research control port filter proxy whiltelist wildcard security implications

Information

ID: 446
PHID: PHID-TASK-p6abrrzk7pgekzkzulfq
Author: Patrick
Status at Migration Time: resolved
Priority at Migration Time: Normal

Description

We now have control port filter proxy whiltelist wildcard support. (T445)

(Variable CONTROL_PORT_FILTER_ALLOW_WILDCARDS. It’s disabled by default, but by the time it gets enabled for example by users on onionshare or ricochet, we need to know about the security implications.)

This ticket is for researching the security implications.

If we whilte listed the wildcard add_onion *, we don’t want it to match some hypothetical feature add_onion * ; .... I.e. not add_onion * ; GETINFO address.

To be researched, if Tor’s control protocol actually supports something like ;. If it does, then this would complicate the wildcard feature.

(If it was the case, then we would have to limit the wildcard (*) from example SETCONF HiddenServicePort * to exactly one [numeric] argument etc. Or better, correctly parse multi lined commands.)

Tor Control Protocol description:
https://gitweb.torproject.org/torspec.git/tree/control-spec.txt

Comments


HulaHoop

2015-12-05 20:31:46 UTC


Patrick

2015-12-06 13:10:10 UTC


HulaHoop

2015-12-07 14:55:14 UTC


Patrick

2015-12-07 15:03:38 UTC


HulaHoop

2015-12-31 18:29:54 UTC


Patrick

2016-01-02 22:30:54 UTC


HulaHoop

2016-01-03 15:31:39 UTC


Patrick

2016-01-03 15:37:24 UTC


HulaHoop

2016-01-03 23:03:00 UTC


HulaHoop

2016-01-10 15:09:42 UTC


Patrick

2016-01-10 15:16:06 UTC


Patrick

2016-01-10 15:27:46 UTC


Patrick

2016-01-10 17:01:34 UTC


Patrick

2016-01-10 17:55:46 UTC


Patrick

2016-01-13 14:33:14 UTC