[tor-commits] [tor/maint-0.2.2] Clarify threat description and avoid negative uptimes.
nickm at torproject.org
nickm at torproject.org
Sat Mar 12 04:32:44 UTC 2011
commit 3a0c6021556abc96f4c610d5e097e3890216595f
Author: Nick Mathewson <nickm at torproject.org>
Date: Fri Mar 11 13:03:25 2011 -0500
Clarify threat description and avoid negative uptimes.
---
changes/hsdir_assignment | 7 ++++---
src/or/rephist.c | 2 +-
2 files changed, 5 insertions(+), 4 deletions(-)
diff --git a/changes/hsdir_assignment b/changes/hsdir_assignment
index ba01990..5c04b9b 100644
--- a/changes/hsdir_assignment
+++ b/changes/hsdir_assignment
@@ -2,6 +2,7 @@
- Directory authorities now use data collected from rephist when
choosing whether to assign the HSDir flag to relays, instead of
trusting the uptime value the relay reports in its descriptor.
- This helps prevent an attack where relatively few malaicious
- nodes can blackhole any given hidden service. Bugfix on
- 0.2.0.10-alpha; fixes bug 2709.
+ This helps prevent an attack where a small set of nodes with
+ frequently-changing identity keys can blackhole a hidden service.
+ (Only authorities need upgrade; others will be fine once they do.)
+ Bugfix on 0.2.0.10-alpha; fixes bug 2709.
diff --git a/src/or/rephist.c b/src/or/rephist.c
index 69001de..e4afe62 100644
--- a/src/or/rephist.c
+++ b/src/or/rephist.c
@@ -537,7 +537,7 @@ rep_hist_get_uptime(const char *id, time_t when)
or_history_t *hist = get_or_history(id);
if (!hist)
return 0;
- if (!hist->start_of_run)
+ if (!hist->start_of_run || when < hist->start_of_run)
return 0;
return when - hist->start_of_run;
}
More information about the tor-commits
mailing list