Could someone with a solid understanding of how the Tor daemon interacts with
DNS comment on whether and how CVE-2015-7547 (glibc DNS response buffer
overflow, remotely exploitable) the bug impacts relay running under Linux?
___
tor-relays mailing list
As far as i know anything using glibc is affected, it says on the blog
ssh,curl,sudo for examples.
On February 17, 2016 6:06:50 PM GMT+01:00, starlight.201...@binnacle.cx wrote:
>Could someone with a solid understanding of how the Tor daemon
>interacts with DNS comment on whether and how CVE-2015
nick's statement on CVE-2015-7547:
https://lists.torproject.org/pipermail/tor-talk/2016-February/040280.html
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/
I don't know how and why, but since January is impossible to have an exit
relay in Telmex ISP.
And is harder to reach authority nodes.
Someone wrote about this, but is mid February and is the same.
Tor 2.8 alpha works pretty good with the authority fallback measures, but I
can't implement the exit