[tor-bugs] #12971 [Tor]: Invalid SOCKS5 response to UDP associate request
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Sep 15 19:26:49 UTC 2014
#12971: Invalid SOCKS5 response to UDP associate request
-----------------------------+------------------------------
Reporter: yurivict271 | Owner: rl1987
Type: defect | Status: accepted
Priority: normal | Milestone: Tor: 0.2.???
Component: Tor | Version:
Resolution: | Keywords: tor-client, easy
Actual Points: | Parent ID:
Points: |
-----------------------------+------------------------------
Comment (by rl1987):
The above Python script was testing this behavior in slightly incorrect
way, since it would send the UDP ASSOCIATE request right after
establishing TCP connection to Tor. This is wrong way to do it, since
SOCKS5 server expects to get version identifier/method selection message
from client right after the TCP connection is established. If we send the
UDP ASSOCIATE request when Socks listener is still in expecting-to-get-
version-id/method-selection-message-from client state, it rightfully
responds with METHOD selection message `05 00` (see section "3. Procedure
for TCP-based clients" in RFC 1928).
I have fixed this fault in Python script and made quick-and-dirty fix for
SOCKS5 code as well. See https://github.com/rl1987/tor/tree/bug12971
Testing it with fixed script:
{{{
>> 05 01 00
<< 05 00
>> 05 03 00 01 08 08 08 08 00 35
<< 05 07 00 01 00 00 00 00 00 00
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/12971#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list