]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Fix socks5 handshake for username/password auth
authorRoger Dingledine <arma@torproject.org>
Wed, 15 May 2013 07:34:37 +0000 (03:34 -0400)
committerRoger Dingledine <arma@torproject.org>
Wed, 15 May 2013 07:34:37 +0000 (03:34 -0400)
The fix for bug 8117 exposed this bug, and it turns out real-world
applications like Pidgin do care. Bugfix on 0.2.3.2-alpha; fixes bug 8879.

changes/bug8879 [new file with mode: 0644]
src/or/buffers.c

diff --git a/changes/bug8879 b/changes/bug8879
new file mode 100644 (file)
index 0000000..0d2a700
--- /dev/null
@@ -0,0 +1,5 @@
+  o Major bugfixes:
+    - Follow the socks5 protocol when offering username/password
+      authentication. The fix for bug 8117 exposed this bug, and it
+      turns out real-world applications like Pidgin do care. Bugfix on
+      0.2.3.2-alpha; fixes bug 8879.
index d063d231350ffa88084dcf7245b77ce704610d56..c4c847ec87503bc96596ab996f2c52a929340fe9 100644 (file)
@@ -1751,7 +1751,7 @@ parse_socks(const char *data, size_t datalen, socks_request_t *req,
         return 0;
       }
       req->replylen = 2; /* 2 bytes of response */
-      req->reply[0] = 5;
+      req->reply[0] = 1; /* authversion == 1 */
       req->reply[1] = 0; /* authentication successful */
       log_debug(LD_APP,
                "socks5: Accepted username/password without checking.");