor Client]: Safe cookie authentication failure replies do not end with a CRLF
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu May 3 21:03:20 UTC 2012
#5760: Safe cookie authentication failure replies do not end with a CRLF
------------------------+---------------------------------------------------
Reporter: neena | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor Client | Version: Tor: 0.2.3.15-alpha
Keywords: easy | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
On the control socket, AUTHCHALLENGE's failure replies do not end with a
CRLF.
{{{
+12:29% nc localhost 9100
AUTHCHALLENGE SAFEOHJOIE
513 AUTHCHALLENGE only supports SAFECOOKIE authentication%
}}}
{{{
+1:43% nc localhost 9100
AUTHCHALLENGE SAFECOOKIE FOOFA
513 Invalid base16 client nonce%
}}}
That is all.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5760>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list