aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2014-06-04 15:12:45 -0400
committerNick Mathewson <nickm@torproject.org>2014-06-04 15:12:45 -0400
commit0073c5b517c7e42188214fa5b8c7b61fac6ba248 (patch)
treeb415a72e158caef83dd8fd71a9341dc7a457481b /src
parente74c3601567ab0ca14c5e2a7b9b40b416a47001e (diff)
parent9815029a2f1568cffb24919f151400b00ab82041 (diff)
downloadtor-0073c5b517c7e42188214fa5b8c7b61fac6ba248.tar
tor-0073c5b517c7e42188214fa5b8c7b61fac6ba248.tar.gz
Merge remote-tracking branch 'andrea/bug10616'
Diffstat (limited to 'src')
-rw-r--r--src/or/connection_edge.c22
1 files changed, 15 insertions, 7 deletions
diff --git a/src/or/connection_edge.c b/src/or/connection_edge.c
index a8ad9ec2e..49f9ba497 100644
--- a/src/or/connection_edge.c
+++ b/src/or/connection_edge.c
@@ -2295,13 +2295,21 @@ connection_ap_handshake_socks_reply(entry_connection_t *conn, char *reply,
endreason == END_STREAM_REASON_RESOURCELIMIT) {
if (!conn->edge_.on_circuit ||
!CIRCUIT_IS_ORIGIN(conn->edge_.on_circuit)) {
- // DNS remaps can trigger this. So can failed hidden service
- // lookups.
- log_info(LD_BUG,
- "No origin circuit for successful SOCKS stream "U64_FORMAT
- ". Reason: %d",
- U64_PRINTF_ARG(ENTRY_TO_CONN(conn)->global_identifier),
- endreason);
+ if (endreason != END_STREAM_REASON_RESOLVEFAILED) {
+ log_info(LD_BUG,
+ "No origin circuit for successful SOCKS stream "U64_FORMAT
+ ". Reason: %d",
+ U64_PRINTF_ARG(ENTRY_TO_CONN(conn)->global_identifier),
+ endreason);
+ }
+ /*
+ * Else DNS remaps and failed hidden service lookups can send us
+ * here with END_STREAM_REASON_RESOLVEFAILED; ignore it
+ *
+ * Perhaps we could make the test more precise; we can tell hidden
+ * services by conn->edge_.renddata != NULL; anything analogous for
+ * the DNS remap case?
+ */
} else {
// XXX: Hrmm. It looks like optimistic data can't go through this
// codepath, but someone should probably test it and make sure.