Email or username:

Password:

Forgot your password?
14 comments
Troed Sångberg

@bagder "Typical server latency is likely "slow" enough to trigger this bug"

Nitpicking - but if it's the typical case it sounds a bit strange to refer to it as slow? :)

Erik Moeller

@bagder

Thanks so much for the clear & exemplary communications about this!

Eduard Toloza

@bagder I have been waiting for this, thank you, Daniel!

Terence Eden

@bagder
You are only human. But you're a pretty good human.

Thanks for the clear and detailed write up.

chkuendig :verified:

@bagder great explainer. You mention the hackerone report at the end - maybe worth linking it? I had to google it.

chkuendig :verified:

@bagder That explains why I just now couldnt find it via Google 😊

Howard Chu @ Symas

@bagder refactoring is always risky. Kinda wonder what an exploit scenario would look like though; it has to be a malicious server, the user has to be intentionally trying to reach it via SOCKS, and they must have some kind of ongoing service relationship for the server to have fingerprinted the client well enough to push an effective payload.

daniel:// stenberg://

@hyc yeah. Perhaps most realistically, a Tor user (which normally uses SOCKS5) going to a HTTPS site that has been breached or similar

Claudia

@bagder Tell the truth, you actually found it in the Bard

jade

@bagder I wonder if the upcoming bounds checked c rfc features from Apple in clang would be helpful at the very least as a defensive measure. but they also seem to be moving fairly slowly :(

Go Up