We obey sendme cells even when we shouldn't get them
A client can send sendme cells preemptively to the exit relay, allowing:
-
cheating on her flow/congestion control, to get her bytes faster
-
DoS on the network, by adding way more cells into the network than she was supposed to.
-
perhaps a memory DoS on the entry relay, if she stops reading from the TLS connection but keeps up the blitz of sendme cells.
I believe the fix is to tear down the circuit when we get a sendme we should not have gotten.
- Show closed items
Activity
-
Newest first Oldest first
-
Show all activity Show comments only Show history only
- Roger Dingledine changed milestone to %Tor: 0.2.3.x-final in legacy/trac
changed milestone to %Tor: 0.2.3.x-final in legacy/trac
- Author Reporter
see my branch 6252
not intended to go into 0.2.3.18-rc
Trac:
Status: new to needs_review - Owner
Looks okay to me.
- Author Reporter
Merged then.
Trac:
Resolution: N/A to fixed
Status: needs_review to closed - Author Reporter
Trac:
Status: closed to reopened
Resolution: fixed to N/A - Author Reporter
Hm. Running it on moria1 with protocolwarnings 1, I see quite a few
Jul 01 05:37:54.000 [warn] Bug/attack: unexpected sendme cell from client. Closing circ. Jul 01 05:37:54.000 [warn] connection_edge_process_relay_cell (away from origin) failed. Jul 01 05:37:54.000 [warn] circuit_receive_relay_cell (forward) failed. Closing.
I wonder if these are people performing the exploit, or people otherwise doing something unexpected.
- Author Reporter
Ok, I reverted.
moria1 was seeing circwindows of 1950+ in normal operation.
- Author Reporter
legacy/trac#6271 (moved) for the new bug.
Trac:
Status: reopened to needs_information - Author Reporter
Fyi, I'm running the legacy/trac#6271 (moved) patch and the legacy/trac#6252 (moved) patch on moria1, with no complaints now.
- Owner
So do you think we can re-cherrypick the 6252 patch again? If so see branch "bug6252_again" in my public repository.
Trac:
Status: needs_information to needs_review - Author Reporter
Still no warnings on moria1. What could go wrong! Let's do it.
- Author Reporter
(should we make the warnings louder for a few versions, in case they show up on, say, exit relays?)
- Owner
Maybe we should rate-limit them if we do?
- Author Reporter
Sure.
Or we could merge it into master first, with warnings loud, and later put it into 0.2.3 with fewer warnings?
- Owner
Or put it into 0.2.3 nice and quiet and make it loud in master. The possibilities are endless. "Feel free" say I
- Owner
Merging into maint-0.2.3; making the warnings louder in master.
If you want to change that, feel free.
Trac:
Resolution: N/A to fixed
Status: needs_review to closed - Owner
Trac:
Keywords: N/A deleted, tor-relay added - Owner
Trac:
Component: Tor Relay to Tor grep "Bug/attack" /var/log/tor/notices*
Replying to arma:
(should we make the warnings louder for a few versions, in case they show up on, say, exit relays?)
I'm not sure if this is interesting, but I see these warnings quite often on our exits. (see attachment for example)
Tor 0.2.4.6-alpha (git-6fd93dcf3fbabe2b) straight from deb repository.
- Trac closed
closed
- Roger Dingledine mentioned in issue legacy/trac#6271 (moved)
mentioned in issue legacy/trac#6271 (moved)
- Roger Dingledine mentioned in issue legacy/trac#8093 (moved)
mentioned in issue legacy/trac#8093 (moved)
- Trac mentioned in issue legacy/trac#8185 (moved)
mentioned in issue legacy/trac#8185 (moved)
- Roger Dingledine mentioned in issue legacy/trac#9063 (moved)
mentioned in issue legacy/trac#9063 (moved)
- Trac moved from legacy/trac#6252 (moved)
moved from legacy/trac#6252 (moved)
- Trac mentioned in issue #9063 (closed)
mentioned in issue #9063 (closed)