| Commit message (Expand) | Author | Age |
* | Merge branch 'bug4360' | Nick Mathewson | 2011-11-21 |
|\ |
|
| * | normalize the name of the CERTS cell | Roger Dingledine | 2011-10-31 |
* | | Don't fail to send netinfo if real_addr is unset•••If we haven't set real_addr on a connection, we also now that _base.addr
hasn't been tampered with. So we can use that.
| Sebastian Hahn | 2011-11-16 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-11-15 |
|\ \
| |/
|/| |
|
| * | Use real_addr in send_netinfo•••Reported by "troll_un"; bugfix on 0.2.0.10-alpha; fixes bug 4349.
| Nick Mathewson | 2011-11-14 |
* | | bridges send netinfo cells like clients on outgoing conns•••fixes bug 4348
| Roger Dingledine | 2011-10-29 |
* | | Merge branch 'maint-0.2.2_secfix' into master_secfix•••Conflicts:
src/common/tortls.c
src/or/connection_or.c
src/or/dirserv.c
src/or/or.h
| Sebastian Hahn | 2011-10-27 |
|\| |
|
| * | Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix•••Conflicts:
src/or/connection_or.c
| Sebastian Hahn | 2011-10-26 |
| |\ |
|
| | * | Mark which OR connections are outgoing | Robert Ransom | 2011-10-26 |
| | * | Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND•••Fix suggested by Nick Mathewson.
| Robert Ransom | 2011-10-26 |
| | * | Rename get_client_identity_key to get_tlsclient_identity_key | Nick Mathewson | 2011-10-26 |
| | * | Maintain separate server and client identity keys when appropriate.•••Fixes a bug described in ticket #988.
Conflicts:
src/or/main.c
src/or/router.c
| Robert Ransom | 2011-10-26 |
* | | | Fix a bunch of whitespace errors | Nick Mathewson | 2011-10-11 |
* | | | Quiet two notices, and spelling mistake cleanup | Sebastian Hahn | 2011-10-10 |
* | | | Fix a few 64bit compiler warnings | Sebastian Hahn | 2011-10-10 |
* | | | Add more log statements for protocol/internal failures | Nick Mathewson | 2011-10-10 |
* | | | Give tor_cert_get_id_digests() fail-fast behavior•••Right now we can take the digests only of an RSA key, and only expect to
take the digests of an RSA key. The old tor_cert_get_id_digests() would
return a good set of digests for an RSA key, and an all-zero one for a
non-RSA key. This behavior is too error-prone: it carries the risk that
we will someday check two non-RSA keys for equality and conclude that
they must be equal because they both have the same (zero) "digest".
Instead, let's have tor_cert_get_id_digests() return NULL for keys we
can't handle, and make its callers explicitly test for NULL.
| Nick Mathewson | 2011-10-10 |
* | | | Make sure we stop putting cells into our hash at the right time. | Nick Mathewson | 2011-10-10 |
* | | | Bugfixes for authenticate handling and generation | Nick Mathewson | 2011-10-10 |
* | | | more verbose log for recording an odd cell | Nick Mathewson | 2011-10-10 |
* | | | Actually accept cells in SERVER_RENEGOTIATING | Nick Mathewson | 2011-10-10 |
* | | | Allow "finished flushing" during v3 handshake | Nick Mathewson | 2011-10-10 |
* | | | Hook up all of the prop176 code; allow v3 negotiations to actually work | Nick Mathewson | 2011-10-10 |
* | | | New functions to record digests of cells during v3 handshake•••Also, free all of the new fields in or_handshake_state_t
| Nick Mathewson | 2011-10-10 |
* | | | Implement cert/auth cell reading | Nick Mathewson | 2011-10-10 |
* | | | Basic function to write authenticate cells•••Also, tweak the cert cell code to send auth certs
| Nick Mathewson | 2011-10-10 |
* | | | Functions to send cert and auth_challenge cells. | Nick Mathewson | 2011-10-10 |
* | | | Cell types and states for new OR handshake•••Also, define all commands > 128 as variable-length when using
v3 or later link protocol. Running into a var cell with an
unrecognized type is no longer a bug.
| Nick Mathewson | 2011-10-10 |
* | | | Make bufferevents work with TokenBucketRefillInterval | Nick Mathewson | 2011-09-22 |
* | | | Apply rate-limiting to the lowest bufferevent in the stack.•••When we're doing filtering ssl bufferevents, we want the rate-limits
to apply to the lowest level of the bufferevent stack, so that we're
actually limiting bytes sent on the network. Otherwise, we'll read
from the network aggressively, and only limit stuff as we process it.
| Nick Mathewson | 2011-08-24 |
* | | | Fix a compile warning on OS X 10.6 | Sebastian Hahn | 2011-07-15 |
* | | | Avoid warning in broken_state_count_compare | Nick Mathewson | 2011-07-12 |
* | | | Disable recording new broken conns when we have bootstrapped•••Rationale: right now there seems to be no way for our bootstrap
status to dip under 100% once it has reached 100%. Thus, recording
broken connections after that point is useless, and wastes memory.
If at some point in the future we allow our bootstrap level to go
backwards, then we should change this rule so that we disable
recording broken connection states _as long as_ the bootstrap status
is 100%.
| Nick Mathewson | 2011-07-11 |
* | | | Document feature3116 fns and improve output•••- We were reporting the _bottom_ N failing states, not the top N.
- With bufferevents enabled, we logged all TLS states as being "in
bufferevent", which isn't actually informative.
- When we had nothing to report, we reported nothing too loudly.
- Also, we needed documentation.
| Nick Mathewson | 2011-07-11 |
* | | | Limit the number of different handshake reasons to report•••If connections failed in more than 10 different states, let's just
report the top ten states.
| Nick Mathewson | 2011-07-11 |
* | | | Record the states of failing OR connections•••This code lets us record the state of any outgoing OR connection
that fails before it becomes open, so we can notice if they're all
dying in the same SSL state or the same OR handshake state.
More work is still needed:
- We need documentation
- We need to actually call the code that reports the failure when
we realize that we're having a hard time connecting out or
making circuits.
- We need to periodically clear out all this data -- perhaps,
whenever we build a circuit successfully?
- We'll eventually want to expose it to controllers, perhaps.
Partial implementation of feature 3116.
| Nick Mathewson | 2011-07-11 |
* | | | Split connection_about_to_close_connection into separate functions•••This patch does NOTHING but:
- move code
- add declarations and includes as needed to make the new code
work
- declare the new functions.
| Nick Mathewson | 2011-07-11 |
* | | | Merge remote-tracking branch 'public/bug2841'•••Conflicts:
src/or/config.c
| Nick Mathewson | 2011-07-11 |
|\ \ \ |
|
| * | | | Refactor the interfaces of transport/proxy lookup fns•••Returning a tristate is needless here; we can just use the yielded
transport/proxy_type field to tell whether there's a proxy, and have
the return indicate success/failure.
Also, store the proxy_type in the or_connection_t rather than letting
it get out of sync if a configuration reload happens between launching
the or_connection and deciding what to say with it.
| Nick Mathewson | 2011-07-03 |
| * | | | Small tweaks to 2841 code••• - const-ify some transport_t pointers
- Remove a vestigial argument to parse_bridge_line
- Make it compile without warnings on my laptop with
--enable-gcc-warnings
| Nick Mathewson | 2011-07-02 |
| * | | | Revised how we handle ClientTransportPlugin and Bridge lines.•••Multiple Bridge lines can point to the same one ClientTransportPlugin
line, and we can have multiple ClientTransportPlugin lines in our
configuration file that don't match with a bridge. We also issue a
warning when we have a Bridge line with a pluggable transport but we
can't match it to a ClientTransportPlugin line.
| George Kadianakis | 2011-06-22 |
| * | | | Tweaked connection{.c,.h,_or.c} based on nick's comments.•••* Tweaked doxygen comments.
* Changed returns of get_proxy_addrport().
* Ran make check-spaces.
* Various small code tweaks.
| George Kadianakis | 2011-06-21 |
| * | | | Fixes small bugs. | George Kadianakis | 2011-06-14 |
| * | | | This commit is an attempt to beautify the previous commit.•••It creates some helper functions that return the proxy type, proxy addr/port, etc.
| George Kadianakis | 2011-06-14 |
| * | | | We now warn the user if a proxy server is not up when we try to connect with it. | George Kadianakis | 2011-06-14 |
| * | | | Various trivial changes.•••* Improved function documentation.
* Renamed find_bridge_transport_by_addrport() to
find_transport_by_bridge_addrport().
* Sanitized log severities we use.
* Ran check-spaces.
| George Kadianakis | 2011-06-12 |
| * | | | We can now connect using transports as well! | George Kadianakis | 2011-06-12 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-06-17 |
|\ \ \ \
| | |/ /
| |/| | |
|
| * | | | log when we finish ssl handshake and move to renegotiation•••debug-level since it will be quite common. logged at both client
and server side. this step should help us track what's going on
with people filtering tor connections by our ssl habits.
| Roger Dingledine | 2011-06-17 |
* | | | | Make the get_options() return const•••This lets us make a lot of other stuff const, allows the compiler to
generate (slightly) better code, and will make me get slightly fewer
patches from folks who stick mutable stuff into or_options_t.
const: because not every input is an output!
| Nick Mathewson | 2011-06-14 |
| |/ /
|/| | |
|