diff options
author | Nick Mathewson <nickm@torproject.org> | 2013-08-20 14:52:56 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2013-08-21 11:28:57 -0400 |
commit | 0daa26a4732234333e67d04c9b215ff6704fa9cd (patch) | |
tree | 1abe16b99d9cf7d5edffe7ed3cc765a6dd022ddb /bug9546 | |
parent | 64410cc88888ff964a82613cc53475def98d9de7 (diff) | |
download | tor-0daa26a4732234333e67d04c9b215ff6704fa9cd.tar tor-0daa26a4732234333e67d04c9b215ff6704fa9cd.tar.gz |
Send NETINFO on receiving a NETINFO if we have not yet sent one.
(Backport to Tor 0.2.3)
Relays previously, when initiating a connection, would only send a
NETINFO after sending an AUTHENTICATE. But bridges, when receiving a
connection, would never send AUTH_CHALLENGE. So relays wouldn't
AUTHENTICATE, and wouldn't NETINFO, and then bridges would be
surprised to be receiving CREATE cells on a non-open circuit.
Fixes bug 9546.
Diffstat (limited to 'bug9546')
-rw-r--r-- | bug9546 | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/bug9546 b/bug9546 new file mode 100644 index 000000000..8596eac94 --- /dev/null +++ b/bug9546 @@ -0,0 +1,5 @@ + o Major bugfixes: + + - When a relay is extending a circuit to a bridge, it needs to send a + NETINFO cell, even when the bridge hasn't sent an AUTH_CHALLENGE + cell. Fixes bug 9546; bugfix on ????. |