| Commit message (Expand) | Author | Age |
* | Merge branch 'bug4360' | Nick Mathewson | 2011-11-21 |
|\ |
|
| * | normalize the name of the CERTS cell | Roger Dingledine | 2011-10-31 |
* | | Log more loudly on a bad cert from an authority.•••Clock skew made this situation way too frequent so we demoted it to
"protocol_warn", but when there's an authority, it should really just
be warn.
| Nick Mathewson | 2011-11-20 |
* | | Make certificate skew into a protocol warning | Nick Mathewson | 2011-11-15 |
* | | Even when we can't answer an AUTH_CHALLENGE, send NETINFO.•••Fixes bug 4368; fix on 0.2.3.6-alpha; bug found by "frosty".
| Nick Mathewson | 2011-11-03 |
* | | Fix bug 4367: correctly detect auth_challenge cells we can't use•••Found by frosty_un, bugfix on 0.2.3.6-alpha, fix suggested by arma.
| Nick Mathewson | 2011-11-03 |
|/ |
|
* | Merge branch 'bug4343' | Nick Mathewson | 2011-10-28 |
|\ |
|
| * | "Authetnicate" is not the usual spelling | Nick Mathewson | 2011-10-28 |
| * | Fix a double-free that would occur on an invalid cert in a CERTS cell•••We would stash the certs in the handshake state before checking them
for validity... and then if they turned out to be invalid, we'd give
an error and free them. Then, later, we'd free them again when we
tore down the connection.
Fixes bug 4343; fix on 0.2.3.6-alpha.
| Nick Mathewson | 2011-10-28 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/command.c
| Nick Mathewson | 2011-10-28 |
|\ \
| |/
|/| |
|
| * | Discard all cells on a marked connection•••Fix for bug 4299
| Nick Mathewson | 2011-10-28 |
* | | Merge branch 'maint-0.2.2_secfix' into master_secfix•••Conflicts:
src/common/tortls.c
src/or/connection_or.c
src/or/dirserv.c
src/or/or.h
| Sebastian Hahn | 2011-10-27 |
|\| |
|
| * | Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix•••Conflicts:
src/or/connection_or.c
| Sebastian Hahn | 2011-10-26 |
| |\ |
|
| | * | Reject create cells on outgoing OR connections from bridges | Robert Ransom | 2011-10-26 |
| | * | Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND•••Fix suggested by Nick Mathewson.
| Robert Ransom | 2011-10-26 |
| | * | manually backport a5232e0c4c | Roger Dingledine | 2011-10-26 |
* | | | Do not tread vpadding cell as versions cell. Not in any released version. | Nick Mathewson | 2011-10-26 |
* | | | Double-check that we really can get RSA keys from ID/Auth certs•••Addresses issue 4287; issue not in any released Tor.
| Nick Mathewson | 2011-10-23 |
* | | | Fix memory leak in prop176 code•••This fixes part of bug4252. Bug not in any released version.
| Nick Mathewson | 2011-10-23 |
* | | | Fix a bunch of whitespace errors | Nick Mathewson | 2011-10-11 |
* | | | Add some points to make it easy to turn off v3 support | Nick Mathewson | 2011-10-10 |
* | | | Quiet two notices, and spelling mistake cleanup | Sebastian Hahn | 2011-10-10 |
* | | | Add more log statements for protocol/internal failures | Nick Mathewson | 2011-10-10 |
* | | | Remove auth_challenge field from or_handshake_state_t•••We didn't need to record this value; it was already recorded
implicitly while computing cell digests for later examination in the
authenticate cells.
| Nick Mathewson | 2011-10-10 |
* | | | spec conformance: allow only one cert of each type | Nick Mathewson | 2011-10-10 |
* | | | Give tor_cert_get_id_digests() fail-fast behavior•••Right now we can take the digests only of an RSA key, and only expect to
take the digests of an RSA key. The old tor_cert_get_id_digests() would
return a good set of digests for an RSA key, and an all-zero one for a
non-RSA key. This behavior is too error-prone: it carries the risk that
we will someday check two non-RSA keys for equality and conclude that
they must be equal because they both have the same (zero) "digest".
Instead, let's have tor_cert_get_id_digests() return NULL for keys we
can't handle, and make its callers explicitly test for NULL.
| Nick Mathewson | 2011-10-10 |
* | | | Make more safe_str usage happen for new logs in command.c | Nick Mathewson | 2011-10-10 |
* | | | Set up network parameters on non-authenticated incoming connections•••Also add some info log messages for the steps of the v3 handshake.
Now my test network bootstraps!
| Nick Mathewson | 2011-10-10 |
* | | | Make sure we stop putting cells into our hash at the right time. | Nick Mathewson | 2011-10-10 |
* | | | Bugfixes for authenticate handling and generation | Nick Mathewson | 2011-10-10 |
* | | | Fix log message about what cells we are sending | Nick Mathewson | 2011-10-10 |
* | | | Hook up all of the prop176 code; allow v3 negotiations to actually work | Nick Mathewson | 2011-10-10 |
* | | | Make tor_tls_cert_is_valid check key lengths | Nick Mathewson | 2011-10-10 |
* | | | Implement cert/auth cell reading | Nick Mathewson | 2011-10-10 |
* | | | Cell types and states for new OR handshake•••Also, define all commands > 128 as variable-length when using
v3 or later link protocol. Running into a var cell with an
unrecognized type is no longer a bug.
| Nick Mathewson | 2011-10-10 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••The conflicts were mainly caused by the routerinfo->node transition.
Conflicts:
src/or/circuitbuild.c
src/or/command.c
src/or/connection_edge.c
src/or/directory.c
src/or/dirserv.c
src/or/relay.c
src/or/rendservice.c
src/or/routerlist.c
| Nick Mathewson | 2011-05-30 |
|\| | |
|
| * | | Merge branch 'bug3045' into maint-0.2.2•••Conflicts:
src/or/circuitbuild.c
| Nick Mathewson | 2011-05-30 |
| |\ \ |
|
| | * | | Log descriptions of nodes, not just nicknames.•••This patch introduces a few new functions in router.c to produce a
more helpful description of a node than its nickame, and then tweaks
nearly all log messages taking a nickname as an argument to call these
functions instead.
There are a few cases where I left the old log messages alone: in
these cases, the nickname was that of an authority (whose nicknames
are useful and unique), or the message already included an identity
and/or an address. I might have missed a couple more too.
This is a fix for bug 3045.
| Nick Mathewson | 2011-05-15 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-05-28 |
|\| | | |
|
| * | | | Fix GCC 4.6's new -Wunused-but-set-variable warnings.•••Most instances were dead code; for those, I removed the assignments.
Some were pieces of info we don't currently plan to use, but which
we might in the future. For those, I added an explicit cast-to-void
to indicate that we know that the thing's unused. Finally, one was
a case where we were testing the wrong variable in a unit test.
That one I fixed.
This resolves bug 3208.
| Nick Mathewson | 2011-05-23 |
| |/ / |
|
* | | | Revert bug1074_launch_authconn* branch: needs more design, less crashing | Nick Mathewson | 2011-02-28 |
* | | | Add a missing const | Nick Mathewson | 2011-02-25 |
* | | | Merge branch 'bug1074_launch_conn_on_skew'•••Fixed conflict on rename of router_get_by_digest->router_get_by_id_digest
Conflicts:
src/or/command.c
| Nick Mathewson | 2011-02-25 |
|\ \ \ |
|
| * | | | whitespace fixup | Nick Mathewson | 2011-02-25 |
| * | | | Fix for #1074 previous rev•••Changed tor_addr_from_ipv4n to tor_addr_from_ipv4h
and changed descriptor_digest to identity_digest
| AltF4 | 2011-02-25 |
| * | | | Fix for #1074 "Part 3"•••Changed received_netinfo_from_trusted_dir into a
tristate in order to keep track of whether we have
already tried contacting a trusted dir. So we don't
send multiple requests if we get a bunch of skews.
| AltF4 | 2011-02-25 |
| * | | | Sebastian's Changes to #1074•••Fixes some small mistakes with AltF4's #1074 fix
| AltF4 | 2011-02-25 |
| * | | | Fix time skew values from untrusted sources•••Now when we receive a large time skew from a source which isn't a trusted dir, we go contact a trusted dir to trigger a NETINFO cell.
| AltF4 | 2011-02-25 |
| |/ / |
|
* | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-01-03 |
|\| | |
|
| * | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2•••Conflicts:
src/or/routerparse.c
| Nick Mathewson | 2011-01-03 |
| |\| |
|