[tor-bugs] #5760 [Tor Client]: Safe cookie authentication failure replies do not end with a CRLF

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Thu May 3 21:03:20 UTC 2012


#5760: Safe cookie authentication failure replies do not end with a CRLF
------------------------+---------------------------------------------------
 Reporter:  neena       |          Owner:                     
     Type:  defect      |         Status:  new                
 Priority:  normal      |      Milestone:                     
Component:  Tor Client  |        Version:  Tor: 0.2.3.15-alpha
 Keywords:  easy        |         Parent:                     
   Points:              |   Actualpoints:                     
------------------------+---------------------------------------------------
 On the control socket, AUTHCHALLENGE's failure replies do not end with a
 CRLF.

 {{{
 +12:29% nc localhost 9100
 AUTHCHALLENGE SAFEOHJOIE
 513 AUTHCHALLENGE only supports SAFECOOKIE authentication%
 }}}
 {{{
 +1:43% nc localhost 9100
 AUTHCHALLENGE SAFECOOKIE FOOFA
 513 Invalid base16 client nonce%
 }}}


 That is all.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5760>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list