|
@@ -584,6 +584,10 @@ int fetch_from_buf_socks(buf_t *buf, socks_request_t *req) {
|
|
|
tor_assert(next < buf->mem+buf->datalen);
|
|
|
|
|
|
startaddr = NULL;
|
|
|
+ if (socks4_prot == socks4a && next+1 == buf->mem+buf->datalen) {
|
|
|
+ log_fn(LOG_DEBUG,"socks4: No part of destaddr here yet.");
|
|
|
+ return 0;
|
|
|
+ }
|
|
|
if (socks4_prot != socks4a && !have_warned_about_unsafe_socks) {
|
|
|
log_fn(LOG_WARN,"Your application (using socks4 on port %d) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead.", req->port);
|
|
|
|