[tor-bugs] #32672 [Core Tor/Tor]: Reject 0.2.9 and 0.4.0 in dirserv_rejects_tor_version()
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Feb 19 16:52:21 UTC 2020
#32672: Reject 0.2.9 and 0.4.0 in dirserv_rejects_tor_version()
-------------------------------------------------+-------------------------
Reporter: teor | Owner: neel
Type: task | Status:
| merge_ready
Priority: Medium | Milestone: Tor:
| 0.4.4.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: 044-should, 043-backport, | Actual Points:
041-backport, 042-backport, consider- |
backport-after-authority-test, fast-fix, |
network-health |
Parent ID: | Points: 0.5
Reviewer: teor | Sponsor:
-------------------------------------------------+-------------------------
Comment (by nickm):
Gk asks:
>nickm: assuming we want to have this in 0.4.4, what is the latest date we
need to make a decision here (not taking into account that the new
0.4.4/older versions with a backported patch need to get released and
deployed first)? (That is: how much time do we have left to think about
the potential impact on relay bandwidth/diversity etc. and try different
means to reach affected operators?)
Our feature freeze date for 0.4.4 is May 15, but I would like to have
these versions off the network sooner than that if we can.
I think we should aim to contact the affected relay operators soon, and
measure what effect that has. If it helps, we can try doing it more --
but it may be that we don't see much effect, and the right thing to do is
just to disable these versions.
Teor notes:
>If we patch any security issues, we won't patch 0.2.9 or 0.4.0. If we
decide that a security fix is required, we might need to reject them
straight after the release of that fix. We don't really control the timing
of security fixes.
Right, and the kind of security bug that we run into is important. If
(heaven forbid) we find an RCE issue, or a memory exposure issue, we'll
need everybody to upgrade asap, with no delays, and no excuses. If we run
into a remote crash or CPU DoS issue, then we still want everybody to
upgrade, since the issue would have potential to make traffic analysis
easier, but it wouldn't be under ''as much'' time pressure as a critical-
severity issue would be.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32672#comment:29>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list