#14905: client descriptor-cookies are wrong for stealth auth
------------------------+------------------------------
Reporter: meejah | Owner:
Type: defect | Status: new
Priority: normal | Milestone:
Component: Tor | Version: Tor: unspecified
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
------------------------+------------------------------
Comment (by dgoulet):
Hrm, just above the auth type value is actually put in the + 1 location:
{{{
extended_desc_cookie[REND_DESC_COOKIE_LEN] =
((int)s->auth_type - 1) << 4;
}}}
So, I'm guessing that the auth type needs to be b64 encoded thus passing
the +1 len. Now why this is done only in the hostname field and not
client_keys, I don't know.
Did you encounteer an issue with this behaviour?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14905#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs