Tor Browser Bundle for Linux (2.2.35-8) "EVIL bug"


 
Thread Tools Search this Thread
Special Forums Cybersecurity Tor Browser Bundle for Linux (2.2.35-8) "EVIL bug"
# 1  
Old 03-19-2012
Tor Browser Bundle for Linux (2.2.35-8) "EVIL bug"

There is an EVIL bug in at least the Linux (2.2.35-8) Tor Browser Bundle start-tor-browser script. It will log things like domain names to a file in the root of the browser bundle.

trac.torproject.org/projects/tor/ticket/5417

Ticket #5417 (new defect)

RelativeLink.sh in Tor browser bundle has small typo causing debug mode to be always turned on

Reported by: cypherpunks
Priority: critical
Component: Tor bundles/installation

Description

TBB starts in debug mode disregardless of --debug switch used or not. This is caused by small bug on line 208 on RelativeLink.sh, where it says

if [ "${debug}" ];

where it should say

if [ "${debug}" == 1];

or

if [ ${debug} -eq 1 ];
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Is this a bug of linux's "ls" command?

I found an interesting thing with ls. do the following steps in your linux: open a terminal mkdir x cd x echo "aaa" > test1 ls <you will see test1> Don't close the terminal, open another terminal rm -r x mkdir x cd x echo "aaa" > test2 ls <you will see test2> Now go to the first... (1 Reply)
Discussion started by: meili100
1 Replies
Login or Register to Ask a Question
TOR-GENCERT(1)							    Tor Manual							    TOR-GENCERT(1)

NAME
tor-gencert - Generate certs and keys for Tor directory authorities SYNOPSIS
tor-gencert [-h|--help] [-v] [-r|--reuse] [--create-identity-key] [-i id_file] [-c cert_file] [-m num] [-a address:port] DESCRIPTION
tor-gencert generates certificates and private keys for use by Tor directory authorities running the v3 Tor directory protocol, as used by Tor 0.2.0 and later. If you are not running a directory authority, you don't need to use tor-gencert. Every directory authority has a long term authority identity key (which is distinct from the identity key it uses as a Tor server); this key should be kept offline in a secure location. It is used to certify shorter-lived signing keys, which are kept online and used by the directory authority to sign votes and consensus documents. After you use this program to generate a signing key and a certificate, copy those files to the keys subdirectory of your Tor process, and send Tor a SIGHUP signal. DO NOT COPY THE IDENTITY KEY. OPTIONS
-v Display verbose output. -h or --help Display help text and exit. -r or --reuse Generate a new certificate, but not a new signing key. This can be used to change the address or lifetime associated with a given key. --create-identity-key Generate a new identity key. You should only use this option the first time you run tor-gencert; in the future, you should use the identity key that's already there. -i FILENAME Read the identity key from the specified file. If the file is not present and --create-identity-key is provided, create the identity key in the specified file. Default: "./authority_identity_key" -s FILENAME Write the signing key to the specified file. Default: "./authority_signing_key" -c FILENAME Write the certificate to the specified file. Default: "./authority_certificate" -m NUM Number of months that the certificate should be valid. Default: 12. --passphrase-fd FILEDES Filedescriptor to read the file descriptor from. Ends at the first NUL or newline. Default: read from the terminal. -a address:port If provided, advertise the address:port combination as this authority's preferred directory port in its certificate. If the address is a hostname, the hostname is resolved to an IP before it's published. BUGS
This probably doesn't run on Windows. That's not a big issue, since we don't really want authorities to be running on Windows anyway. SEE ALSO
tor(1) See also the "dir-spec.txt" file, distributed with Tor. AUTHORS
Roger Dingledine <arma@mit.edu>, Nick Mathewson <nickm@alum.mit.edu>. AUTHOR
Nick Mathewson Author. Tor 09/26/2014 TOR-GENCERT(1)