[tor-bugs] #25036 [Core Tor/Tor]: Tor 0.3.2 rejects connections to raw ipv6 addresses
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sat Jan 27 21:44:35 UTC 2018
#25036: Tor 0.3.2 rejects connections to raw ipv6 addresses
------------------------------------------+--------------------------------
Reporter: pastly | Owner: tbb-team
Type: defect | Status: new
Priority: High | Milestone: Tor:
| 0.3.3.x-final
Component: Core Tor/Tor | Version: Tor:
| 0.3.2.1-alpha
Severity: Normal | Resolution:
Keywords: regression ipv6 032-backport | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
------------------------------------------+--------------------------------
Comment (by teor):
Using string_is_valid_hostname() excludes IPv6 addresses.
(It doesn't exclude IPv4 addresses, because they are numbers separated by
dots. Let's deal with that in #25055.)
{{{
/** Return true iff <b>string</b> matches a pattern of DNS names
* that we allow Tor clients to connect to.
*
* Note: This allows certain technically invalid characters ('_') to cope
* with misconfigured zones that have been encountered in the wild.
*/
int
string_is_valid_hostname(const char *string)
}}}
We should check both calls introduced by this patch. I think the second
call should be modified to include IPv4 and IPv6 addresses. And we should
add a unit test for this use case.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25036#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list