When a relay is configured as a bridge, a user reports this can lead to direct connections being made to the relay/bridge, even when a pluggable transport is configured. We have been unable to confirm this.
We should check directory_initiate_command_rend (the linked connection case), and connection_or_connect to make sure it is not possible for a connection to go directly to a configured bridge when a transport is set up.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
consensus updates rsand client using infor from riit's about ipv6not about generic conflict...it is when you paste meek bridge line and using plain tor relay...start tcpdump and watch for ip.addr == 188.138.1.166then with green onion menuchose tor network setting, choose to use bridge, customand pastermeek 0.0.2.0:2 3C3A6134E4B5B7D1C18AD4E86EE23FAC63866554 url=https://d2zfqthxsdq309.cloudfront.net/ front=a0.awsstatic.comit's fp for itit should to fail sometime during connectionstor using this p to get extend info for desc fetching*fpif knows such relay it using relay addrinsead of pt
188.138.1.166 is the direct address of the relay 3C3A6134E4B5B7D1C18AD4E86EE23FAC63866554, not the transport address of https://d2zfqthxsdq309.cloudfront.net/
Find a vanilla relay in cached-microdesc-consensus
Convert its fingerprint to hexadecimal
Start tcpdump matching on that relay's IP address
Go to about:config and copy the meek-amazon config value
Go to Tor Network Settings and paste that as a custom bridge, but replace its fingerprint with the hexadecimal fingerprint of the vanilla relay as converted above
Select New Tor Circuit for this Site
Watch as tcpdump shows inappropriate traffic flows to the vanilla relay
The page was able to load. The circuit viewer under the onion button reports I'm using a meek bridge, but I'm obviously not as tcpdump host 216.218.222.12 outputs.
Looks plausible! Is this tested? If so, I say we merge it to 0.3.2, and (barring misadventure) backport it in the next 0.3.1 release (not the one from tomorrow).
I tested this manually on 0.3.1 and 0.3.0. I can't seem to reproduce the original bug on 0.2.9, but I'm not sure that means the bug doesn't exist there. Notably, 0.2.9 predates some large changes in the guard subsystem.
I think we're willing to consider the hypothesis that the guard work in 0.3.0 caused this bug to surface so we probably don't need to backport it to 0.2.9.
Trac: Milestone: Tor: 0.3.1.x-final to Tor: 0.3.0.x-final
I think we're willing to consider the hypothesis that the guard work in 0.3.0 caused this bug to surface so we probably don't need to backport it to 0.2.9.
#23975 (moved) will address another root cause, by only checking routerinfo addresses for configured bridges.