slush wrote:
Hi to all again,

because it looks like conference did not receive emails with attachments, Im resending my initial email about problem I found. Attachments from original email are here:
http://www.slush.cz/centrumyahoo.png
http://www.slush.cz/centrum.png
http://www.slush.cz/centrumok.png

Regards,
Marek

On Thu, Jul 17, 2008 at 2:16 AM, slush <[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>> wrote:

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    Hi all,

    I dont have better contact (I cannot find any bugzilla for Tor), but I
    have to say, that there is serious problem in Tor (using last
    0.2.0.30 <http://0.2.0.30>
    version). It looks like buffer overflow, but I dont know, if it is
    problem of client or exit node (I dont suspect relays).

    In attachment, you can see three screenshot of the same page. On two
    of that, there are big artefacts from other pages (first of them is
    yahoo - see "Yahoo privacy policy", second is unknown - Serbia? -
    website). Because Im not using yahoo and I dont speak Serbia, these
    pages are not from my cache (latest stable Opera without any plugin).

    On third screenshot is original look&feel of centrum.cz
    <http://centrum.cz>, one of
    biggest portal in Czech Republic. It is almost impossible, that this
    is problem on their side. I hear about this Tor problem before weeks,
    but I did not believe that.

    Some IMPORTANT additional info. I found this bug when I broke my
    program using Tor, that he created very much circuits thru Tor (~ 1000
    circuits at the same time). I think it is very important for this
    description. On other case, I created them using standard Tor
    interface (extend circuit command on tor controller) and Tor did not
    say me about any problem. So it is definitely bug of tor (even if
    suspect, that 1000 circuits are not standard behaviour).

    Unfortunately, I dont know, which exit node serves me when error
    occured, so I dont know version of exit node :(

    Regards,
    slush (admin of tor relays slush and mwserver)


    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.4.6 (GNU/Linux)
    Comment: http://getfiregpg.org

    iD8DBQFIfo9Hr7KgZiv8EokRAskDAKCuYxXcd4g3beMQP4Lj/4awpXBoeQCeM7OV
    rnAkbBw/a8ssDO6U92u2qVk=
    =wVDS
    -----END PGP SIGNATURE-----




At first sight this appears to be an exit node problem but then, as I
read it, you say it occurs with more than one exit node and only at this
"higher" level of throughput.

Alarm bells are ringing ... to mix streams up like this then streams at
the "higher" throughput would have to be unencrypted clear streams - yes?

This would mean that either all tor exits are vulnerable and are mixing
the streams. Or that traffic is being passed wholesale *-unencrypted-*
between nodes (so that nodes other than the exit nodes are doing the
mixing).

Sh*ttt.. whatever.. this is a major BUG.

Reply via email to