aboutsummaryrefslogtreecommitdiff
path: root/changes
Commit message (Expand)AuthorAge
* Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/config.c Nick Mathewson2011-10-29
|\
| * Add a changes file for the 4340 fixSebastian Hahn2011-10-29
* | Merge branch 'bug4343'Nick Mathewson2011-10-28
|\ \
| * | Fix a double-free that would occur on an invalid cert in a CERTS cell•••We would stash the certs in the handshake state before checking them for validity... and then if they turned out to be invalid, we'd give an error and free them. Then, later, we'd free them again when we tore down the connection. Fixes bug 4343; fix on 0.2.3.6-alpha. Nick Mathewson2011-10-28
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/command.c Nick Mathewson2011-10-28
|\ \ \ | |/ / |/| / | |/
| * Discard all cells on a marked connection•••Fix for bug 4299 Nick Mathewson2011-10-28
* | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-28
|\|
| * Fix typo, spotted by tmpname0901. Thanks!Sebastian Hahn2011-10-28
* | fold in changes entriesRoger Dingledine2011-10-26
* | Merge branch 'maint-0.2.2_secfix' into master_secfix•••Conflicts: src/common/tortls.c src/or/connection_or.c src/or/dirserv.c src/or/or.h Sebastian Hahn2011-10-27
|\|
| * Don't give the Guard flag to relays without the CVE-2011-2768 fixRobert Ransom2011-10-26
| * Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix•••Conflicts: src/or/connection_or.c Sebastian Hahn2011-10-26
| |\
| | * Reject create cells on outgoing OR connections from bridgesRobert Ransom2011-10-26
| | * Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND•••Fix suggested by Nick Mathewson. Robert Ransom2011-10-26
| | * Don't send a certificate chain on outgoing TLS connections from non-relaysNick Mathewson2011-10-26
| | * Remove the -F option from tor-resolve.•••It used to mean "Force": it would tell tor-resolve to ask tor to resolve an address even if it ended with .onion. But when AutomapHostsOnResolve was added, automatically refusing to resolve .onion hosts stopped making sense. So in 0.2.1.16-rc (commit 298dc95dfd8), we made tor-resolve happy to resolve anything. The -F option stayed in, though, even though it didn't do anything. Oddly, it never got documented. Found while fixing GCC 4.6 "set, unused variable" warnings. Nick Mathewson2011-10-26
| | * manually backport a5232e0c4cRoger Dingledine2011-10-26
| | * Reinit keys at the start of options_act().•••Previously we did this nearer to the end (in the old_options && transition_affects_workers() block). But other stuff cares about keys being consistent with options... particularly anything which tries to access a key, which can die in assert_identity_keys_ok(). Fixes bug 3228; bugfix on 0.2.2.18-alpha. Conflicts: src/or/config.c Nick Mathewson2011-10-26
| | * Don't crash a bridge authority on SIGHUP if it's not in the consensus•••Fixes bug 2572. Robert Ransom2011-10-26
| | * Fix assert for relay/bridge state change•••When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433. Conflicts: src/or/config.c Sebastian Hahn2011-10-26
| | * Don't crash when accountingmax is set in non-server Tors•••We use a hash of the identity key to seed a prng to tell when an accounting period should end. But thanks to the bug998 changes, clients no longer have server-identity keys to use as a long-term seed in accounting calculations. In any case, their identity keys (as used in TLS) were never never fixed. So we can just set the wakeup time from a random seed instead there. Still open is whether everybody should be random. This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha. Diagnosed with help from boboper on irc. Nick Mathewson2011-10-26
| | * Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.•••From the code: zlib 1.2.4 and 1.2.5 do some "clever" things with macros. Instead of saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory that nobody will care if the compile outputs a no-such-identifier warning. Sorry, but we like -Werror over here, so I guess we need to define these. I hope that zlib 1.2.6 doesn't break these too. Possible fix for bug 1526. Nick Mathewson2011-10-26
* | | closer to a changelog for the next alphaRoger Dingledine2011-10-26
* | | Changelog for recent coverity issuesNick Mathewson2011-10-26
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-26
|\| |
| * | Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2Nick Mathewson2011-10-26
| |\ \
| | * | Make internal error check for unrecognized digest algorithm more robust•••Fixes Coverity CID 479. Nick Mathewson2011-10-06
| | * | Check return of init_keys() ip_address_changed: fix Coverity CID 484Nick Mathewson2011-10-06
* | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-25
|\| | |
| * | | unmangle the fingerprint example in the man page•••Remove a confusing dollar sign from the example fingerprint in the man page, and also make example fingerprint a valid one. Roger Dingledine2011-10-25
* | | | Add percentiles to the desc stats reporting•••To get a better idea what's going on on Tonga, add some code to report how often the most and least frequently fetched descriptor was fetched, as well as 25, 50, 75 percentile. Also ensure we only count bridge descriptors here. Sebastian Hahn2011-10-25
* | | | checkpoint: fold in changes filesRoger Dingledine2011-10-24
* | | | Fix missing word in changes/ticket4200Nick Mathewson2011-10-21
* | | | Add new stats type: descriptor fetch stats•••This is used for the bridge authority currently, to get a better intuition on how many descriptors are actually fetched from it and how many fetches happen in total. Implements ticket 4200. Sebastian Hahn2011-10-21
* | | | remove code related to tracking descriptor serving times•••This had broken due to bitrot - it doesn't know about microdescriptors at all, and afaik hasn't generally been used in ages. Sebastian Hahn2011-10-21
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-20
|\| | |
| * | | Merge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2Nick Mathewson2011-10-20
| |\ \ \
| | * | | Free rend_data and intro_key when extra intro circs become general-purposeRobert Ransom2011-10-18
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-19
|\| | | |
| * | | | Fix crash when changing node restrictions with DNS lookup in progress•••Fixes bug 4259, bugfix on 0.2.2.25-alpha. Bugfix by "Tey'". Original message by submitter: Changing nodes restrictions using a controller while Tor is doing DNS resolution could makes Tor crashes (on WinXP at least). The problem can be repeated by trying to reach a non-existent domain using Tor: curl --socks4a 127.0.0.1:9050 inexistantdomain.ext .. and changing the ExitNodes parameter through the control port before Tor returns a DNS resolution error (of course, the following command won't work directly if the control port is password protected): echo SETCONF ExitNodes=TinyTurtle | nc -v 127.0.0.1 9051 Using a non-existent domain is needed to repeat the issue so that Tor takes a few seconds for resolving the domain (which allows us to change the configuration). Tor will crash while processing the configuration change. The bug is located in the addressmap_clear_excluded_trackexithosts method which iterates over the entries of the addresses map in order to check whether the changes made to the configuration will impact those entries. When a DNS resolving is in progress, the new_adress field of the associated entry will be set to NULL. The method doesn't expect this field to be NULL, hence the crash. Nick Mathewson2011-10-19
| |/ / /
* | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-13
|\| | |
| * | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-13
| |\ \ \ | | | |/ | | |/|
| | * | Update to the October 2011 GeoIP database.Karsten Loesing2011-10-13
| | * | Update to the September 2011 GeoIP database.Karsten Loesing2011-09-15
* | | | Fix names of functions that convert strings to addrs•••Now let's have "lookup" indicate that there can be a hostname resolution, and "parse" indicate that there wasn't. Previously, we had one "lookup" function that did resolution; four "parse" functions, half of which did resolution; and a "from_str()" function that didn't do resolution. That's confusing and error-prone! The code changes in this commit are exactly the result of this perl script, run under "perl -p -i.bak" : s/tor_addr_port_parse/tor_addr_port_lookup/g; s/parse_addr_port(?=[^_])/addr_port_lookup/g; s/tor_addr_from_str/tor_addr_parse/g; This patch leaves aton and pton alone: their naming convention and behavior is is determined by the sockets API. More renaming may be needed. Nick Mathewson2011-10-11
* | | | Changes file for prop176 branchNick Mathewson2011-10-10
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-10
|\| | |
| * | | Don't launch a useless circuit in rend_client_reextend_intro_circuit•••Fixes bug 4212. Bug reported by katmagic and found by Sebastian. Robert Ransom2011-10-10
| * | | Note ticket and source version for feature3951 in changes fileNick Mathewson2011-10-07
| * | | Merge remote-tracking branch 'karsten/feature3951' into maint-0.2.2Nick Mathewson2011-10-07
| |\ \ \