aboutsummaryrefslogtreecommitdiff
path: root/ChangeLog
Commit message (Collapse)AuthorAge
* clean up changelog for the 0.2.2.6-alpha releaseRoger Dingledine2009-11-17
|
* Fix a memory leak on directory authorities during votingRoger Dingledine2009-11-12
| | | | | Fix a memory leak on directory authorities during voting that was introduced in 0.2.2.1-alpha. Found via valgrind.
* Add changelog entry to 0.2.2.x about openssl 0.9.8l fixNick Mathewson2009-11-06
|
* Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-11-06
|\ | | | | | | | | Conflicts: src/common/tortls.c
| * Make Tor work with OpenSSL 0.9.8lNick Mathewson2009-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it.
* | Implement DisableAllSwap to avoid putting secret info in page files.Jacob Appelbaum2009-10-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit implements a new config option: 'DisableAllSwap' This option probably only works properly when Tor is started as root. We added two new functions: tor_mlockall() and tor_set_max_memlock(). tor_mlockall() attempts to mlock() all current and all future memory pages. For tor_mlockall() to work properly we set the process rlimits for memory to RLIM_INFINITY (and beyond) inside of tor_set_max_memlock(). We behave differently from mlockall() by only allowing tor_mlockall() to be called one single time. All other calls will result in a return code of 1. It is not possible to change DisableAllSwap while running. A sample configuration item was added to the torrc.complete.in config file. A new item in the man page for DisableAllSwap was added. Thanks to Moxie Marlinspike and Chris Palmer for their feedback on this patch. Please note that we make no guarantees about the quality of your OS and its mlock/mlockall implementation. It is possible that this will do nothing at all. It is also possible that you can ulimit the mlock properties of a given user such that root is not required. This has not been extensively tested and is unsupported. I have included some comments for possible ways we can handle this on win32.
* | Fix bug 1113.Karsten Loesing2009-10-27
| | | | | | | | Bridges do not use the default exit policy, but reject *:* by default.
* | Fix bug 1042.Karsten Loesing2009-10-26
| | | | | | | | | | | | If your relay can't keep up with the number of incoming create cells, it would log one warning per failure into your logs. Limit warnings to 1 per minute.
* | Merge commit 'karsten/fix-1066-3'Roger Dingledine2009-10-26
|\ \
| * | Fix bug 1066.Karsten Loesing2009-10-26
| | | | | | | | | | | | | | | | | | If all authorities restart at once right before a consensus vote, nobody will vote about "Running", and clients will get a consensus with no usable relays. Instead, authorities refuse to build a consensus if this happens.
* | | Note coverity fixes in changelog.Nick Mathewson2009-10-26
| | |
* | | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-10-26
|\ \ \ | | |/ | |/|
| * | Add changelog to describe coverity fixes for 0.2.1.21Nick Mathewson2009-10-26
| | |
* | | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-10-26
|\| | | |/ |/| | | | | Conflicts: ChangeLog
| * Only send the if_modified_since header for a v3 consensus.Nick Mathewson2009-10-26
| | | | | | | | | | Spotted by xmux; bugfix on 0.2.0.10-alpha. (Bug introduced by 20b10859)
* | add a changelog entry to karsten's fix for bug 1114Roger Dingledine2009-10-26
| |
* | Changelog for microdescriptor branch.Nick Mathewson2009-10-19
| |
* | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-10-15
|\| | | | | | | | | | | | | | | | | Conflicts: ChangeLog configure.in contrib/tor-mingw.nsi.in src/or/config.c src/win32/orconfig.h
| * bump to 0.2.1.20Roger Dingledine2009-10-15
| |
| * Move moria1 and Tonga to alternate IP addresses.Roger Dingledine2009-10-15
| |
| * read the "circwindow" parameter from the consensusRoger Dingledine2009-10-14
| | | | | | | | | | backport of c43859c5c12361fad505 backport of 0d13e0ed145f4c1b5bd1
* | add blurbs for recent dev releasesRoger Dingledine2009-10-14
| |
* | Fix a crash when using evdns from Libevent 2.Nick Mathewson2009-10-13
| | | | | | | | | | | | | | | | | | | | When we tried to use the deprecated non-threadsafe evdns interfaces in Libevent 2 without using the also-deprecated event_init() interface, Libevent 2 would sensibly crash, since it has no guess where to find the Libevent library. Here we use the evdns_base_*() functions instead if they're present, and fake them if they aren't.
* | move nickm's commit to the correct releaseRoger Dingledine2009-10-12
| |
* | Move android changelog entry to now-correct Tor version.Nick Mathewson2009-10-11
| |
* | Merge commit 'public/android'Nick Mathewson2009-10-11
|\ \
| * | Add changelog entry for Android work.Nick Mathewson2009-09-29
| | |
* | | Move dizum to an alternate IP address.Roger Dingledine2009-10-11
| | |
* | | bump to 0.2.2.4-alphaRoger Dingledine2009-10-10
| | |
* | | Don't set unreachable from dirvote unless we've been running a while.Nick Mathewson2009-10-10
| | | | | | | | | | | | | | | | | | | | | This is a possible fix for bug 1023, where if we vote (or make a v2 consensus networkstatus) right after we come online, we can call rep_hist_note_router_unreachable() on every router we haven't connected to yet, and thereby make all their uptime values reset.
* | | remove some dead code. some of it was tickling coverity.Roger Dingledine2009-10-10
| | |
* | | add blurbs for recent alpha releasesRoger Dingledine2009-10-10
| | |
* | | amend changelog for recent commits, plus clean upRoger Dingledine2009-10-07
| | |
* | | Ignore one-hop circuits for circuit timeout calcRoger Dingledine2009-10-01
| | | | | | | | | | | | | | | | | | Don't count one-hop circuits when we're estimating how long it takes circuits to build on average. Otherwise we'll set our circuit build timeout lower than we should. Bugfix on 0.2.2.2-alpha.
* | | Move Tonga to an alternate IP addressRoger Dingledine2009-09-30
| | |
* | | Move moria1 to a nearby IP addressRoger Dingledine2009-09-30
| | |
* | | Dir auths reject relays running < Tor 0.1.2.14Roger Dingledine2009-09-30
| | | | | | | | | | | | | | | | | | Directory authorities now reject Tor relays with versions less than 0.1.2.14. This step cuts out four relays from the current network, none of which are very big.
* | | Fix 1108: Handle corrupt or large build times state.Mike Perry2009-09-29
|/ / | | | | | | | | | | 1108 was actually just a fencepost error in an assert, but making the state file handling code resilient is a good idea.
* | Make sure we can't overflow in connection_ap_handshake_send_resolveSebastian Hahn2009-09-27
| | | | | | | | Found by Coverity
* | Fix memory leakSebastian Hahn2009-09-27
| | | | | | | | | | | | | | Some memory could be lost in the error case of circuit_build_times_parse_state. Found by Coverity
* | Merge branch 'master' of ssh://git.torproject.org/git/torRoger Dingledine2009-09-24
|\ \
| * \ Merge commit 'karsten/stats-fixes-master'Roger Dingledine2009-09-24
| |\ \
| | * | Fix a couple of smaller issues with gathering statistics.Karsten Loesing2009-09-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Avoid memmoving 0 bytes which might lead to compiler warnings. - Don't require relays to be entry node AND bridge at the same to time to record clients. - Fix a memory leak when writing dirreq-stats. - Don't say in the stats files that measurement intervals are twice as long as they really are. - Reduce minimum observation time for requests to 12 hours, or we might never record usage. - Clear exit stats correctly after writing them, or we accumulate old stats over time. - Reset interval start for buffer stats, too.
* | | | Revert to the "June 3 2009" ip-to-country file.Roger Dingledine2009-09-24
|/ / / | | | | | | | | | The September one seems to have removed most US IP addresses.
* / / Debugging logs for TLS handshakeNick Mathewson2009-09-24
|/ / | | | | | | | | | | | | | | | | | | | | | | The big change is to add a function to display the current SSL handshake state, and to log it everywhere reasonable. (A failure in SSL23_ST_CR_SRVR_HELLO_A is different from one in SSL3_ST_CR_SESSION_TICKET_A.) This patch also adds a new log domain for OR handshaking, so you can pull out all the handshake log messages without having to run at debug for everything. For example, you'd just say "log notice-err [handshake]debug-err file tor.log".
* | Changelog for unit test refactoring.Nick Mathewson2009-09-23
| |
* | finishing touches on the changelogRoger Dingledine2009-09-23
| |
* | bump to 0.2.2.3-alpha, plus add a changelog for bug 1103Roger Dingledine2009-09-22
| |
* | Be more robust to bad circwindow valuesRoger Dingledine2009-09-22
| | | | | | | | | | | | | | | | | | If the networkstatus consensus tells us that we should use a negative circuit package window, ignore it. Otherwise we'll believe it and then trigger an assert. Also, change the interface for networkstatus_get_param() so we don't have to lookup the consensus beforehand.
* | Bump version to 0.2.2.2-alpha-devNick Mathewson2009-09-21
| |