aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection_or.c
Commit message (Collapse)AuthorAge
* Create rephist.hSebastian Hahn2010-07-27
|
* Create relay.hSebastian Hahn2010-07-27
|
* Create reasons.hSebastian Hahn2010-07-27
|
* Create networkstatus.hSebastian Hahn2010-07-27
|
* Create main.hSebastian Hahn2010-07-27
|
* Create dirserv.hSebastian Hahn2010-07-27
|
* Create control.hSebastian Hahn2010-07-27
|
* Create connection_or.hSebastian Hahn2010-07-27
|
* Create connection.hSebastian Hahn2010-07-27
|
* Create config.hSebastian Hahn2010-07-27
|
* Create command.hSebastian Hahn2010-07-27
|
* Create circuitbuild.hSebastian Hahn2010-07-27
|
* Create buffers.hSebastian Hahn2010-07-27
|
* Create routerlist.hSebastian Hahn2010-07-27
|
* Create router.hSebastian Hahn2010-07-27
|
* Create geoip.hSebastian Hahn2010-07-27
|
* Let bridge users use the non-primary address of a multi-homed bridgeRoger Dingledine2010-06-03
|
* Clarify 'marking connection as too old' messagesNick Mathewson2010-05-12
| | | | | | | | | | Back when we changed the idea of a connection being "too old" for new circuits into the connection being "bad" for new circuits, we didn't actually change the info messages. This led to telling the user that we were labelling connections as "too old" for being worse than connections that were actually older than them. Found by Scott on or-talk.
* let people test the RefuseUnknownExits ideaRoger Dingledine2010-03-10
|
* Merge remote branch 'origin/maint-0.2.1'Nick Mathewson2010-02-27
|\ | | | | | | | | | | Conflicts: src/common/test.h src/or/test.c
| * Update Tor Project copyright yearsNick Mathewson2010-02-27
| |
* | add config options to override.Roger Dingledine2009-12-29
| | | | | | | | somebody should add man page entries.
* | add separate per-conn write limitingRoger Dingledine2009-12-29
| |
* | New consensus params "bwconnrate" and "bwconnburst"Roger Dingledine2009-12-23
| | | | | | | | | | | | | | ...to let us rate-limit client connections as they enter the network. It's controlled in the consensus so we can turn it on and off for experiments. It's starting out off. Based on proposal 163.
* | Remove duplicate words and a duplicate newline.Karsten Loesing2009-12-18
| |
* | Make changes to latest bridge-stats fixes as suggested by Nick.Karsten Loesing2009-12-17
| |
* | Merge branch 'safelogging2'Nick Mathewson2009-12-15
|\ \ | | | | | | | | | | | | Conflicts: ChangeLog
| * | Refactor the safe_str_*() API to make more sense.Nick Mathewson2009-12-15
| | | | | | | | | | | | | | | | | | The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log".
| * | Allow SafeLogging to exclude client related informationSebastian Hahn2009-12-12
| | |
* | | Now that FOO_free(NULL) always works, remove checks before calling it.Nick Mathewson2009-12-12
| | |
* | | *_free functions now accept NULLSebastian Hahn2009-12-12
|/ / | | | | | | | | | | | | | | Some *_free functions threw asserts when passed NULL. Now all of them accept NULL as input and perform no action when called that way. This gains us consistence for our free functions, and allows some code simplifications where an explicit null check is no longer necessary.
* | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-11-06
|\| | | | | | | | | Conflicts: src/common/tortls.c
| * Make Tor work with OpenSSL 0.9.8lNick Mathewson2009-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it.
| * Update copyright to 2009.Karsten Loesing2009-05-04
| |
* | Debugging logs for TLS handshakeNick Mathewson2009-09-24
| | | | | | | | | | | | | | | | | | | | | | | | The big change is to add a function to display the current SSL handshake state, and to log it everywhere reasonable. (A failure in SSL23_ST_CR_SRVR_HELLO_A is different from one in SSL3_ST_CR_SESSION_TICKET_A.) This patch also adds a new log domain for OR handshaking, so you can pull out all the handshake log messages without having to run at debug for everything. For example, you'd just say "log notice-err [handshake]debug-err file tor.log".
* | Recover from changing network connections.Mike Perry2009-09-16
| | | | | | | | | | Also add code to keep creating circuits every minute until we hit our minimum threshhold.
* | Change proxy-address type to tor_addr_t to allow ipv6 proxies.Nick Mathewson2009-06-19
| |
* | Enable Tor to connect through SOCKS 4/5 proxiesChristopher Davis2009-06-19
| | | | | | | | | | | | Added a sanity check in config.c and a check in directory.c directory_initiate_command_rend() to catch any direct connection attempts when a socks proxy is configured.
* | Isolate Libevent API dependency to just main.c and dns.c in src/or.Nick Mathewson2009-06-12
| | | | | | | | | | | | The rest of the code was only including event.h so that it could see EV_READ and EV_WRITE, which we were using as part of the connection_watch_events interface for no very good reason.
* | Update copyright to 2009.Karsten Loesing2009-05-02
|/
* If we're using bridges and our network goes away, be more willingRoger Dingledine2009-02-04
| | | | | | | | to forgive our bridges and try again when we get an application request. Bugfix on 0.2.0.x. svn:r18396
* Don't obsolete a very-new connection for having no circuits yet.Nick Mathewson2009-01-28
| | | | | | | | | | | | | | | | | | This fixes the last known case of bug 891, which could happen if two hosts, A and B, disagree about how long a circuit has been open, because of clock drift of some kind. Host A would then mark the connection as is_bad_for_new_circs when it got too old and open a new connection. In between when B receives a NETINFO cell on the new conn, and when B receives a conn cell on the new circuit, the new circuit will seem worse to B than the old one, and so B will mark it as is_bad_for_new_circs in the second or third loop of connection_or_group_set_badness(). Bugfix on 0.1.1.13-alpha. Bug found by rovv. Not a backport candidate: the bug is too obscure and the fix too tricky. svn:r18303
* Remove svn $Id$s from our source, and remove tor --version --version.Nick Mathewson2009-01-04
| | | | | | | | The subversion $Id$ fields made every commit force a rebuild of whatever file got committed. They were not actually useful for telling the version of Tor files in the wild. svn:r17867
* Explain why the XXXX021 in connection_or.c was there, and explain why it ↵Nick Mathewson2008-12-29
| | | | | | doesn' actually need to get fixed in 0.2.1, I think. svn:r17819
* Checkpoint my big bug-891 patch.Nick Mathewson2008-12-24
| | | | svn:r17757
* More approx_time() calls. Noted by forest.Nick Mathewson2008-12-19
| | | | svn:r17702
* Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this ↵Nick Mathewson2008-12-18
| | | | | | patch. svn:r17686
* Rename or_is_obsolete and move it to or_connection_t where it belongs.Nick Mathewson2008-12-17
| | | | svn:r17642
* Apply rovv's bug 805 fix: take more care never to prefer a non-canonical ↵Nick Mathewson2008-12-15
| | | | | | connection. svn:r17627
* Apparently sparc64 is way more strict about uint16_t access alignment than I ↵Nick Mathewson2008-11-12
| | | | | | had thought: it gave bus errors when messing with var-cell headers. Maybe this patch will fix bug 862. svn:r17262