New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Protocol errors cause dropped cells #37
Comments
What Tor version was this attached to? And what vanguards commit? |
The HS sits idle but gets visitors from people crawling the web (its address is public on the net). Since then I've got this a few more times:
I now switched to debug logging. |
Ok, I have collected a bunch of these. There are three classes of them so far:
|
Ok I have filed https://trac.torproject.org/projects/tor/ticket/29786 for 1, https://trac.torproject.org/projects/tor/ticket/29699 for 2, and https://trac.torproject.org/projects/tor/ticket/29700 for 3. There may be more cases of buggy "normal" client behavior than the ones I have found. In the meantime, I think the best we can do is demote this log to notice, and maybe give select path bias circuits a free dropped cell (so we don't close them early and influence path bias counts). |
Passes unittests; needs more; needs live testing.
Ok asn, others: That commit has workarounds for the found cases so far. Can you please pull master and look for more WARNs? Those will be new instances. |
OK done. Will let you know of results. |
Ok there are a 4th class of these: mystery client-side ones that do not cause Tor to emit any log lines, even at debug level. I have filed https://trac.torproject.org/projects/tor/ticket/29927 for them. Committing workarounds shortly. |
Just FTR with vanguards
|
Yes, this is intentional. In this case, I chose to close the circuit since these happen infrequently, but I did not want to allow an adversary to send a lot of them down the same path. Because of both of these, I put the log message at NOTICE level, which we define in our README as being the level for "False positives that we know about." If you think this is still too scary, I'm open to suggestions. |
Got another instance of case 4. It turns out any circuit can get a dropped cell during construction, and then fail with END_CIRC_REASON_TORPRORTOCOL. There is also no log message for this. Possible ntor handshake failure, similar to the rend case? Not sure tho. Workaround coming |
They fail right after. If they do not fail, they will be killed during our next check of their dropped cells count after they are built.
Fixed in vanguards 0.3.1 that was released today. |
I have a public HS where I ran vanguards for testing. There is really no chance someone is gonna do a targetted attack on it because it's just a test HS.
I recently got:
What could be happening here?
The text was updated successfully, but these errors were encountered: