[tor-relays] network scan results for CVE-2016-5696 / rfc 5961
Alex Haydock
alex at alexhaydock.co.uk
Sat Nov 19 15:49:54 UTC 2016
Hi,
I don't really want to derail this thread, and I'm sure it's been said
before, but I'd love to put in a plug for the TorBSD Diversity Project here:
https://torbsd.github.io/
As a whole, the network is pretty homogeneous in terms of its reliance
on the Linux kernel so kernel bugs and exploits like this can end up
affecting a great portion of the network.
There are some graphs showing (the lack of) network diversity here,
which are interesting to look at:
http://torstatus.blutmagie.de/network_detail.php
Just a thought to consider when setting up future relays, for those who
already have experience working with other kernels like
FreeBSD/OpenBSD/Solaris etc.
Cheers,
Alex
On 17/11/16 07:30, dawuud wrote:
> Hi.
>
> I added the scan output to the repo, this includes the output csv file
> and a list of vulnerable relays:
>
> https://github.com/david415/scan_tor_rfc5961/blob/master/scan_archive/nov17_2016/probe_out.csv
> https://github.com/david415/scan_tor_rfc5961/blob/master/scan_archive/nov17_2016/vulnerable_tor_relays
>
>
> Upgrade your Linux kernel and reboot your tor relays!
>
> Cheers,
> David
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161119/718f2fbb/attachment.html>
More information about the tor-relays
mailing list