| Commit message (Expand) | Author | Age |
* | Add support for days of the week to intervals | Nick Mathewson | 2013-03-19 |
* | Make the guard lifetime configurable and adjustable via the consensus•••Fixes 8240.
(Don't actually increase the default guard lifetime. It seems likely to
break too many things if done precipitiously.)
| Nick Mathewson | 2013-03-19 |
* | add faravahar as our ninth v3 dir auth | Roger Dingledine | 2012-09-22 |
* | fix whitespace and trivial typo | Roger Dingledine | 2012-09-03 |
* | Disable extending to private/internal addresses by default•••This is important, since otherwise an attacker can use timing info
to probe the internal network.
Also, add an option (ExtendAllowPrivateAddresses) so that
TestingTorNetwork won't break.
Fix for bug 6710; bugfix on all released versions of Tor.
| Nick Mathewson | 2012-08-27 |
* | Merge remote-tracking branch 'public/bug6244_part_c' into maint-0.2.3 | Nick Mathewson | 2012-08-17 |
|\ |
|
| * | Raise the part of torrc mapaddress handling that knows wildcards•••This patch extracts the inner part of config_register_addressmaps --
the part that knows about detecting wildcard addresses addresses --
and makes it into a new function. The new function is deliberately
not moved or reindented, so that the diff is smaller.
I need this to fix bug 6244.
| Nick Mathewson | 2012-08-15 |
* | | Reject attempts to say FooPort and FooPort 0 in the same cfg domain | Nick Mathewson | 2012-08-09 |
* | | Fix spaces from last patch | Nick Mathewson | 2012-08-09 |
* | | Don't infer we have a FooPort from the presence of a FooPort line•••Thanks to the changes we started making with SocksPort and friends
in 0.2.3.3-alpha, any of our code that did "if (options->Sockport)"
became wrong, since "SocksPort 0" would make that test true whereas
using the default SocksPort value would make it false. (We didn't
actually do "if (options->SockPort)" but we did have tests for
TransPort. When we moved DirPort, ORPort, and ControlPort over to
the same system in 0.2.3.9-alpha, the problem got worse, since our
code is littered with checks for DirPort and ORPort as booleans.
This code renames the current linelist-based FooPort options to
FooPort_lines, and adds new FooPort_set options which get set at
parse-and-validate time on the or_options_t. FooPort_set is true
iff we will actually try to open a listener of the given type. (I
renamed the FooPort options rather than leave them alone so that
every previous user of a FooPort would need to get inspected, and so
that any new code that forgetfully uses FooPort will need fail to
compile.)
Fix for bug 6507.
| Nick Mathewson | 2012-08-09 |
|/ |
|
* | Warn when accounting is used in a way likely to link hidden services•••Fix for 6490.
| Nick Mathewson | 2012-07-31 |
* | Merge remote-tracking branch 'asn/bug6274_take3' into maint-0.2.3 | Nick Mathewson | 2012-07-23 |
|\ |
|
| * | Better handling of server managed proxies when Tor is not a relay. | George Kadianakis | 2012-07-18 |
* | | Merge branch 'smartlist_shorten' into maint-0.2.3 | Nick Mathewson | 2012-07-18 |
|\ \ |
|
| * | | Change all SMARTLIST_FOREACH loops of >=10 lines to use BEGIN/END•••The SMARTLIST_FOREACH macro is more convenient than BEGIN/END when
you have a nice short loop body, but using it for long bodies makes
your preprocessor tell the compiler that all the code is on the same
line. That causes grief, since compiler warnings and debugger lines
will all refer to that one line.
So, here's a new style rule: SMARTLIST_FOREACH blocks need to be
short.
| Nick Mathewson | 2012-07-17 |
* | | | Improve message on spurious SOCKSListenAddress | Nick Mathewson | 2012-07-17 |
|/ / |
|
* / | Allow TestingTorNetwork when alternate dir and bridge authorities are set.•••Allow TestingTorNetwork when AlternateDirAuthority and
AlternateBridgeAuthority is set even if DirServer is not.
| Linus Nordberg | 2012-07-17 |
|/ |
|
* | conn_type_to_string() on a listener already says it's a listener | Roger Dingledine | 2012-06-16 |
* | Triage the XXX023 and XXX022 comments: postpone many. | Nick Mathewson | 2012-06-15 |
* | Defend against entry node path bias attacks•••The defense counts the circuit failure rate for each guard for the past N
circuits. Failure is defined as the ability to complete a first hop, but not
finish completing the circuit all the way to the exit.
If the failure rate exceeds a certain amount, a notice is emitted.
If it exceeds a greater amount, a warn is emitted and the guard is disabled.
These values are governed by consensus parameters which we intend to tune as
we perform experiments and statistical simulations.
| Mike Perry | 2012-06-14 |
* | Add a warning for using HTTPProxy with no other proxy.•••From what I can tell, this configuration is usually a mistake, and
leads people to think that all their traffic is getting proxied when
in fact practically none of it is. Resolves the issue behind "bug"
4663.
| Nick Mathewson | 2012-06-12 |
* | Merge branch 'bug5452' | Nick Mathewson | 2012-06-11 |
|\ |
|
| * | Make RECOMMENDED_MIN_CIRCUIT_BUILD_TIMEOUT warning tell the user how to fix it. | Andrea Shepard | 2012-06-11 |
| * | Warn if the user has set CircuitBuildTimeout stupidly low and turned off Lear... | Andrea Shepard | 2012-06-08 |
* | | Merge remote-tracking branch 'public/bug5598'•••Conflicts:
doc/tor.1.txt
Conflict was on a formatting issue in the manpage.
| Nick Mathewson | 2012-06-11 |
|\ \ |
|
| * | | Change the default for DynamicDHGroups to 0•••This feature can make Tor relays less identifiable by their use of the
mod_ssl DH group, but at the cost of some usability (#4721) and bridge
tracing (#6087) regressions.
We should try to turn this on by default again if we find that the
mod_ssl group is uncommon and/or we move to a different DH group size
(see #6088). Before we can do so, we need a fix for bugs #6087 and
Resolves ticket #5598 for now.
| Nick Mathewson | 2012-06-06 |
| |/ |
|
* / | Be more careful calling wcstombs•••The function is not guaranteed to NUL-terminate its output. It
*is*, however, guaranteed not to generate more than two bytes per
multibyte character (plus terminating nul), so the general approach
I'm taking is to try to allocate enough space, AND to manually add a
NUL at the end of each buffer just in case I screwed up the "enough
space" thing.
Fixes bug 5909.
| Nick Mathewson | 2012-06-07 |
|/ |
|
* | Revert "Disable (Cell,DirReq,Entry,ExitPort)Statistics on bridges"•••This reverts commit 981e896dd2eaf69798bb503c271306ee779dd6d2.
Apparently Karsten still needs DirReqStatistics for bridges; see
| Nick Mathewson | 2012-06-05 |
* | Disable (Cell,DirReq,Entry,ExitPort)Statistics on bridges•••These stats are currently discarded, but we might as well
hard-disable them on bridges, to be clean.
Fix for bug 5824; bugfix on 0.2.1.17-rc.
Patch originally by Karsten Loesing.
| Nick Mathewson | 2012-06-05 |
* | Merge remote-tracking branch 'public/bug4657'•••Conflicts:
src/or/router.c
| Nick Mathewson | 2012-06-05 |
|\ |
|
| * | Warn and ignore the MyFamily setting if BridgeRelay is also set•••Roger explains at
http://archives.seul.org/tor/talk/Nov-2011/msg00209.html :
"If you list your bridge as part of your family in the relay
descriptor, then everybody can learn your bridge fingerprint, and
they can look up your bridge's descriptor (and thus location) at
the bridge directory authority."
Now, we can't stop relays from listing bridges, but we can warn when
we notice a bridge listing anybody, which might help some.
This fixes bug 4657; it's a fix on 0.2.0.3-alpha, where bridges were
first introduced.
| Nick Mathewson | 2012-05-24 |
* | | Fix "make check-spaces" issues | Nick Mathewson | 2012-06-05 |
* | | Resolve about 24 DOCDOCs | Nick Mathewson | 2012-06-05 |
* | | Update copyright dates to 2012; add a few missing copyright statements | Nick Mathewson | 2012-06-04 |
* | | Add about 60 more DOCDOC comments to 0.2.3•••Also, try to resolve some doxygen issues. First, define a magic
"This is doxygen!" macro so that we take the correct branch in
various #if/#else/#endifs in order to get the right documentation.
Second, add in a few grouping @{ and @} entries in order to get some
variables and fields to get grouped together.
| Nick Mathewson | 2012-06-04 |
* | | Resolve some markup complaints from doxygen | Nick Mathewson | 2012-06-04 |
* | | Resolve all currently pending DOCDOC items in master | Nick Mathewson | 2012-06-04 |
* | | Merge branch 'bug5604' | Nick Mathewson | 2012-05-30 |
|\ \ |
|
| * | | If DisableNetwork, don't even try to open non-controller listeners•••Fix for 5604; bugfix on 0.2.3.9-alpha, which introduced DisableNetwork.
| Nick Mathewson | 2012-04-18 |
* | | | When ReloadTorrcOnSIGHUP=1, do non-reload activities anyway•••Previously, we skipped everything that got invoked from
options_init_from_torrc. But some of the stuff in
options_act_reversible and options_act is actually important, like
reopening the logs.
Now, a SIGHUP always makes the effects of an options_set() happen,
even though the options haven't changed.
Fix for bug 5095; bugfix on 0.2.1.9-alpha, which introduced
__ReloadTorrcOnSIGHUP.
| Nick Mathewson | 2012-05-16 |
* | | | Do not publish the "git-XXX" tag in server descriptors•••Instead, allow packagers to put a 'TOR_BUILD_TAG' field in the
server descriptor to indicate a platform-specific value, if they
need to. (According to weasel, this was his use for the git- tag
previously.)
This is part of 2988
| Nick Mathewson | 2012-05-11 |
* | | | Merge remote-tracking branch 'asn/bug4865_take2' | Nick Mathewson | 2012-05-11 |
|\ \ \ |
|
| * | | | Fix issues found by nickm.•••* Document fmt_addr_impl() and friends.
* Parenthesize macro arguments.
* Rename get_first_listener_addrport_for_pt() to
get_first_listener_addrport_string().
* Handle port_cfg_t with no_listen.
* Handle failure of router_get_active_listener_port_by_type().
* Add an XXX to router_get_active_listener_port_by_type().
| George Kadianakis | 2012-04-12 |
| * | | | Pass OR address to PT proxy, even with IPv6 or ORListenAddress.•••Introduce get_first_listener_addrport_for_pt() which returns a string
containing the addrport of the first listener we could find. Use it to
form the TOR_PT_ORPORT managed proxy protocol line.
| George Kadianakis | 2012-03-31 |
* | | | | Fix comments: There is no such thing as a NUL pointer | Nick Mathewson | 2012-05-07 |
* | | | | Obsolete GiveGuardFlagTo_CVE_2011_2768_VulnerableRelays•••Closes ticket 4572.
| Nick Mathewson | 2012-04-11 |
| |/ /
|/| | |
|
* | | | Simplify DH prime generation logic some.•••This is just refactoring work here. The old logic was kind of
convoluted, especially after the bug 5572 fix. We don't actually need to
distinguish so many cases here. Dropping detection of the
"!old_options || !old_options->DynamicDHGroups" case is fine because
that's the same that we'd do for clients.
Also add a changes file for bug 5572.
| Sebastian Hahn | 2012-04-08 |
* | | | fix bug 5572 | Daniel 'koolfy' Faucon | 2012-04-07 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2012-04-04 |
|\ \ \
| | |/
| |/| |
|
| * | | Wrap long line; strlen("ides")<strlen("turtles"). | Nick Mathewson | 2012-04-04 |