aboutsummaryrefslogtreecommitdiff
path: root/changes
Commit message (Collapse)AuthorAge
* Merge branch 'bug2279' into maint-0.2.2Nick Mathewson2011-02-07
|\
| * Add an option to disable the block-private-addresses featureNick Mathewson2011-01-26
| | | | | | | | Suggested by rransom. Probably necessary for testing network mode.
| * Add client code to detect attempts to connect to 127.0.0.1 etcNick Mathewson2011-01-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | We detect and reject said attempts if there is no chosen exit node or circuit: connecting to a private addr via a randomly chosen exit node will usually fail (if all exits reject private addresses), is always ill-defined (you're not asking for any particular host or service), and usually an error (you've configured all requests to go over Tor when you really wanted to configure all _remote_ requests to go over Tor). This can also help detect forwarding loop requests. Found as part of bug2279.
| * Fix double-mark bug when failing to init transparent connectionNick Mathewson2011-01-25
| | | | | | | | Fixes part of bug 2279. Bugfix on 0.1.2.1-alpha.
* | Merge branch 'bug2203_rebased' into maint-0.2.2Nick Mathewson2011-02-04
|\ \
| * | Add changelog entry for bug2203.Mike Perry2011-01-25
| |/
* | changes file for ASLR/DEP build on windowsNick Mathewson2011-02-03
| |
* | Merge remote branch 'sebastian/bug2450' into maint-0.2.2Nick Mathewson2011-02-03
|\ \
| * | Remove country codes from EntryNodes manpage entrySebastian Hahn2011-01-28
| | |
* | | Merge remote branch 'public/bug2378' into maint-0.2.2Nick Mathewson2011-02-03
|\ \ \ | |/ / |/| |
| * | Correctly detect BIO_new failuresNick Mathewson2011-01-25
| | | | | | | | | | | | | | | | | | This bug was noticed by cypherpunks; fixes bug 2378. Bugfix on svn commit r110.
| * | Always treat failure to allocate an RSA key as an unrecoverable allocation errorNick Mathewson2011-01-25
| |/
* | Merge branch 'bug2181' into maint-0.2.2Nick Mathewson2011-01-26
|\ \
| * | Log more about soft-hibernationNick Mathewson2011-01-25
| |/
* | Merge branch 'bug2409' into maint-0.2.2Nick Mathewson2011-01-26
|\ \ | |/ |/|
| * Fix bug in verifying directory signatures with short digestsNick Mathewson2011-01-25
| | | | | | | | | | | | | | | | If we got a signed digest that was shorter than the required digest length, but longer than 20 bytes, we would accept it as long enough.... and then immediately fail when we want to check it. Fixes bug 2409; bug in 0.2.2.20-alpha; found by piebeer.
* | Add changes file for bug2004Nick Mathewson2011-01-25
|/
* Tell which geoip file we're parsingSebastian Hahn2011-01-25
|
* Fix assert for relay/bridge state changeSebastian Hahn2011-01-25
| | | | | | | | | When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433.
* Make the DH parameter we use for TLS match the one from Apache's mod_sslNick Mathewson2011-01-24
| | | | | | Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance.
* Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-20
|\
| * Merge remote branch 'rransom/policy_summarize-assert' into maint-0.2.1Nick Mathewson2011-01-20
| |\
| | * Fix bounds-checking in policy_summarizeRobert Ransom2011-01-20
| | | | | | | | | | | | Found by piebeer.
* | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-19
|\| |
| * | Fix two more SIZE_T_CEILING issuesNick Mathewson2011-01-19
| |/ | | | | | | | | | | | | | | | | | | | | This patch imposes (very long) limits on the length of a line in a directory document, and on the length of a certificate. I don't think it should actually be possible to overrun these remotely, since we already impose a maximum size on any directory object we're downloading, but a little defensive programming never hurt anybody. Roger emailed me that doorss reported these on IRC, but nobody seems to have put them on the bugtracker.
* | Merge commit 'sebastian/bug2317' into maint-0.2.2Roger Dingledine2011-01-15
|\ \
| * | Sanity-check consensus param valuesSebastian Hahn2011-01-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We need to make sure that the worst thing that a weird consensus param can do to us is to break our Tor (and only if the other Tors are reliably broken in the same way) so that the majority of directory authorities can't pull any attacks that are worse than the DoS that they can trigger by simply shutting down. One of these worse things was the cbtnummodes parameter, which could lead to heap corruption on some systems if the value was sufficiently large. This commit fixes this particular issue and also introduces sanity checking for all consensus parameters.
* | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\ \ \ | |/ / |/| / | |/
| * Fix a couple of non-cleared key issues in hidden servicesNick Mathewson2011-01-15
| | | | | | | | we need to do more hunting, but this fixes the ones mentioned in 2385.
| * Zero out some more key data before freeing itNick Mathewson2011-01-15
| | | | | | | | Found by cypherpunks; fixes bug 2384.
* | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\| | | | | | | | | | | Conflicts: src/or/routerparse.c src/or/test.c
| * Merge branch 'bug2352_obsize' into maint-0.2.1Nick Mathewson2011-01-15
| |\
| | * Impose maximum sizes on parsed objectsNick Mathewson2011-01-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | An object, you'll recall, is something between -----BEGIN----- and -----END----- tags in a directory document. Some of our code, as doorss has noted in bug 2352, could assert if one of these ever overflowed SIZE_T_CEILING but not INT_MAX. As a solution, I'm setting a maximum size on a single object such that neither of these limits will ever be hit. I'm also fixing the INT_MAX checks, just to be sure.
* | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\| |
| * | Merge branch 'bug2324_uncompress' into maint-0.2.1Nick Mathewson2011-01-15
| |\ \
| | * | Detect and disallow compression bombsNick Mathewson2011-01-03
| | | |
* | | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Conflicts: src/or/config.c src/or/networkstatus.c src/or/rendcommon.c src/or/routerparse.c src/or/test.c
| * | | make the description of tolen_asserts more direNick Mathewson2011-01-15
| | | | | | | | | | | | | | | | We have a CVE # for this bug.
| * | | Fix a heap overflow found by debuger, and make it harder to make that ↵Nick Mathewson2011-01-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | mistake again Our public key functions assumed that they were always writing into a large enough buffer. In one case, they weren't. (Incorporates fixes from sebastian)
| * | | Always nul-terminate the result passed to evdns_server_add_ptr_replyNick Mathewson2011-01-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In dnsserv_resolved(), we carefully made a nul-terminated copy of the answer in a PTR RESOLVED cell... then never used that nul-terminated copy. Ouch. Surprisingly this one isn't as huge a security problem as it could be. The only place where the input to dnsserv_resolved wasn't necessarily nul-terminated was when it was called indirectly from relay.c with the contents of a relay cell's payload. If the end of the payload was filled with junk, eventdns.c would take the strdup() of the name [This part is bad; we might crash there if the cell is in a bad part of the stack or the heap] and get a name of at least length 495[*]. eventdns.c then rejects any name of length over 255, so the bogus data would be neither transmitted nor altered. [*] If the name was less than 495 bytes long, the client wouldn't actually be reading off the end of the cell. Nonetheless this is a reasonably annoying bug. Better fix it. Found while looking at bug 2332, reported by doorss. Bugfix on 0.2.0.1-alpha.
* | | | Merge remote branch 'public/bug2363' into maint-0.2.2Nick Mathewson2011-01-12
|\ \ \ \
| * | | | Fix check for failed evdns request creationNick Mathewson2011-01-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When using libevent 2, we use evdns_base_resolve_*(). When not, we fake evdns_base_resolve_*() using evdns_resolve_*(). Our old check was looking for negative values (like libevent 2 returns), but our eventdns.c code returns 1. This code makes the check just test for nonzero. Note that this broken check was not for _resolve_ failures or even for failures to _launch_ a resolve: it was for failures to _create_ or _encode_ a resolve request. Bug introduced in 81eee0ecfff3dac1e9438719d2f7dc0ba7e84a71; found by lodger; uploaded to trac by rransom. Bug 2363. Fix on 0.2.2.6-alpha.
* | | | | Merge remote branch 'sebastian/bug2337' into maint-0.2.2Nick Mathewson2011-01-12
|\ \ \ \ \
| * | | | | Detect signed size_t and report an error at configure time.Nick Mathewson2011-01-03
| | |_|/ / | |/| | |
* | | | | Merge branch 'bug2331' into maint-0.2.2Nick Mathewson2011-01-12
|\ \ \ \ \
| * | | | | add a missing "not" in bug2331 changelogNick Mathewson2011-01-12
| | | | | |
| * | | | | Fix up size and sign issues in base32 codeNick Mathewson2011-01-03
| | | | | | | | | | | | | | | | | | | | | | | | Fixes bug 2331.
* | | | | | Merge branch 'bug2346' into maint-0.2.2Nick Mathewson2011-01-12
|\ \ \ \ \ \
| * | | | | | Explain bug2346 fix better based on suggestions from armaNick Mathewson2011-01-12
| | | | | | |
| * | | | | | Wait 60 minutes before retrying failed state save; bug2346Nick Mathewson2011-01-10
| | | | | | |