[tor-relays] CVE-2015-7547

2016-02-17 Thread starlight . 2016q1
Could someone with a solid understanding of how the Tor daemon interacts with DNS comment on whether and how CVE-2015-7547 (glibc DNS response buffer overflow, remotely exploitable) the bug impacts relay running under Linux? ___ tor-relays mailing list

Re: [tor-relays] CVE-2015-7547

2016-02-17 Thread Xza
As far as i know anything using glibc is affected, it says on the blog ssh,curl,sudo for examples. On February 17, 2016 6:06:50 PM GMT+01:00, starlight.201...@binnacle.cx wrote: >Could someone with a solid understanding of how the Tor daemon >interacts with DNS comment on whether and how CVE-2015

Re: [tor-relays] CVE-2015-7547

2016-02-17 Thread nusenu
nick's statement on CVE-2015-7547: https://lists.torproject.org/pipermail/tor-talk/2016-February/040280.html signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/

[tor-relays] Mexico ISP blocking authority nodes and preventing exit relays.

2016-02-17 Thread Ricardo Malagon Jerez
I don't know how and why, but since January is impossible to have an exit relay in Telmex ISP. And is harder to reach authority nodes. Someone wrote about this, but is mid February and is the same. Tor 2.8 alpha works pretty good with the authority fallback measures, but I can't implement the exit