Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-23 Thread Random Tor Node Operator
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 23.02.2016 22:12, Tom van der Woerdt wrote: > Op 23/02/16 om 22:10 schreef Toralf Förster: >> Louie Cardone-Noott: >>> Those like me running debian and putting off doing a reboot >>> might find needrestart (package of same name) and checkrestart >>>

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-23 Thread Tom van der Woerdt
Op 23/02/16 om 22:10 schreef Toralf Förster: > Louie Cardone-Noott: >> Those like me running debian and putting off doing a reboot might find >> needrestart (package of same name) and checkrestart (package >> debian-goodies) useful. > > Under Gentoo "lib_users -s" is a useful command IMO to see if

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-23 Thread Toralf Förster
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Louie Cardone-Noott: > Those like me running debian and putting off doing a reboot might find > needrestart (package of same name) and checkrestart (package > debian-goodies) useful. Under Gentoo "lib_users -s" is a useful command IMO to see if a in

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-23 Thread nusenu
Louie Cardone-Noott: > Based on the exploit, aren't, at most, only the exits vulnerable? I > didn't think middles would do any DNS resolving. I didn't mean to imply that tor does the relevant DNS lookup but most servers will do DNS lookups at some point (even if not caused by tor). signature.as

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-23 Thread nusenu
> you say that 64% of the guard relays and 51% of the exit relaysare are > unpatched ? These numbers are not based on relaycount but on guard/exit probability (so it takes a relay's contributed bandwidth/consensus weight into account). If you are more interested in relay counts: 3754 out of 7268

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-23 Thread Louie Cardone-Noott
Based on the exploit, aren't, at most, only the exits vulnerable? I didn't think middles would do any DNS resolving. Those like me running debian and putting off doing a reboot might find needrestart (package of same name) and checkrestart (package debian-goodies) useful. On Tue, 23 Feb 2016, at

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-22 Thread Dmitrii Tcvetkov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, 22 Feb 2016 21:16:42 -0800 Saint Aardvark the Carpeted wrote: > Most libraries aren't so central to everything that runs in Linux, and > restarting the programs that use the library in question is a > perfectly fine way to ensure you get the

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-22 Thread Josef 'veloc1ty' Stautner
Hi, you say that 64% of the guard relays and 51% of the exit relaysare are unpatched ? That's horrible! ~Josef Am 22.02.2016 um 23:44 schrieb nusenu: > Hi, > > if we assume for simplicity that every relay running Linux that has not > rebooted since 2016-02-16 is vulnerable to CVE-2015-7547, than

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-22 Thread Saint Aardvark the Carpeted
SuperSluether disturbed my sleep to write: > Hi, > > My Raspberry Pi and Ubuntu Server already have the updated version of libc6. > Is a reboot still required? I thought only kernel updates required a reboot. When you update a shared library, any running program that uses that library still has th

Re: [tor-relays] CVE-2015-7547 Tor network stats

2016-02-22 Thread SuperSluether
Hi, My Raspberry Pi and Ubuntu Server already have the updated version of libc6. Is a reboot still required? I thought only kernel updates required a reboot. On 02/22/2016 04:44 PM, nusenu wrote: Hi, if we assume for simplicity that every relay running Linux that has not rebooted since 2016

[tor-relays] CVE-2015-7547 Tor network stats

2016-02-22 Thread nusenu
Hi, if we assume for simplicity that every relay running Linux that has not rebooted since 2016-02-16 is vulnerable to CVE-2015-7547, than these are the current stats (optimistic, because we assume that everyone that rebooted did also update). Vulnerable relays: ++--+

Re: [tor-relays] CVE-2015-7547

2016-02-17 Thread nusenu
nick's statement on CVE-2015-7547: https://lists.torproject.org/pipermail/tor-talk/2016-February/040280.html signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/

Re: [tor-relays] CVE-2015-7547

2016-02-17 Thread Xza
As far as i know anything using glibc is affected, it says on the blog ssh,curl,sudo for examples. On February 17, 2016 6:06:50 PM GMT+01:00, starlight.201...@binnacle.cx wrote: >Could someone with a solid understanding of how the Tor daemon >interacts with DNS comment on whether and how CVE-2015

[tor-relays] CVE-2015-7547

2016-02-17 Thread starlight . 2016q1
Could someone with a solid understanding of how the Tor daemon interacts with DNS comment on whether and how CVE-2015-7547 (glibc DNS response buffer overflow, remotely exploitable) the bug impacts relay running under Linux? ___ tor-relays mailing list