aboutsummaryrefslogtreecommitdiff
path: root/src/or
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2004-08-07 04:03:01 +0000
committerRoger Dingledine <arma@torproject.org>2004-08-07 04:03:01 +0000
commitdbf150bd4ee75fbb73413d57563e70fc30bfd4ae (patch)
tree26b939a2169a56b9160534005bc56034dcfbe135 /src/or
parentbc24c3f47d18b4bbd2ae51c6f1277ba7eabd259d (diff)
downloadtor-dbf150bd4ee75fbb73413d57563e70fc30bfd4ae.tar
tor-dbf150bd4ee75fbb73413d57563e70fc30bfd4ae.tar.gz
list the port and socks version when complaining about unsafe socks
svn:r2188
Diffstat (limited to 'src/or')
-rw-r--r--src/or/buffers.c11
1 files changed, 6 insertions, 5 deletions
diff --git a/src/or/buffers.c b/src/or/buffers.c
index 0f15e7bbf..01b73bfe5 100644
--- a/src/or/buffers.c
+++ b/src/or/buffers.c
@@ -484,10 +484,7 @@ int fetch_from_buf_socks(buf_t *buf, socks_request_t *req) {
log_fn(LOG_DEBUG,"socks5: ipv4 address type");
if(buf->datalen < 10) /* ip/port there? */
return 0; /* not yet */
- if(!have_warned_about_unsafe_socks) {
- log_fn(LOG_WARN,"Your application is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead.");
-// have_warned_about_unsafe_socks = 1; // (for now, warn every time)
- }
+
destip = ntohl(*(uint32_t*)(buf->mem+4));
in.s_addr = htonl(destip);
tmpbuf = inet_ntoa(in);
@@ -499,6 +496,10 @@ int fetch_from_buf_socks(buf_t *buf, socks_request_t *req) {
strcpy(req->address,tmpbuf);
req->port = ntohs(*(uint16_t*)(buf->mem+8));
buf_remove_from_front(buf, 10);
+ if(!have_warned_about_unsafe_socks) {
+ log_fn(LOG_WARN,"Your application (socks5, on port %d) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead.", req->port);
+// have_warned_about_unsafe_socks = 1; // (for now, warn every time)
+ }
return 1;
case 3: /* fqdn */
log_fn(LOG_DEBUG,"socks5: fqdn address type");
@@ -565,7 +566,7 @@ int fetch_from_buf_socks(buf_t *buf, socks_request_t *req) {
startaddr = next+1;
if(socks4_prot != socks4a && !have_warned_about_unsafe_socks) {
- log_fn(LOG_WARN,"Your application is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead.");
+ log_fn(LOG_WARN,"Your application (socks4, on port %d) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead.", req->port);
// have_warned_about_unsafe_socks = 1; // (for now, warn every time)
}
if(socks4_prot == socks4a) {