diff options
author | Aaron Hook <ahook@protonmail.com> | 2020-03-07 17:38:22 +0000 |
---|---|---|
committer | moneromooo-monero <moneromooo-monero@users.noreply.github.com> | 2020-03-07 18:12:59 +0000 |
commit | 7b9017f67140c3fd136502e8cff6bd44d15996c0 (patch) | |
tree | 21d8263d14b946b711ac42e46e3eef7b3e5a4f77 /src/blockchain_utilities/blockchain_import.cpp | |
parent | Merge pull request #6248 (diff) | |
download | monero-7b9017f67140c3fd136502e8cff6bd44d15996c0.tar.xz |
p2p: plug tor to clearnet association vector
During the handshake for an incoming connection, the peer id is checked against the local node's peer id only for the specific zone of the incoming peer, in order to avoid linking public addresses to tor addresses:
https://github.com/monero-project/monero/blob/5d7ae2d2791c0244a221872a7ac62627abb81896/src/p2p/net_node.inl#L2343
However, on handshakes for outgoing connections, all zones are checked:
https://github.com/monero-project/monero/blob/5d7ae2d2791c0244a221872a7ac62627abb81896/src/p2p/net_node.inl#L1064
If an attacker wanted to link a specific tor node to a public node, they could potentially connect to as many public nodes as possible, get themselves added to the peer whitelist, maybe stuff some more attacker-owned addresses into the greylist, then disconnect, and for any future incoming connections, respond with the tor node's id in an attempt to link the public/tor addresses.
Diffstat (limited to 'src/blockchain_utilities/blockchain_import.cpp')
0 files changed, 0 insertions, 0 deletions