[tor-bugs] #23588 [Core Tor/Tor]: Write fascist_firewall_choose_address_ls() and use it in hs_get_extend_info_from_lspecs()
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Aug 16 01:24:17 UTC 2018
#23588: Write fascist_firewall_choose_address_ls() and use it in
hs_get_extend_info_from_lspecs()
-------------------------------------------------+-------------------------
Reporter: teor | Owner: neel
Type: defect | Status:
| needs_revision
Priority: Medium | Milestone: Tor:
| 0.3.5.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: prop224, tor-hs, single-onion, | Actual Points:
ipv6, 034-triage-20180328, |
034-removed-20180328 |
Parent ID: #23493 | Points: 1
Reviewer: teor | Sponsor:
-------------------------------------------------+-------------------------
Comment (by teor):
Replying to [comment:36 neel]:
> I think I know what the bug for `hs-v23-ipv6-md` is: some addresses are
being marked as invalid as they don't make it through
`fascist_firewall_allows_address_ap()` (I believe the main Tor codebase
does not make addresses go though this now, nor does my old "simplified"
address choosing code that got abandoned).
This issue sounds like a bug in fascist_firewall_allows_address_ap(), or a
bug in how we're using fascist_firewall_allows_address_ap().
(The v2 onion service code uses fascist_firewall_allows_address_ap() and
it works.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23588#comment:44>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list