aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection_or.c
Commit message (Collapse)AuthorAge
* For missing transport, say "PT_MISSING" not "NO_ROUTE"Nick Mathewson2014-04-07
|
* Forward-port bug9665 fix to work with our fix for 11069Nick Mathewson2014-04-07
|
* Fix bug9665Fábio J. Bertinatto2014-04-07
|
* Fix warnings from doxygenNick Mathewson2014-03-25
| | | | | | Most of these are simple. The only nontrivial part is that our pattern for using ENUM_BF was confusing doxygen by making declarations that didn't look like declarations.
* Take out remaining V1 directory code.Karsten Loesing2014-03-18
|
* Throw control port warning if we failed to connect to all our bridges.George Kadianakis2014-03-10
|
* Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson2014-02-07
|\
| * NULL out conns on tlschans when freeing in case channel_run_cleanup() is ↵Andrea Shepard2014-02-06
| | | | | | | | late; fixes bug 9602
* | Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson2013-09-24
|\|
| * Always call circuit_n_chan_done(chan, 0) from channel_closed()Andrea Shepard2013-09-24
| |
* | Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson2013-09-21
|\|
| * Relays should send timestamp in NETINFO.Nick Mathewson2013-09-21
| | | | | | | | | | | | This avoids skew warnings as authorities test reachability. Fix 9798; fix not on any released Tor.
* | Merge branch 'maint-0.2.4'Roger Dingledine2013-09-21
|\|
| * back out most of 1d0ba9aRoger Dingledine2013-09-21
| | | | | | | | | | | | | | | | | | this was causing directory authorities to send a time of 0 on all connections they generated themselves, which means everybody reachability test caused a time skew warning in the log for that relay. (i didn't just revert, because the changes file has been modified by other later commits.)
* | Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson2013-09-20
|\|
| * Remove the timestamp from AUTHENTICATE cells; replace with random bytesNick Mathewson2013-09-20
| | | | | | | | | | | | | | | | | | | | | | This isn't actually much of an issue, since only relays send AUTHENTICATE cells, but while we're removing timestamps, we might as well do this too. Part of proposal 222. I didn't take the approach in the proposal of using a time-based HMAC, since that was a bad-prng-mitigation hack from SSL3, and in real life, if you don't have a good RNG, you're hopeless as a Tor server.
| * Stop sending the current time in client NETINFO handshakes.Nick Mathewson2013-09-20
| | | | | | | | Implements part of proposal 222.
* | Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson2013-08-25
|\|
| * Make bridges send AUTH_CHALLENGE cellsNick Mathewson2013-08-21
| | | | | | | | | | | | | | | | The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
| * Send NETINFO on receiving a NETINFO if we have not yet sent one.Nick Mathewson2013-08-20
| | | | | | | | | | | | | | | | | | | | Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
* | Separate mutable/const accessors for circuit_build_timesNick Mathewson2013-08-22
| | | | | | | | (These have proved invaluable for other global accessors.)
* | Make circ_times static and add accessor functions.vagrant2013-08-22
| | | | | | | | | | | | Change the global circ_times to a static variable and use accessor functions throughout the code, instead of accessing it directly.
* | White-box tests for the succeeding case of ext_or_port handshake.Nick Mathewson2013-08-15
| | | | | | | | | | (Okay, white-box plus mocking enough other functions so they don't crash.)
* | Unit tests for ext_or_id_map.Nick Mathewson2013-08-15
| |
* | Fix logging severities and remove some trivial XXXs.George Kadianakis2013-07-18
| |
* | Move Extended ORPort code to its own module.George Kadianakis2013-07-18
| | | | | | | | | | | | Move the code from the connection_or module to ext_orport. This commit only moves code: it shouldn't modify anything.
* | Satisfy check-spaces.George Kadianakis2013-07-18
| |
* | Various Extended ORPort code improvements.George Kadianakis2013-07-18
| | | | | | | | | | | | | | * Add documentation. * Free ext_or_auth_correct_client_hash. * Use VPORT(ExtORPort) instead of V(ExtORPOrt). See dfe03d36c8749eb07e9bb2ea47e88ff05e9e3127 for details.
* | Move USERADDR handling to a dedicated function.George Kadianakis2013-07-18
| |
* | Implement Extended ORPort authentication.George Kadianakis2013-07-18
| |
* | Create the Extended ORPort authentication cookie file.George Kadianakis2013-07-18
| |
* | Document code and change the Extended ORPort command numbers.George Kadianakis2013-07-18
| |
* | Skeleton ExtORPort implementation. Needs testing, documentation.Nick Mathewson2013-07-18
|/ | | | Does not implement TransportControlPort yet.
* Fix 8447: use %u to format circid_t.Nick Mathewson2013-03-10
| | | | | | | | | Now that circid_t is 4 bytes long, the default integer promotions will leave it alone when sizeof(int) == 4, which will leave us formatting an unsigned as an int. That's technically undefined behavior. Fixes bug 8447 on bfffc1f0fc7616a25c32da2eb759dade4651659e. Bug not in any released Tor.
* Merge remote-tracking branch 'public/wide_circ_ids'Nick Mathewson2013-02-15
|\ | | | | | | | | | | | | Conflicts: src/or/channel.h src/or/connection_or.c src/or/cpuworker.c
| * Replace magic constants for wide_circ_ids with inline function callsNick Mathewson2013-02-09
| |
| * Implement proposal-214 rules for CircID checking.Nick Mathewson2012-11-06
| |
| * Add a pointless 2-byte memset in cell_packNick Mathewson2012-11-06
| | | | | | | | | | | | There is probably no code that can write the 2 bytes at the end of the packed_cell_t when the cell is only a 512-byte cell, but let's not get overconfident there.
| * Allow a v4 link protocol for 4-byte circuit IDs.Nick Mathewson2012-11-06
| | | | | | | | | | | | Implements proposal 214. Needs testing.
* | Rename log() to tor_log() for loggingNick Mathewson2013-02-01
| | | | | | | | | | | | | | | | | | | | | | | | | | This is meant to avoid conflict with the built-in log() function in math.h. It resolves ticket 7599. First reported by dhill. This was generated with the following perl script: #!/usr/bin/perl -w -i -p s/\blog\(LOG_(ERR|WARN|NOTICE|INFO|DEBUG)\s*,\s*/log_\L$1\(/g; s/\blog\(/tor_log\(/g;
* | Update the copyright date to 201.Nick Mathewson2013-01-16
| |
* | Let servers choose better ciphersuites when clients support themNick Mathewson2012-12-25
| | | | | | | | | | | | | | | | | | | | | | | | This implements the server-side of proposal 198 by detecting when clients lack the magic list of ciphersuites that indicates that they're lying faking some ciphers they don't really have. When clients lack this list, we can choose any cipher that we'd actually like. The newly allowed ciphersuites are, currently, "All ECDHE-RSA ciphers that openssl supports, except for ECDHE-RSA-RC4". The code to detect the cipher list relies on on (ab)use of SSL_set_session_secret_cb.
* | Fix some wide linesNick Mathewson2012-12-07
| |
* | Merge branch 'win64-7260'Nick Mathewson2012-12-07
|\ \ | | | | | | | | | | | | Conflicts: src/or/dns.c
| * | Add a TOR_SOCKET_T_FORMAT construction for logging sockets.Nick Mathewson2012-11-02
| |/ | | | | | | | | | | We need this since win64 has a 64-bit SOCKET type. Based on a patch from yayooo for 7260, forward-ported to 0.2.4.
* | Merge branch 'check_for_orconn_on_close_squashed' of ↵Andrea Shepard2012-11-10
|\ \ | | | | | | | | | ssh://git-rw.torproject.org/user/andrea/tor
| * | Check for orconns in connection_mark_for_close and ↵Andrea Shepard2012-11-10
| |/ | | | | | | connection_mark_and_flush, and pass the call through channel_close_for_error with a warning to avoid asserts
* | Merge remote-tracking branch 'origin/maint-0.2.3'Nick Mathewson2012-11-08
|\ \ | |/ |/| | | | | | | Conflicts: src/common/crypto.c src/or/rendservice.c
| * Add and use and unlikely-to-be-eliminated memwipe()Nick Mathewson2012-11-08
| | | | | | | | | | | | | | | | | | | | Apparently some compilers like to eliminate memset() operations on data that's about to go out-of-scope. I've gone with the safest possible replacement, which might be a bit slow. I don't think this is critical path in any way that will affect performance, but if it is, we can work on that in 0.2.4. Fixes bug 7352.
| * Discard extraneous renegotiation attempts in the v3 link protocolNick Mathewson2012-10-17
| | | | | | | | | | | | Failure to do so left us open to a remotely triggerable assertion failure. Fixes CVE-2012-2249; bugfix on 0.2.3.6-alpha. Reported by "some guy from France".