Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tor socks5 auth spec violation #89

Open
handpickencounter opened this issue Nov 13, 2024 · 1 comment
Open

Tor socks5 auth spec violation #89

handpickencounter opened this issue Nov 13, 2024 · 1 comment

Comments

@handpickencounter
Copy link

handpickencounter commented Nov 13, 2024

Username should always be

<torS0X>0

https://spec.torproject.org/socks-extensions.html

If the SOCKS5 Username/Password fields are present but the Username does not begin with this byte sequence, it indicates legacy isolation. New client implementations SHOULD NOT use legacy isolation. A SocksPort may be configured to reject legacy isolation.

These extensions are in use whenever the SOCKS5 Username begins with the 8-byte "magic" sequence [3c 74 6f 72 53 30 58 3e]. (This is the ASCII encoding of ).

When the format type is [30] (the ascii encoding of 0), we interpret the rest of the Username field and the Password field as follows:

The remainder of the Username field must be empty.

The Password field is stream isolation parameter. If it is empty, the stream isolation parameter is an empty string.

@JeremyRand
Copy link
Member

Interesting, I wasn't aware of this spec change. Should be straightforward to support. Thanks for the heads up.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants