aboutsummaryrefslogtreecommitdiff
path: root/src/or/command.c
Commit message (Expand)AuthorAge
* Refactor the safe_str_*() API to make more sense.•••The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log". Nick Mathewson2009-12-15
* Allow SafeLogging to exclude client related informationSebastian Hahn2009-12-12
* clean up the XXX comments around bug 1038Roger Dingledine2009-10-26
* Fix compile warnings on Snow Leopard•••Big thanks to nickm and arma for helping me with this! Sebastian Hahn2009-09-01
* Only send netinfo clock_skew to controller if an authority told us so•••We were triggering a CLOCK_SKEW controller status event whenever we connect via the v2 connection protocol to any relay that has a wrong clock. Instead, we should only inform the controller when it's a trusted authority that claims our clock is wrong. Bugfix on 0.2.0.20-rc; starts to fix bug 1074. Reported by SwissTorExit. Roger Dingledine2009-08-28
* three hacks to workaround bug 1038•••The problem is that clients and hidden services are receiving relay_early cells, and they tear down the circuit. Hack #1 is for rendezvous points to rewrite relay_early cells to relay cells. That way there are never any incoming relay_early cells. Hack #2 is for clients and hidden services to never send a relay_early cell on an established rendezvous circuit. That works around rendezvous points that haven't upgraded yet. Hack #3 is for clients and hidden services to not tear down the circuit when they receive an inbound relay_early cell. We already refuse extend cells at clients. Roger Dingledine2009-07-27
* Update copyright to 2009.Karsten Loesing2009-05-04
* actually find the right identity_digest to blame when we get•••a destroy cell from our first hop. svn:r17991 Roger Dingledine2009-01-07
* clarify which relay gave us the good netinfo cell•••svn:r17973 Roger Dingledine2009-01-06
* Remove svn $Id$s from our source, and remove tor --version --version.•••The subversion $Id$ fields made every commit force a rebuild of whatever file got committed. They were not actually useful for telling the version of Tor files in the wild. svn:r17867 Nick Mathewson2009-01-04
* Document most undocumented variables.•••svn:r17754 Nick Mathewson2008-12-23
* Add DOCDOC entries for undocumented static and global variables.•••svn:r17739 Nick Mathewson2008-12-22
* fix typo noticed by wood•••svn:r17726 Roger Dingledine2008-12-22
* Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this p...•••svn:r17686 Nick Mathewson2008-12-18
* Use ctags and a python script to find identifiers that are never used anywher...•••svn:r17651 Nick Mathewson2008-12-17
* r17641@31-33-44: nickm | 2008-08-05 16:07:53 -0400••• Initial conversion of uint32_t addr to tor_addr_t addr in connection_t and related types. Most of the Tor wire formats using these new types are in, but the code to generate and use it is not. This is a big patch. Let me know what it breaks for you. svn:r16435 Nick Mathewson2008-08-05
* r17323@aud-055: nickm | 2008-07-23 17:58:25 +0200••• Implement most of proposal 110. svn:r16156 Nick Mathewson2008-07-23
* r17302@aud-055: nickm | 2008-07-23 14:55:28 +0200••• Never allow a circuit to be created with the same circid as a circuit that has been marked for close. May be a fix for bug 779. Needs testing. Backport candidate. svn:r16136 Nick Mathewson2008-07-23
* r15269@tombo: nickm | 2008-04-22 12:23:30 -0400••• Fix bug 663: warn less verbosely about clock skew from netinfo cells svn:r14408 Nick Mathewson2008-04-22
* r14388@tombo: nickm | 2008-02-21 22:44:28 -0500••• More 64-to-32 fixes. svn:r13672 Nick Mathewson2008-02-22
* r18296@catbus: nickm | 2008-02-20 23:30:11 -0500••• Answer one xxx020 item; move 7 other ones to a new "XXX020rc" category: they should get fixed before we cut a release candidate. arma: please review these to see whether you have fixes/answers for any. Please check out the other 14 XXX020s to see if any look critical for the release candidate. svn:r13640 Nick Mathewson2008-02-21
* r14182@tombo: nickm | 2008-02-15 17:20:51 -0500••• Defer, downgrade, or address more XXX020s. The remaining ones are all ones we should deal with before release. svn:r13530 Nick Mathewson2008-02-15
* r18068@catbus: nickm | 2008-02-13 11:33:19 -0500••• Patch from karsten: make hidden service code respect SafeLogging. svn:r13493 Nick Mathewson2008-02-13
* r18051@catbus: nickm | 2008-02-12 15:20:43 -0500••• Re-tune mempool parametes based on testing on peacetime: use smaller chuncks, free them a little more aggressively, and try very hard to concentrate allocations on fuller chunks. Also, lots of new documentation. svn:r13484 Nick Mathewson2008-02-12
* r18041@catbus: nickm | 2008-02-11 23:43:18 -0500••• Make version negotiation and handshaking messages more useful and accurate. svn:r13477 Nick Mathewson2008-02-12
* r18029@catbus: nickm | 2008-02-11 12:36:39 -0500••• Fix command.c compilation with gcc 4.2 warnings enabled. svn:r13475 Nick Mathewson2008-02-12
* r14108@tombo: nickm | 2008-02-10 20:09:10 -0500••• add some documentation svn:r13462 Nick Mathewson2008-02-11
* r14103@tombo: nickm | 2008-02-10 13:40:09 -0500••• Fix some XXX020s in command.c, and make it not-allowed to negotiate v1 using the v2 connection protocol: it is too hard to test, and pointless to support. svn:r13460 Nick Mathewson2008-02-10
* r14101@tombo: nickm | 2008-02-10 13:24:27 -0500••• Merge connection_or_act_on_netinfo into command.c; remove some fields from or_handshake_state(). svn:r13458 Nick Mathewson2008-02-10
* r17991@catbus: nickm | 2008-02-08 18:41:26 -0500••• More protocol negotiation work. Make the negotiation actually complete and set the state to open. Fix a crash bug that occured when we forcibly stopped the connection from writing. svn:r13434 Nick Mathewson2008-02-08
* Update some copyright notices: it is now 2008.•••svn:r13412 Nick Mathewson2008-02-07
* r17955@catbus: nickm | 2008-02-06 16:53:07 -0500••• The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc. svn:r13409 Nick Mathewson2008-02-06
* r17936@catbus: nickm | 2008-02-06 00:31:11 -0500••• Fix/downgrade some more XXX020s. svn:r13397 Nick Mathewson2008-02-06
* r17930@catbus: nickm | 2008-02-05 18:20:40 -0500••• Initial attempts to track down bug 600, and refactor possibly offending code. 1) complain early if circuit state is set to OPEN when an onionskin is pending. 2) refactor onionskin field into one only used when n_conn is pending, and a separate onionskin field waiting for attention by a cpuworker. This might even fix the bug. More likely, it will make it fail with a more useful core. svn:r13394 Nick Mathewson2008-02-05
* r17918@catbus: nickm | 2008-02-05 16:39:17 -0500••• Remove a few #if-0d items. svn:r13392 Nick Mathewson2008-02-05
* r15891@tombo: nickm | 2008-01-12 19:20:24 -0500••• Basic hacks to get TLS handshakes working: remove dead code; fix post-handshake logic; keep servers from writing while the client is supposed to be renegotiating. This may work. Needs testing. svn:r13122 Nick Mathewson2008-01-13
* clean up copyrights, and assign 2007 copyrights to The Tor Project, Inc•••svn:r12786 Roger Dingledine2007-12-12
* patch from karsten to clean up documentation and to integrate•••more fixes into rend-spec.txt. svn:r12715 Roger Dingledine2007-12-07
* Stop being so aggressive about fetching dir info if your DirPort is•••on but your ORPort is off. Add a new config option BridgeRelay that specifies you want to be a bridge relay. Right now the only difference is that it makes you answer begin_dir requests, and it makes you cache dir info, even if your DirPort isn't on. Refactor directory_caches_dir_info() into some more functions. svn:r12668 Roger Dingledine2007-12-04
* r15087@tombo: nickm | 2007-11-30 22:32:26 -0500••• Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER. svn:r12622 Nick Mathewson2007-12-01
* r16670@catbus: nickm | 2007-11-14 14:56:30 -0500••• Initial phase of proposal 110: accept RELAY_EARLY cells, and turn them into RELAY cells when sending them on over a v1 OR connection. svn:r12496 Nick Mathewson2007-11-14
* r16669@catbus: nickm | 2007-11-14 14:50:03 -0500••• When we complete an OR handshake, set up all the internal fields and mark the connection as open. svn:r12495 Nick Mathewson2007-11-14
* r16455@catbus: nickm | 2007-11-06 12:48:00 -0500••• Parse CERT cells and act correctly when we get them. svn:r12396 Nick Mathewson2007-11-06
* r16452@catbus: nickm | 2007-11-06 09:20:08 -0500••• Fix warning about overflow optimization. svn:r12395 Nick Mathewson2007-11-06
* r14729@31-33-67: nickm | 2007-11-05 18:54:50 -0500••• Send and Parse CERT cells correctly. Still need to understand the certs inside. svn:r12392 Nick Mathewson2007-11-05
* r14727@31-33-67: nickm | 2007-11-05 18:34:35 -0500••• Make VERSIONS variable-length. svn:r12391 Nick Mathewson2007-11-05
* r16438@catbus: nickm | 2007-11-05 16:45:45 -0500••• Initial code for variable-length cells. CERT and VERSIONS need to use them. svn:r12390 Nick Mathewson2007-11-05
* r16434@catbus: nickm | 2007-11-05 14:22:40 -0500••• Oops; fix compile svn:r12387 Nick Mathewson2007-11-05
* r16432@catbus: nickm | 2007-11-05 14:18:57 -0500••• Send and parse link_auth cells properly. svn:r12386 Nick Mathewson2007-11-05
* r16414@catbus: nickm | 2007-11-05 13:14:46 -0500••• Function to process link auth cells; stub function for cert cell processing svn:r12385 Nick Mathewson2007-11-05