| Commit message (Expand) | Author | Age |
* | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/dirserv.c
| Nick Mathewson | 2011-06-02 |
|\ |
|
| * | Fix unit test failure in dir/formats•••options->DirPort is 0 in the unit tests, so
router_get_advertised_dir_port() would return 0 so we wouldn't pick a
dirport. This isn't what we want for the unit tests. Fixes bug
introduced in 95ac3ea5946.
| Sebastian Hahn | 2011-06-02 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-05-30 |
|\| |
|
| * | Merge branch 'bug3216_v2' into maint-0.2.2 | Nick Mathewson | 2011-05-30 |
| |\ |
|
| | * | Don't try to build descriptors when router_get_advertised_or_port()==0•••The previous attempt was incomplete: it told us not to publish a
descriptor, but didn't stop us from generating one. Now we treat an
absent OR port the same as not knowing our address. (This means
that when we _do_ get an OR port, we need to mark the descriptor
dirty.)
More attempt to fix bug3216.
| Nick Mathewson | 2011-05-24 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/common/compat.c
src/or/main.c
| Nick Mathewson | 2011-05-30 |
|\| | |
|
| * | | Merge remote-tracking branch 'public/bug3270' into maint-0.2.2 | Nick Mathewson | 2011-05-30 |
| |\ \
| | |/
| |/| |
|
| | * | Use a 64-bit type to hold sockets on win64.•••On win64, sockets are of type UINT_PTR; on win32 they're u_int;
elsewhere they're int. The correct windows way to check a socket for
being set is to compare it with INVALID_SOCKET; elsewhere you see if
it is negative.
On Libevent 2, all callbacks take sockets as evutil_socket_t; we've
been passing them int.
This patch should fix compilation and correctness when built for
64-bit windows. Fixes bug 3270.
| Nick Mathewson | 2011-05-23 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/common/Makefile.am
src/or/control.c
| Nick Mathewson | 2011-05-23 |
|\| | |
|
| * | | Merge branch 'feature3049-v2' into maint-0.2.2•••Conflicts:
src/common/Makefile.am
| Nick Mathewson | 2011-05-23 |
| |\ \
| | |/
| |/| |
|
| | * | Split control connection cleanup out of connection_free | Robert Ransom | 2011-05-20 |
* | | | Merge branch 'maint-0.2.2' | Roger Dingledine | 2011-05-20 |
|\| | |
|
| * | | Fix a compile warning on OSX 10.6 | Sebastian Hahn | 2011-05-20 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-05-17 |
|\| | |
|
| * | | Fix bug2752 : 48-char HTTPProxyAuthenticator limitation•••Bumped the char maximum to 512 for HTTPProxyAuthenticator &
HTTPSProxyAuthenticator. Now stripping all '\n' after base64
encoding in alloc_http_authenticator.
| Michael Yakubovich | 2011-05-16 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/connection.c
| Nick Mathewson | 2011-05-16 |
|\| | |
|
| * | | Merge remote-tracking branch 'public/bug2850' into maint-0.2.2•••Fixed a trivial conflict where this and the ControlSocketGroupWritable
code both added different functions to the same part of connection.c.
Conflicts:
src/or/connection.c
| Nick Mathewson | 2011-05-16 |
| |\ \ |
|
| | * | | Set SO_REUSEADDR on all sockets, not just listeners•••See bug 2850 for rationale: it appears that on some busy exits, the OS
decides that every single port is now unusable because they have been
all used too recently.
| Nick Mathewson | 2011-05-03 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-05-15 |
|\| | | |
|
| * | | | Check permissions on the directory holding a control socket | Nick Mathewson | 2011-05-15 |
| * | | | Add a function to pull off the final component of a path | Nick Mathewson | 2011-05-15 |
| * | | | Clean up the 2972 implementation a little | Sebastian Hahn | 2011-05-15 |
| * | | | Add UnixSocketsGroupWritable config flag•••When running a system-wide instance of Tor on Unix-like systems, having
a ControlSocket is a quite handy mechanism to access Tor control
channel. But it would be easier if access to the Unix domain socket can
be granted by making control users members of the group running the Tor
process.
This change introduces a UnixSocketsGroupWritable option, which will
create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows
ControlSocket to offer same access control measures than
ControlPort+CookieAuthFileGroupReadable.
See <http://bugs.debian.org/552556> for more details.
| Jérémy Bobbio | 2011-05-15 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/config.c
src/or/dirserv.c
src/or/or.h
| Nick Mathewson | 2011-05-13 |
|\| | | |
|
| * | | | Write automatically-chosen control ports to a file. | Nick Mathewson | 2011-05-13 |
| * | | | Teach retry_listener about "auto" ports.•••Otherwise, it will just immediately close any port declared with "auto"
on the grounds that it wasn't configured. Now, it will allow "auto" to
match any port.
This means FWIW if you configure a socks port with SocksPort 9999
and then transition to SocksPort auto, the original socksport will
not get closed and reopened. I'm considering this a feature.
| Nick Mathewson | 2011-05-13 |
| * | | | "(Socks|Control|etc)Port auto" now tells Tor to open an arbitrary port•••This is the major part of the implementation for trac issue 3076.
| Nick Mathewson | 2011-05-13 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-05-12 |
|\| | | |
|
| * | | | Fixes ticket #2503•••HTTPS error code 403 is now reported as:
"The https proxy refused to allow connection".
Used a switch statement for additional error codes to be explained
in the future.
| mikey99 | 2011-05-12 |
| | |/
| |/| |
|
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/connection.c
| Nick Mathewson | 2011-05-09 |
|\| | |
|
| * | | Remove a duplicated line, found by clang | Sebastian Hahn | 2011-05-09 |
| |/ |
|
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/common/address.c
src/common/compat_libevent.c
src/common/memarea.c
src/common/util.h
src/or/buffers.c
src/or/circuitbuild.c
src/or/circuituse.c
src/or/connection.c
src/or/directory.c
src/or/networkstatus.c
src/or/or.h
src/or/routerlist.c
| Nick Mathewson | 2011-04-07 |
|\| |
|
| * | Add a missing cast to silence the compiler | Sebastian Hahn | 2011-03-28 |
| * | Fix some 'impossible' overflow bugs in byte counting•••The first was genuinely impossible, I think: it could only happen
when the amount we read differed from the amount we wanted to read
by more than INT_MAX.
The second is just very unlikely: it would give incorrect results to
the controller if you somehow wrote or read more than 4GB on one
edge conn in one second. That one is a bugfix on 0.1.2.8-beta.
| Nick Mathewson | 2011-03-25 |
| * | Triage the XXX022 and XXX021 comments remaining in the code•••Remove some, postpone others, leave some alone. Now the only
remaining XXX022s are ones that seem important to fix or investigate.
| Nick Mathewson | 2011-03-25 |
* | | Add a missing ! to the check for CountPrivatebandwidth. | Nick Mathewson | 2011-04-06 |
* | | Tweaks to Cagara's CountPrivateBandwidth patch:••• - Document it in the manpage
- Add a changes entry
- No need to log when it is set: we don't log for other options.
- Use doxygen to document the new flag.
- Test truth of C variables with "if (x)", not "if (x == 1)".
- Simplify a complex boolean expression by breaking it up.
| Nick Mathewson | 2011-04-05 |
* | | Patch from cagara: Add a CountPrivateBandwidth flag | Daniel Cagara | 2011-04-05 |
* | | Merge remote branch 'arma/optimistic_server' | Nick Mathewson | 2011-03-15 |
|\ \ |
|
| * | | whitespace fixes to pass 'make check-spaces' | Roger Dingledine | 2011-03-15 |
| * | | Implement server side of Proposal 174 (optimistic data)•••Ian's original message:
The current code actually correctly handles queued data at the
Exit; if there is queued data in a EXIT_CONN_STATE_CONNECTING
stream, that data will be immediately sent when the connection
succeeds. If the connection fails, the data will be correctly
ignored and freed. The problem with the current server code is
that the server currently drops DATA cells on streams in the
EXIT_CONN_STATE_CONNECTING state. Also, if you try to queue data
in the EXIT_CONN_STATE_RESOLVING state, bad things happen because
streams in that state don't yet have conn->write_event set, and so
some existing sanity checks (any stream with queued data is at
least potentially writable) are no longer sound.
The solution is to simply not drop received DATA cells while in
the EXIT_CONN_STATE_CONNECTING state. Also do not send SENDME
cells in this state, so that the OP cannot send more than one
window's worth of data to be queued at the Exit. Finally, patch
the sanity checks so that streams in the EXIT_CONN_STATE_RESOLVING
state that have buffered data can pass.
[...] Here is a simple patch. It seems to work with both regular
streams and hidden services, but there may be other corner cases
I'm not aware of. (Do streams used for directory fetches, hidden
services, etc. take a different code path?)
| Ian Goldberg | 2011-03-14 |
* | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-03-15 |
|\ \ \
| | |/
| |/| |
|
| * | | Merge branch 'bug2756_relay' into maint-0.2.2 | Nick Mathewson | 2011-03-15 |
| |\ \ |
|
| | * | | Consider sending stream-level SENDME cells on partial flushes.•••Right now, we only consider sending stream-level SENDME cells when we
have completely flushed a connection_edge's outbuf, or when it sends
us a DATA cell. Neither of these is ideal for throughput.
This patch changes the behavior so we now call
connection_edge_consider_sending_sendme when we flush _some_ data from
an edge outbuf.
Fix for bug 2756; bugfix on svn r152.
| Nick Mathewson | 2011-03-14 |
* | | | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-03-15 |
|\| | |
| |_|/
|/| | |
|
| * | | Check newconn, not conn, before marking newconn for close•••This fixes bug 2757. It's a bugfix on 85da676108f0d.
| Nick Mathewson | 2011-03-14 |
| |/ |
|
* | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-02-07 |
|\| |
|
| * | Add client code to detect attempts to connect to 127.0.0.1 etc•••We detect and reject said attempts if there is no chosen exit node or
circuit: connecting to a private addr via a randomly chosen exit node
will usually fail (if all exits reject private addresses), is always
ill-defined (you're not asking for any particular host or service),
and usually an error (you've configured all requests to go over Tor
when you really wanted to configure all _remote_ requests to go over
Tor).
This can also help detect forwarding loop requests.
Found as part of bug2279.
| Nick Mathewson | 2011-01-25 |
| * | Fix double-mark bug when failing to init transparent connection•••Fixes part of bug 2279. Bugfix on 0.1.2.1-alpha.
| Nick Mathewson | 2011-01-25 |
* | | Merge remote branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-01-03 |
|\| |
|