aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection_or.c
Commit message (Expand)AuthorAge
* Remove duplicate words and a duplicate newline.Karsten Loesing2009-12-18
* Make changes to latest bridge-stats fixes as suggested by Nick.Karsten Loesing2009-12-17
* Merge branch 'safelogging2'•••Conflicts: ChangeLog Nick Mathewson2009-12-15
|\
| * Refactor the safe_str_*() API to make more sense.•••The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log". Nick Mathewson2009-12-15
| * Allow SafeLogging to exclude client related informationSebastian Hahn2009-12-12
* | Now that FOO_free(NULL) always works, remove checks before calling it.Nick Mathewson2009-12-12
* | *_free functions now accept NULL•••Some *_free functions threw asserts when passed NULL. Now all of them accept NULL as input and perform no action when called that way. This gains us consistence for our free functions, and allows some code simplifications where an explicit null check is no longer necessary. Sebastian Hahn2009-12-12
|/
* Merge commit 'origin/maint-0.2.1'•••Conflicts: src/common/tortls.c Nick Mathewson2009-11-06
|\
| * Make Tor work with OpenSSL 0.9.8l•••To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it. Nick Mathewson2009-11-05
| * Update copyright to 2009.Karsten Loesing2009-05-04
* | Debugging logs for TLS handshake•••The big change is to add a function to display the current SSL handshake state, and to log it everywhere reasonable. (A failure in SSL23_ST_CR_SRVR_HELLO_A is different from one in SSL3_ST_CR_SESSION_TICKET_A.) This patch also adds a new log domain for OR handshaking, so you can pull out all the handshake log messages without having to run at debug for everything. For example, you'd just say "log notice-err [handshake]debug-err file tor.log". Nick Mathewson2009-09-24
* | Recover from changing network connections.•••Also add code to keep creating circuits every minute until we hit our minimum threshhold. Mike Perry2009-09-16
* | Change proxy-address type to tor_addr_t to allow ipv6 proxies.Nick Mathewson2009-06-19
* | Enable Tor to connect through SOCKS 4/5 proxies•••Added a sanity check in config.c and a check in directory.c directory_initiate_command_rend() to catch any direct connection attempts when a socks proxy is configured. Christopher Davis2009-06-19
* | Isolate Libevent API dependency to just main.c and dns.c in src/or.•••The rest of the code was only including event.h so that it could see EV_READ and EV_WRITE, which we were using as part of the connection_watch_events interface for no very good reason. Nick Mathewson2009-06-12
* | Update copyright to 2009.Karsten Loesing2009-05-02
|/
* If we're using bridges and our network goes away, be more willing•••to forgive our bridges and try again when we get an application request. Bugfix on 0.2.0.x. svn:r18396 Roger Dingledine2009-02-04
* Don't obsolete a very-new connection for having no circuits yet.•••This fixes the last known case of bug 891, which could happen if two hosts, A and B, disagree about how long a circuit has been open, because of clock drift of some kind. Host A would then mark the connection as is_bad_for_new_circs when it got too old and open a new connection. In between when B receives a NETINFO cell on the new conn, and when B receives a conn cell on the new circuit, the new circuit will seem worse to B than the old one, and so B will mark it as is_bad_for_new_circs in the second or third loop of connection_or_group_set_badness(). Bugfix on 0.1.1.13-alpha. Bug found by rovv. Not a backport candidate: the bug is too obscure and the fix too tricky. svn:r18303 Nick Mathewson2009-01-28
* Remove svn $Id$s from our source, and remove tor --version --version.•••The subversion $Id$ fields made every commit force a rebuild of whatever file got committed. They were not actually useful for telling the version of Tor files in the wild. svn:r17867 Nick Mathewson2009-01-04
* Explain why the XXXX021 in connection_or.c was there, and explain why it does...•••svn:r17819 Nick Mathewson2008-12-29
* Checkpoint my big bug-891 patch.•••svn:r17757 Nick Mathewson2008-12-24
* More approx_time() calls. Noted by forest.•••svn:r17702 Nick Mathewson2008-12-19
* Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this p...•••svn:r17686 Nick Mathewson2008-12-18
* Rename or_is_obsolete and move it to or_connection_t where it belongs.•••svn:r17642 Nick Mathewson2008-12-17
* Apply rovv's bug 805 fix: take more care never to prefer a non-canonical conn...•••svn:r17627 Nick Mathewson2008-12-15
* Apparently sparc64 is way more strict about uint16_t access alignment than I ...•••svn:r17262 Nick Mathewson2008-11-12
* Catch and report a few more bootstrapping failure cases when Tor•••fails to establish a TCP connection. Cleanup on 0.2.1.x. svn:r16803 Roger Dingledine2008-09-09
* Refactor use of connection_new so that we get more verifiable typesafety.•••svn:r16785 Nick Mathewson2008-09-05
* r17680@tombo: nickm | 2008-08-07 16:06:30 -0400••• Add a missing safe_str for a debug_log_message. Fix the bad part of bug 674. svn:r16462 Nick Mathewson2008-08-07
* r17641@31-33-44: nickm | 2008-08-05 16:07:53 -0400••• Initial conversion of uint32_t addr to tor_addr_t addr in connection_t and related types. Most of the Tor wire formats using these new types are in, but the code to generate and use it is not. This is a big patch. Let me know what it breaks for you. svn:r16435 Nick Mathewson2008-08-05
* r17346@aud-055: nickm | 2008-07-24 15:37:19 +0200••• Make generic address manipulation functions work better. Switch address policy code to use tor_addr_t, so it can handle IPv6. That is a good place to start. svn:r16178 Nick Mathewson2008-07-24
* r17322@aud-055: nickm | 2008-07-23 16:50:50 +0200••• Make circid_t and streamid_t get used instead of uint16_t; it is possible we will soon want to make circid_t change to uint32_t. svn:r16155 Nick Mathewson2008-07-23
* Directory authorities shouldn't complain about bootstrapping•••problems just because they do a lot of reachability testing and some of the connection attempts fail. svn:r15348 Roger Dingledine2008-06-18
* start sending "bootstrap problem" status events when we're having troubles•••reaching relays. svn:r15116 Roger Dingledine2008-06-11
* minor fixes and notes•••svn:r15111 Roger Dingledine2008-06-10
* Start noticing and reporting bootstrapping failures too. It looks like•••we never bothered learning why OR conns fail, so next step is to add some infrastructure for that. svn:r15091 Roger Dingledine2008-06-09
* infrastructure for the 'bootstrap status event' feature, so we can•••tell the controller how we're doing at bootstrapping, and it can tell the user. svn:r15008 Roger Dingledine2008-06-07
* New code to implement proposal for local geoip stats. Only enabled with --ena...•••svn:r14802 Nick Mathewson2008-05-29
* When we choose to abandon a new entry guard because we think our•••older ones might be better, close any circuits pending on that new entry guard connection. Bugfix on 0.1.2.8-beta; found by lodger. svn:r14417 Roger Dingledine2008-04-22
* r19273@catbus: nickm | 2008-04-09 14:44:23 -0400••• Do a slightly better fix for r14329: don't call time() quite so much. Also note the time(NULL) hack we wanted to do in the TODO. svn:r14334 Nick Mathewson2008-04-09
* r14399@tombo: nickm | 2008-02-22 14:09:38 -0500••• More 64-to-32 fixes. Partial backport candidate. still not done. svn:r13680 Nick Mathewson2008-02-22
* r18218@catbus: nickm | 2008-02-19 17:27:40 -0500••• When SafeLogging is off, have TLS errors and messages logged with their associated addresses. svn:r13591 Nick Mathewson2008-02-19
* r14181@tombo: nickm | 2008-02-15 16:48:17 -0500••• Fix all but 2 DOCDOC items; defer many XXX020s (particularly those where fixing them would fix no bugs at the risk of introducing some bugs). svn:r13529 Nick Mathewson2008-02-15
* r18056@catbus: nickm | 2008-02-12 17:21:10 -0500••• Add roger's responses from IRC to some XXX020 items. svn:r13487 Nick Mathewson2008-02-12
* r18051@catbus: nickm | 2008-02-12 15:20:43 -0500••• Re-tune mempool parametes based on testing on peacetime: use smaller chuncks, free them a little more aggressively, and try very hard to concentrate allocations on fuller chunks. Also, lots of new documentation. svn:r13484 Nick Mathewson2008-02-12
* r14108@tombo: nickm | 2008-02-10 20:09:10 -0500••• add some documentation svn:r13462 Nick Mathewson2008-02-11
* r14101@tombo: nickm | 2008-02-10 13:24:27 -0500••• Merge connection_or_act_on_netinfo into command.c; remove some fields from or_handshake_state(). svn:r13458 Nick Mathewson2008-02-10
* doxygen and other cleanups•••svn:r13440 Roger Dingledine2008-02-09
* r17991@catbus: nickm | 2008-02-08 18:41:26 -0500••• More protocol negotiation work. Make the negotiation actually complete and set the state to open. Fix a crash bug that occured when we forcibly stopped the connection from writing. svn:r13434 Nick Mathewson2008-02-08
* r14063@tombo: nickm | 2008-02-08 15:48:32 -0500••• Add a bunch more code documentation; change the interface of fetch_var_cell_from_buf() so it takes the current link protocol into account and can't get confused by weird command bytes on v1 connections. svn:r13430 Nick Mathewson2008-02-08