aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection_edge.c
Commit message (Collapse)AuthorAge
...
* get rid of some magic constants i found while walkingRoger Dingledine2008-08-25
| | | | | | | jake through socks4 and socks5 failure codes svn:r16651
* Try once again to make BSD compilation happy.Nick Mathewson2008-08-08
| | | | svn:r16474
* r17692@tombo: nickm | 2008-08-07 22:41:26 -0400Nick Mathewson2008-08-08
| | | | | | | Fix more compile errors on BSD pf stuff. How about now? svn:r16472
* Oops. On recent linux kernels we were not detecting the ↵Nick Mathewson2008-08-07
| | | | | | linux/netfilter_ipv4.h header properly, since we needed to have in_addr and in6_addr and __u32 defined before trying to include it. Fix that. svn:r16460
* r17667@tombo: nickm | 2008-08-07 15:13:30 -0400Nick Mathewson2008-08-07
| | | | | | | Make the TransPort input code handle IPv6 addresses, I hope. This code may not compile. Possibly fix bug 796. svn:r16459
* r17664@tombo: nickm | 2008-08-06 12:32:09 -0400Nick Mathewson2008-08-06
| | | | | | | Patch from Christopher Davis: open /dev/pf before dropping privileges. Fixes bug 782. Backport candidate. svn:r16450
* r17641@31-33-44: nickm | 2008-08-05 16:07:53 -0400Nick Mathewson2008-08-05
| | | | | | | Initial conversion of uint32_t addr to tor_addr_t addr in connection_t and related types. Most of the Tor wire formats using these new types are in, but the code to generate and use it is not. This is a big patch. Let me know what it breaks for you. svn:r16435
* r17322@aud-055: nickm | 2008-07-23 16:50:50 +0200Nick Mathewson2008-07-23
| | | | | | | Make circid_t and streamid_t get used instead of uint16_t; it is possible we will soon want to make circid_t change to uint32_t. svn:r16155
* r17308@aud-055: nickm | 2008-07-23 15:57:41 +0200Nick Mathewson2008-07-23
| | | | | | | In connection_edge_destroy, send a stream status control event when we have an AP connection. Previously, we would send an event when the connection was AP and non-AP at the same time. This didn't work so well. Patch from Anonymous Remailer (Austria). Backport candidate. svn:r16143
* Make directory servers include the X-Your-Address-Is: http header inRoger Dingledine2008-06-30
| | | | | | | | | their responses even for begin_dir conns. Now clients who only ever use begin_dir connections still have a way to learn their IP address. Should fix bug 737. Reported by goldy. svn:r15571
* whoops, i shouldn't've left that inRoger Dingledine2008-06-23
| | | | svn:r15434
* Big bridge bugfixes. Backport candidates.Roger Dingledine2008-06-20
| | | | | | | | | | | | | | | If you have more than one bridge but don't know their keys, you would only learn a request for the descriptor of the first one on your list. (Tor considered launching requests for the others, but found that it already had a connection on the way for $0000...0000 so it didn't open another.) If you have more than one bridge but don't know their keys, and the connection to one of the bridges failed, you would cancel all pending bridge connections. (After all, they all have the same digest.) svn:r15366
* > why would it need an anonymized connection?Roger Dingledine2008-06-13
| | | | | | | | > ah. > yes, i think you're right. i was thinking 3-hop, but i think it is 1-hop. svn:r15235
* start sending "bootstrap problem" status events when we're having troublesRoger Dingledine2008-06-11
| | | | | | | reaching relays. svn:r15116
* consolidate all our edge/circ/orconn reason-to-foo-or-back functionsRoger Dingledine2008-06-11
| | | | svn:r15115
* some cleanups in preparation for moving stuff aroundRoger Dingledine2008-06-10
| | | | svn:r15112
* Fix part of bug 681: always reattach tunneled directory connections, ↵Nick Mathewson2008-05-27
| | | | | | regardless of the setting for LeaveStreamsUnattached svn:r14750
* r15278@tombo: nickm | 2008-04-22 13:17:37 -0400Nick Mathewson2008-04-22
| | | | | | | Apply patch from mwenge to fix bug 646: makes stream events for dns requests get generated more consistently. svn:r14413
* forward-port r14375 and try to make it less likely to happen againRoger Dingledine2008-04-16
| | | | svn:r14377
* r19199@catbus: nickm | 2008-04-03 15:01:05 -0400Nick Mathewson2008-04-03
| | | | | | | Fix bug 641 and 650, I think. svn:r14297
* a potential fix for bug 641.Roger Dingledine2008-04-02
| | | | svn:r14281
* when our onehop circuits were failing, nobody was telling theRoger Dingledine2008-03-24
| | | | | | | | | streams. so they waited 120 seconds before timing out. this was particularly bad during bootstrapping, if an authority is down or not answering right. svn:r14163
* r18937@catbus: nickm | 2008-03-18 14:50:39 -0400Nick Mathewson2008-03-18
| | | | | | | Fix the other lingering part of bug 617: make ClientDNSRejectInternalAddresses actually work. svn:r14107
* r18862@catbus: nickm | 2008-03-16 23:33:11 -0400Nick Mathewson2008-03-17
| | | | | | | Part of fix for bug 617: allow connection_ap_handshake_attach_circuit() to mark connections, to avoid double-mark warnings. Note that this is an incomplete refactoring. svn:r14066
* r14399@tombo: nickm | 2008-02-22 14:09:38 -0500Nick Mathewson2008-02-22
| | | | | | | More 64-to-32 fixes. Partial backport candidate. still not done. svn:r13680
* maybe appease the overflow detectors moreRoger Dingledine2008-02-21
| | | | svn:r13663
* r18345@catbus: nickm | 2008-02-21 13:45:04 -0500Nick Mathewson2008-02-21
| | | | | | | Do the last part of arma's fix for bug 437: Track the origin of every addrmap, and use this info so we can remove all the trackhostexits-originated mappings for a given exit. svn:r13660
* start allowing clients to give up on trackhostexits targets ifRoger Dingledine2008-02-21
| | | | | | | | five circuit attempts fail for a given stream. part of the fix for bug 437. still an XXX020rc remaining. svn:r13648
* r18291@catbus: nickm | 2008-02-20 22:35:32 -0500Nick Mathewson2008-02-21
| | | | | | | Resolve all DOCDOC issues, and document some other undocumented code, and fix a changelog entry. svn:r13638
* If we only ever used Tor for hidden service lookups or posts, weRoger Dingledine2008-02-19
| | | | | | | | | would stop building circuits and start refusing connections after 24 hours, since we false believed that Tor was dormant. Reported by nwf; bugfix on 0.1.2.x. svn:r13583
* r14181@tombo: nickm | 2008-02-15 16:48:17 -0500Nick Mathewson2008-02-15
| | | | | | | Fix all but 2 DOCDOC items; defer many XXX020s (particularly those where fixing them would fix no bugs at the risk of introducing some bugs). svn:r13529
* r18051@catbus: nickm | 2008-02-12 15:20:43 -0500Nick Mathewson2008-02-12
| | | | | | | Re-tune mempool parametes based on testing on peacetime: use smaller chuncks, free them a little more aggressively, and try very hard to concentrate allocations on fuller chunks. Also, lots of new documentation. svn:r13484
* r14063@tombo: nickm | 2008-02-08 15:48:32 -0500Nick Mathewson2008-02-08
| | | | | | | Add a bunch more code documentation; change the interface of fetch_var_cell_from_buf() so it takes the current link protocol into account and can't get confused by weird command bytes on v1 connections. svn:r13430
* Update some copyright notices: it is now 2008.Nick Mathewson2008-02-07
| | | | svn:r13412
* New config options WarnPlaintextPorts and RejectPlaintextPorts soRoger Dingledine2008-01-20
| | | | | | | | | | Tor can warn and/or refuse connections to ports commonly used with vulnerable-plaintext protocols. We still need to figure out some good defaults for them. svn:r13198
* minor cleanupsRoger Dingledine2008-01-19
| | | | svn:r13190
* r17624@catbus: nickm | 2008-01-15 00:42:01 -0500Nick Mathewson2008-01-15
| | | | | | | Fixes to more anonymously-reported typos and logic errors. svn:r13136
* clean up copyrights, and assign 2007 copyrights to The Tor Project, IncRoger Dingledine2007-12-12
| | | | svn:r12786
* Stop being so aggressive about fetching dir info if your DirPort isRoger Dingledine2007-12-04
| | | | | | | | | | | | | | on but your ORPort is off. Add a new config option BridgeRelay that specifies you want to be a bridge relay. Right now the only difference is that it makes you answer begin_dir requests, and it makes you cache dir info, even if your DirPort isn't on. Refactor directory_caches_dir_info() into some more functions. svn:r12668
* minor touchupsRoger Dingledine2007-12-03
| | | | svn:r12657
* start to refactor dirserver_mode()Roger Dingledine2007-12-01
| | | | svn:r12621
* karsten's second refactoring patchRoger Dingledine2007-11-29
| | | | svn:r12607
* r16314@catbus: nickm | 2007-10-31 23:40:08 -0400Nick Mathewson2007-11-01
| | | | | | | Clients download and cache new hidden descriptor format. svn:r12302
* Separate "SOCKS_COMMAND_CONNECT_DIR" into two flags inRoger Dingledine2007-10-28
| | | | | | | | | | | | edge_connection_t: want_onehop if it must attach to a circuit with only one hop (e.g. for the current tunnelled connections that use begin_dir), and use_begindir if we mean to use a BEGIN_DIR relay command to establish the stream rather than the normal BEGIN. Now we can make anonymized begin_dir connections for (e.g.) more secure hidden service posting and fetching. svn:r12244
* r15598@catbus: nickm | 2007-10-09 16:37:35 -0400Nick Mathewson2007-10-09
| | | | | | | Turn all "Is DirPort nonzero? Because if it is, we must be a directory" logic into calls to dirserver_mode(). svn:r11817
* r15512@catbus: nickm | 2007-10-02 16:27:43 -0400Nick Mathewson2007-10-02
| | | | | | | Make some functions static; remove some dead code. svn:r11750
* minor typoRoger Dingledine2007-09-27
| | | | svn:r11658
* Drop support for v1 rendezvous descriptors, since we never usedRoger Dingledine2007-09-18
| | | | | | | | them anyway, and the code has probably rotted by now. Based on patch from Karsten Loesing. svn:r11496
* r14830@catbus: nickm | 2007-08-29 13:50:10 -0400Nick Mathewson2007-08-29
| | | | | | | Make controllers accept LF as well as CRLF. Update spec to reflect this. Remove now-dead code. Make controller warning about v0 protocol more accurate. svn:r11299
* r14227@Kushana: nickm | 2007-08-27 11:33:28 -0400Nick Mathewson2007-08-27
| | | | | | | Add a new ClientDNSRejectInternalAddresses option (default: on) to refuse to believe that any address can map to or from an internal address. This blocks some kinds of potential browser-based attacks, especially on hosts using DNSPort. Also clarify behavior in some comments. Backport candiate? svn:r11287