aboutsummaryrefslogtreecommitdiff
path: root/changes
Commit message (Collapse)AuthorAge
* Remove changes files already merged in 0.2.2.30-rcNick Mathewson2011-07-18
|
* Fix bug in upload/download of hsdesc with microdescsNick Mathewson2011-07-15
| | | | | | | | Previously we were using router_get_by_id(foo) to test "do we have a descriptor that will let us make an anonymous circuit to foo". But that isn't right for microdescs: we should have been using node_t. Fixes bug 3601; bugfix on 0.2.3.1-alpha.
* Treat null address as "unknown", not "rejected" in md policyNick Mathewson2011-07-15
| | | | | | | | | | Previously, we had an issue where we'd treat an unknown address as 0, which turned into "0.0.0.0", which looked like a rejected address. This meant in practice that as soon as we started doing comparisons of unknown uint32 addresses to short policies, we'd get 'rejected' right away. Because of the circumstances under which this would be called, it would only happen when we had local DNS cached entries and we were looking to launch new circuits.
* Make WIN32_WINNT defines conditionalNick Mathewson2011-07-15
| | | | | Requested by Gisle Vanem on tor-dev. I'm not quite sure this is the right solution, but it's probably harmless.
* Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-07-14
|\ | | | | | | | | Conflicts: src/or/control.c
| * Merge branch 'bug3577' into maint-0.2.2Nick Mathewson2011-07-14
| |\
| | * Change GETINFO fingerprint to look at server_mode, not my_descriptorNick Mathewson2011-07-13
| | | | | | | | | | | | | | | | | | | | | It's possible for us to be a server and have a fingerprint without having yet generated a descriptor. Fixes bug 3577; bugfix on 0.2.0.1-alpha
* | | Only download microdesc consensus from caches that support itNick Mathewson2011-07-14
| | | | | | | | | | | | Bugfix on 0.2.3.1-alpha; found by arma; never got a bug number.
* | | Merge remote-tracking branch 'public/bug1666'Nick Mathewson2011-07-13
|\ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | Conflicts: doc/spec/socks-extensions.txt src/or/buffers.c src/or/config.c src/or/connection_edge.c
| * | | bug1666 - Pass-through support for SOCKS5 authentication(3)Robert Hogan2010-12-14
| | | | | | | | | | | | | | | | Add changes file.
* | | | Merge branch 'bug2798'Nick Mathewson2011-07-11
|\ \ \ \
| * | | | Tweaks to bug2798 based on comments by armaNick Mathewson2011-07-11
| | | | |
| * | | | Revise code for adding EntryNodes to guards.Nick Mathewson2011-07-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, we'd just take all the nodes in EntryNodes, see which ones were already in the guard list, and add the ones that weren't. There were some problems there, though: * We'd add _every_ entry in EntryNodes, and add them in the order they appeared in the routerlist. This wasn't a problem until we added the ability to give country-code or IP-range entries in the EntryNodes set, but now that we did, it is. (Fix: We now shuffle the entry nodes before adding them; only add up to 10*NumEntryGuards) * We didn't screen EntryNodes for the Guard flag. That's okay if the user has specified two or three entry nodes manually, but if they have listed a whole subcontinent, we should restrict ourselves to the entries that are currently guards. (Fix: separate out the new guard from the new non-guard nodes, and add the Guards first.) * We'd prepend new EntryNodes _before_ the already configured EntryNodes. This could lead to churn. (Fix: don't prepend these.) This patch also pre-screens EntryNodes entries for reachableaddresses/excludenodes, even though we check for that later. This is important now, since we cap the number of entries we'll add.
* | | | | Merge remote-tracking branch 'rransom-tor/bug3427'Nick Mathewson2011-07-11
|\ \ \ \ \
| * | | | | Put hashes of all tor source files into or_sha1.iRobert Ransom2011-06-18
| | | | | |
* | | | | | Report the states of failed TLS connections from bootstrap_problemNick Mathewson2011-07-11
| | | | | |
* | | | | | Split connection_about_to_close_connection into separate functionsNick Mathewson2011-07-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch does NOTHING but: - move code - add declarations and includes as needed to make the new code work - declare the new functions.
* | | | | | typo in feature2841; spotted by asnNick Mathewson2011-07-11
| | | | | |
* | | | | | Changes file for feature2841.Nick Mathewson2011-07-11
| |/ / / / |/| | | |
* | | | | Look at the right consensus in router_add_to_routerlist()Nick Mathewson2011-07-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Just looking at the "latest" consensus could give us a microdesc consensus, if microdescs were enabled. That would make us decide that every routerdesc was unlisted in the latest consensus and drop them all: Ouch. Fixes bug 3113; bugfix on 0.2.3.1-alpha.
* | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-07-07
|\ \ \ \ \ | | |_|/ / | |/| | |
| * | | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-07-07
| |\ \ \ \ | | |_|_|/ | |/| | |
| | * | | update to the july 2011 geoip dbRoger Dingledine2011-07-07
| | | | |
* | | | | Merge remote-tracking branch 'public/bug3153'Nick Mathewson2011-07-07
|\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | Conflicts: src/or/nodelist.c
| * | | | | Track where microdescs are referenced to prevent free errsNick Mathewson2011-05-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | On IRC, wanoskarnet notes that if we ever do microdesc_free() on a microdesc that's in the nodelist, we're in trouble. Also, we're in trouble if we free one that's still in the microdesc_cache map. This code adds a flag to microdesc_t to note where the microdesc is referenced from, and checks those flags from microdesc_free(). I don't believe we have any errors here now, but if we introduce some later, let's log and recover from them rather than introducing heisenbugs later on. Addresses bug 3153.
* | | | | | Merge branch 'bug3263'Nick Mathewson2011-07-07
|\ \ \ \ \ \
| * | | | | | don't mark our descriptor dirty if our onion key hasn't changedRoger Dingledine2011-05-21
| | | | | | |
* | | | | | | oops; wrong bug number.Nick Mathewson2011-07-07
| | | | | | |
* | | | | | | Avoid double-free in bufferevent read/write cbsNick Mathewson2011-07-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes bug 3404; bugfix on 0.2.3.1-alpha.
* | | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-07-07
|\ \ \ \ \ \ \ | | |_|/ / / / | |/| | | | |
| * | | | | | Correctly send a SUCCEEDED event for rdns requestsSebastian Hahn2011-07-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The issue was that we overlooked the possibility of reverse DNS success at the end of connection_ap_handshake_socks_resolved(). Issue discovered by katmagic, thanks!
| * | | | | | Merge remote-tracking branch 'rransom-tor/bug3465-022' into maint-0.2.2Nick Mathewson2011-07-05
| |\ \ \ \ \ \
* | \ \ \ \ \ \ Merge remote-tracking branch 'rransom-tor/bug3465-023-v2'Nick Mathewson2011-07-05
|\ \ \ \ \ \ \ \
| * | | | | | | | Make handle_control_setevents table-drivenRobert Ransom2011-06-25
| | | | | | | | |
| * | | | | | | | Merge branch 'bug3465-022' into bug3465-023Robert Ransom2011-06-25
| |\ \ \ \ \ \ \ \ | | | |/ / / / / / | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * bug3465-022: Add BUILDTIMEOUT_SET to the result of GETINFO events/names Correct a comment Fix minor comment issues
| | * | | | | | | Add BUILDTIMEOUT_SET to the result of GETINFO events/namesRobert Ransom2011-06-25
| | | | | | | | |
* | | | | | | | | Merge branch 'cov217_master'Nick Mathewson2011-07-01
|\ \ \ \ \ \ \ \ \
| * | | | | | | | | Replace 4 more sscanf()s with tor_sscanf()Nick Mathewson2011-07-01
| |/ / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For some inexplicable reason, Coverity departs from its usual standards of avoiding false positives here, and warns about all sscanf usage, even when the formatting strings are totally safe. Addresses CID # 447, 446.
* | | | | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-07-01
|\ \ \ \ \ \ \ \ \ | |/ / / / / / / / |/| | / / / / / / | | |/ / / / / / | |/| | | | | |
| * | | | | | | Merge branch 'cid30_changelog' into maint-0.2.2Nick Mathewson2011-07-01
| |\ \ \ \ \ \ \
| | * | | | | | | Add a changelog entry for cid30 fix.Nick Mathewson2011-07-01
| | |/ / / / / /
| * | | | | | | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-07-01
| |\ \ \ \ \ \ \ | | |/ / / / / / | |/| | | / / / | | | |_|/ / / | | |/| | | |
| | * | | | | Merge branches 'cov217_021' and 'cid_450' into maint-0.2.1Nick Mathewson2011-07-01
| | |\ \ \ \ \
| | | * | | | | Fix insanely large stack_allocation in log_credential_statusNick Mathewson2011-07-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I'm not one to insist on C's miserly stack limits, but allocating a 256K array on the stack is too much even for me. Bugfix on 0.2.1.7-alpha. Found by coverity. Fixes CID # 450.
| | * | | | | | Use strlcpy in create_unix_sockaddr()Nick Mathewson2011-07-01
| | |/ / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Using strncpy meant that if listenaddress were ever >= sizeof(sockaddr_un.sun_path), we would fail to nul-terminate sun_path. This isn't a big deal: we never read sun_path, and the kernel is smart enough to reject the sockaddr_un if it isn't nul-terminated. Nonetheless, it's a dumb failure mode. Instead, we should reject addresses that don't fit in sockaddr_un.sun_path. Coverity found this; it's CID 428. Bugfix on 0.2.0.3-alpha.
* | | | | | | Merge branch 'bug3367'Nick Mathewson2011-06-21
|\ \ \ \ \ \ \
| * | | | | | | Add, use a bufferevent-safe connection_flush()Nick Mathewson2011-06-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | A couple of places in control.c were using connection_handle_write() to flush important stuff (the response to a SIGNAL command, an ERR-level status event) before Tor went down. But connection_handle_write() isn't meaningful for bufferevents, so we'd crash. This patch adds a new connection_flush() that works for all connection backends, and makes control.c use that instead. Fix for bug 3367; bugfix on 0.2.3.1-alpha.
* | | | | | | | Merge remote-tracking branch 'public/bug3264'Nick Mathewson2011-06-21
|\ \ \ \ \ \ \ \
| * | | | | | | | Log SSL state changes at LOG_DEBUG, LD_HANDSHAKE.Nick Mathewson2011-06-20
| |/ / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This can be slightly useful for debugging blocking events. Addresses ticket 3116; based on loud_ssl_states branch.
* / / / / / / / Fix tor-fw-helper-natpmp.c API usageJacob Appelbaum2011-06-20
|/ / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | libnatpmp-20110618 changed the API that tor-fw-helper used and for a time tor-fw-helper could not build against the newest libnatpmp. This patch brings support for libnatpmp to tor-fw-helper.