bug6252_again 579 B

1234567891011
  1. o Security fixes:
  2. - Tear down the circuit if we get an unexpected SENDME cell. Clients
  3. could use this trick to make their circuits receive cells faster
  4. than our flow control would have allowed, or to gum up the network,
  5. or possibly to do targeted memory denial-of-service attacks on
  6. entry nodes. Fixes bug 6252. Bugfix on the 54th commit on Tor --
  7. from July 2002, before the release of Tor 0.0.0. We had committed
  8. this patch previously, but we had to revert it because of bug 6271.
  9. Now that 6271 is fixed, this appears to work.