aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection.c
Commit message (Expand)AuthorAge
* Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/dirserv.c Nick Mathewson2011-06-02
|\
| * Fix unit test failure in dir/formats•••options->DirPort is 0 in the unit tests, so router_get_advertised_dir_port() would return 0 so we wouldn't pick a dirport. This isn't what we want for the unit tests. Fixes bug introduced in 95ac3ea5946. Sebastian Hahn2011-06-02
* | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-05-30
|\|
| * Merge branch 'bug3216_v2' into maint-0.2.2Nick Mathewson2011-05-30
| |\
| | * Don't try to build descriptors when router_get_advertised_or_port()==0•••The previous attempt was incomplete: it told us not to publish a descriptor, but didn't stop us from generating one. Now we treat an absent OR port the same as not knowing our address. (This means that when we _do_ get an OR port, we need to mark the descriptor dirty.) More attempt to fix bug3216. Nick Mathewson2011-05-24
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/common/compat.c src/or/main.c Nick Mathewson2011-05-30
|\| |
| * | Merge remote-tracking branch 'public/bug3270' into maint-0.2.2Nick Mathewson2011-05-30
| |\ \ | | |/ | |/|
| | * Use a 64-bit type to hold sockets on win64.•••On win64, sockets are of type UINT_PTR; on win32 they're u_int; elsewhere they're int. The correct windows way to check a socket for being set is to compare it with INVALID_SOCKET; elsewhere you see if it is negative. On Libevent 2, all callbacks take sockets as evutil_socket_t; we've been passing them int. This patch should fix compilation and correctness when built for 64-bit windows. Fixes bug 3270. Nick Mathewson2011-05-23
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/common/Makefile.am src/or/control.c Nick Mathewson2011-05-23
|\| |
| * | Merge branch 'feature3049-v2' into maint-0.2.2•••Conflicts: src/common/Makefile.am Nick Mathewson2011-05-23
| |\ \ | | |/ | |/|
| | * Split control connection cleanup out of connection_freeRobert Ransom2011-05-20
* | | Merge branch 'maint-0.2.2'Roger Dingledine2011-05-20
|\| |
| * | Fix a compile warning on OSX 10.6Sebastian Hahn2011-05-20
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-05-17
|\| |
| * | Fix bug2752 : 48-char HTTPProxyAuthenticator limitation•••Bumped the char maximum to 512 for HTTPProxyAuthenticator & HTTPSProxyAuthenticator. Now stripping all '\n' after base64 encoding in alloc_http_authenticator. Michael Yakubovich2011-05-16
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/connection.c Nick Mathewson2011-05-16
|\| |
| * | Merge remote-tracking branch 'public/bug2850' into maint-0.2.2•••Fixed a trivial conflict where this and the ControlSocketGroupWritable code both added different functions to the same part of connection.c. Conflicts: src/or/connection.c Nick Mathewson2011-05-16
| |\ \
| | * | Set SO_REUSEADDR on all sockets, not just listeners•••See bug 2850 for rationale: it appears that on some busy exits, the OS decides that every single port is now unusable because they have been all used too recently. Nick Mathewson2011-05-03
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-05-15
|\| | |
| * | | Check permissions on the directory holding a control socketNick Mathewson2011-05-15
| * | | Add a function to pull off the final component of a pathNick Mathewson2011-05-15
| * | | Clean up the 2972 implementation a littleSebastian Hahn2011-05-15
| * | | Add UnixSocketsGroupWritable config flag•••When running a system-wide instance of Tor on Unix-like systems, having a ControlSocket is a quite handy mechanism to access Tor control channel. But it would be easier if access to the Unix domain socket can be granted by making control users members of the group running the Tor process. This change introduces a UnixSocketsGroupWritable option, which will create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows ControlSocket to offer same access control measures than ControlPort+CookieAuthFileGroupReadable. See <http://bugs.debian.org/552556> for more details. Jérémy Bobbio2011-05-15
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/config.c src/or/dirserv.c src/or/or.h Nick Mathewson2011-05-13
|\| | |
| * | | Write automatically-chosen control ports to a file.Nick Mathewson2011-05-13
| * | | Teach retry_listener about "auto" ports.•••Otherwise, it will just immediately close any port declared with "auto" on the grounds that it wasn't configured. Now, it will allow "auto" to match any port. This means FWIW if you configure a socks port with SocksPort 9999 and then transition to SocksPort auto, the original socksport will not get closed and reopened. I'm considering this a feature. Nick Mathewson2011-05-13
| * | | "(Socks|Control|etc)Port auto" now tells Tor to open an arbitrary port•••This is the major part of the implementation for trac issue 3076. Nick Mathewson2011-05-13
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-05-12
|\| | |
| * | | Fixes ticket #2503•••HTTPS error code 403 is now reported as: "The https proxy refused to allow connection". Used a switch statement for additional error codes to be explained in the future. mikey992011-05-12
| | |/ | |/|
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/connection.c Nick Mathewson2011-05-09
|\| |
| * | Remove a duplicated line, found by clangSebastian Hahn2011-05-09
| |/
* | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/common/address.c src/common/compat_libevent.c src/common/memarea.c src/common/util.h src/or/buffers.c src/or/circuitbuild.c src/or/circuituse.c src/or/connection.c src/or/directory.c src/or/networkstatus.c src/or/or.h src/or/routerlist.c Nick Mathewson2011-04-07
|\|
| * Add a missing cast to silence the compilerSebastian Hahn2011-03-28
| * Fix some 'impossible' overflow bugs in byte counting•••The first was genuinely impossible, I think: it could only happen when the amount we read differed from the amount we wanted to read by more than INT_MAX. The second is just very unlikely: it would give incorrect results to the controller if you somehow wrote or read more than 4GB on one edge conn in one second. That one is a bugfix on 0.1.2.8-beta. Nick Mathewson2011-03-25
| * Triage the XXX022 and XXX021 comments remaining in the code•••Remove some, postpone others, leave some alone. Now the only remaining XXX022s are ones that seem important to fix or investigate. Nick Mathewson2011-03-25
* | Add a missing ! to the check for CountPrivatebandwidth.Nick Mathewson2011-04-06
* | Tweaks to Cagara's CountPrivateBandwidth patch:••• - Document it in the manpage - Add a changes entry - No need to log when it is set: we don't log for other options. - Use doxygen to document the new flag. - Test truth of C variables with "if (x)", not "if (x == 1)". - Simplify a complex boolean expression by breaking it up. Nick Mathewson2011-04-05
* | Patch from cagara: Add a CountPrivateBandwidth flagDaniel Cagara2011-04-05
* | Merge remote branch 'arma/optimistic_server'Nick Mathewson2011-03-15
|\ \
| * | whitespace fixes to pass 'make check-spaces'Roger Dingledine2011-03-15
| * | Implement server side of Proposal 174 (optimistic data)•••Ian's original message: The current code actually correctly handles queued data at the Exit; if there is queued data in a EXIT_CONN_STATE_CONNECTING stream, that data will be immediately sent when the connection succeeds. If the connection fails, the data will be correctly ignored and freed. The problem with the current server code is that the server currently drops DATA cells on streams in the EXIT_CONN_STATE_CONNECTING state. Also, if you try to queue data in the EXIT_CONN_STATE_RESOLVING state, bad things happen because streams in that state don't yet have conn->write_event set, and so some existing sanity checks (any stream with queued data is at least potentially writable) are no longer sound. The solution is to simply not drop received DATA cells while in the EXIT_CONN_STATE_CONNECTING state. Also do not send SENDME cells in this state, so that the OP cannot send more than one window's worth of data to be queued at the Exit. Finally, patch the sanity checks so that streams in the EXIT_CONN_STATE_RESOLVING state that have buffered data can pass. [...] Here is a simple patch. It seems to work with both regular streams and hidden services, but there may be other corner cases I'm not aware of. (Do streams used for directory fetches, hidden services, etc. take a different code path?) Ian Goldberg2011-03-14
* | | Merge remote branch 'origin/maint-0.2.2'Nick Mathewson2011-03-15
|\ \ \ | | |/ | |/|
| * | Merge branch 'bug2756_relay' into maint-0.2.2Nick Mathewson2011-03-15
| |\ \
| | * | Consider sending stream-level SENDME cells on partial flushes.•••Right now, we only consider sending stream-level SENDME cells when we have completely flushed a connection_edge's outbuf, or when it sends us a DATA cell. Neither of these is ideal for throughput. This patch changes the behavior so we now call connection_edge_consider_sending_sendme when we flush _some_ data from an edge outbuf. Fix for bug 2756; bugfix on svn r152. Nick Mathewson2011-03-14
* | | | Merge remote branch 'origin/maint-0.2.2'Nick Mathewson2011-03-15
|\| | | | |_|/ |/| |
| * | Check newconn, not conn, before marking newconn for close•••This fixes bug 2757. It's a bugfix on 85da676108f0d. Nick Mathewson2011-03-14
| |/
* | Merge remote branch 'origin/maint-0.2.2'Nick Mathewson2011-02-07
|\|
| * Add client code to detect attempts to connect to 127.0.0.1 etc•••We detect and reject said attempts if there is no chosen exit node or circuit: connecting to a private addr via a randomly chosen exit node will usually fail (if all exits reject private addresses), is always ill-defined (you're not asking for any particular host or service), and usually an error (you've configured all requests to go over Tor when you really wanted to configure all _remote_ requests to go over Tor). This can also help detect forwarding loop requests. Found as part of bug2279. Nick Mathewson2011-01-25
| * Fix double-mark bug when failing to init transparent connection•••Fixes part of bug 2279. Bugfix on 0.1.2.1-alpha. Nick Mathewson2011-01-25
* | Merge remote branch 'origin/maint-0.2.2'Nick Mathewson2011-01-03
|\|