| Commit message (Expand) | Author | Age |
... | |
* | Merge branch 'feature2553-v4-rebased' | Nick Mathewson | 2011-11-30 |
|\ |
|
| * | Warn loudly on startup and SIGHUP if Tor is built for a non-anonymous mode | Robert Ransom | 2011-11-30 |
* | | Initial hacking for proposal 186.•••This code handles the new ORPort options, and incidentally makes all
remaining port types use the new port configuration systems.
There are some rough edges! It doesn't do well in the case where your
Address says one thing but you say to Advertise another ORPort. It
doesn't handle AllAddrs. It doesn't actually advertise anything besides
the first listed advertised IPv4 ORPort and DirPort. It doesn't do
port forwarding to them either.
It's not tested either, it needs more documentation, and it probably
forgets to put the milk back in the refrigerator.
| Nick Mathewson | 2011-11-30 |
* | | Merge remote-tracking branch 'asn-mytor/bug4548_take2' | Nick Mathewson | 2011-11-29 |
|\ \ |
|
| * | | Simply initialize TLS context if DynamicDHGroups change.•••We used to do init_keys() if DynamicDHGroups changed after a HUP, so
that the dynamic DH modulus was stored on the disk. Since we are now
doing dynamic DH modulus storing in crypto.c, we can simply initialize
the TLS context and be good with it.
Introduce a new function router_initialize_tls_context() which
initializes the TLS context and use it appropriately.
| George Kadianakis | 2011-11-25 |
| * | | Implement dynamic prime reading and storing to disk. | George Kadianakis | 2011-11-24 |
| * | | Make DynamicPrimes SIGHUP-able.•••Instead of passing the DynamicPrimes configuration option to
crypto_global_init(), generate and set a new TLS DH prime when we read
the torrc.
| George Kadianakis | 2011-11-24 |
| * | | Introduce the DynamicPrimes configuration option. | George Kadianakis | 2011-11-24 |
| |/ |
|
* | | New 'DisableNetwork' option to prevent Tor from using the network•••Some controllers want this so they can mess with Tor's configuration
for a while via the control port before actually letting Tor out of
the house.
We do this with a new DisableNetwork option, that prevents Tor from
making any outbound connections or binding any non-control
listeners. Additionally, it shuts down the same functionality as
shuts down when we are hibernating, plus the code that launches
directory downloads.
To make sure I didn't miss anything, I added a clause straight to
connection_connect, so that we won't even try to open an outbound
socket when the network is disabled. In my testing, I made this an
assert, but since I probably missed something, I've turned it into a
BUG warning for testing.
| Nick Mathewson | 2011-11-28 |
* | | Merge remote-tracking branch 'public/feature4516' | Nick Mathewson | 2011-11-24 |
|\ \
| |/
|/| |
|
| * | New UserspaceIOCPBuffers option to set SO_{SND,RCV}BUF to zero•••When running with IOCP, we are in theory able to use userspace-
allocated buffers to avoid filling up the stingy amount of kernel
space allocated for sockets buffers.
The bufferevent_async implementation in Libevent provides this
ability, in theory. (There are likely to be remaining bugs). This
patch adds a new option that, when using IOCP bufferevents, sets
each socket's send and receive buffers to 0, so that we should use
this ability.
When all the bugs are worked out here, if we are right about bug 98,
this might solve or mitigate bug 98.
This option is experimental and will likely require lots of testing
and debugging.
| Nick Mathewson | 2011-11-18 |
* | | Merge branch 'bug2474'•••Had to resolve conflicts wrt the " (using bufferevents)" addition to the
startup string.
Conflicts:
src/or/main.c
| Nick Mathewson | 2011-11-23 |
|\ \
| |/
|/| |
|
| * | Tweak the "this is not a stable release" warning some more | Nick Mathewson | 2011-11-23 |
| * | Tweak the startup message to be more helpful•••Instead of just saying "boogity boogity!" let's actually warn people
that they need to configure stuff right to be safe, and point them
at instructions for how to do that.
Resolves bug 2474.
| Nick Mathewson | 2011-04-28 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-10-26 |
|\ \ |
|
| * \ | Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2 | Nick Mathewson | 2011-10-26 |
| |\ \ |
|
| | * | | Check return of init_keys() ip_address_changed: fix Coverity CID 484 | Nick Mathewson | 2011-10-06 |
* | | | | Add new stats type: descriptor fetch stats•••This is used for the bridge authority currently, to get a better
intuition on how many descriptors are actually fetched from it and how
many fetches happen in total.
Implements ticket 4200.
| Sebastian Hahn | 2011-10-21 |
* | | | | Merge remote-tracking branch 'asn2/bug3656'•••Conflicts:
src/common/util.c
src/common/util.h
src/or/config.h
src/or/main.c
src/test/test_util.c
| Nick Mathewson | 2011-10-07 |
|\ \ \ \ |
|
| * | | | | Don't warn of stray Bridges if managed proxies are still unconfigured.•••With managed proxies you would always get the error message:
"You have a Bridge line using the X pluggable transport, but there
doesn't seem to be a corresponding ClientTransportPlugin line."
because the check happened directly after parse_client_transport_line()
when managed proxies were not fully configured and their transports
were not registered.
The fix is to move the validation to run_scheduled_events() and make
sure that all managed proxies are configured first.
| George Kadianakis | 2011-09-11 |
| * | | | | Updated #includes etc. to use transports.[ch]. | George Kadianakis | 2011-07-18 |
| * | | | | Put some last missing pieces together.•••* Add some utility transport functions in circuitbuild.[ch] so that we
can use them from pt.c.
* Make the accounting system consider traffic coming from proxies.
* Make sure that we only fetch bridge descriptors when all the
transports are configured.
| George Kadianakis | 2011-07-13 |
* | | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-10-07 |
|\ \ \ \ \
| | |/ / /
| |/| | | |
|
| * | | | | Avoid running DNS self-tests if we're operating as a bridge | warms0x | 2011-10-07 |
| | |/ /
| |/| | |
|
* | | | | New torrc option to allow bucket refill intervals of less than 1 sec•••Implements bug3630.
| Florian Tschorsch | 2011-09-22 |
* | | | | Merge branch 'maint-0.2.2' | Roger Dingledine | 2011-09-13 |
|\| | | |
|
| * | | | Merge branch 'maint-0.2.1' into maint-0.2.2•••Conflicts:
src/or/main.c
src/or/router.c
| Roger Dingledine | 2011-09-13 |
| |\ \ \ |
|
| | * | | | Generate our ssl session certs with a plausible lifetime•••Nobody but Tor uses certs on the wire with 2 hour lifetimes,
and it makes us stand out. Resolves ticket 4014.
| Roger Dingledine | 2011-09-13 |
* | | | | | Upload descriptors more often when recent desc is unlisted•••Right now we only force a new descriptor upload every 18 hours.
This can make servers become unlisted if they upload a descriptor at
time T which the authorities reject as being "too similar" to one
they uploaded before. Nothing will actually make the server upload a
new descriptor later on, until another 18 hours have passed.
This patch changes the upload behavior so that the 18 hour interval
applies only when we're listed in a live consensus with a descriptor
published within the last 18 hours. Otherwise--if we're not listed
in the live consensus, or if we're listed with a publication time
over 18 hours in the past--we upload a new descriptor every 90
minutes.
This is an attempted bugfix for #3327. If we merge it, it should
obsolete #535.
| Nick Mathewson | 2011-09-07 |
* | | | | | Merge remote-tracking branch 'public/split_entry_conn'•••Conflicts:
src/or/connection.c
src/or/connection_edge.c
src/or/connection_edge.h
src/or/dnsserv.c
Some of these were a little tricky, since they touched code that
changed because of the prop171 fixes.
| Nick Mathewson | 2011-09-07 |
|\ \ \ \ \ |
|
| * | | | | | Move entry-only fields from edge_connection_t to entry_connection_t•••Also, refactor the code accordingly.
| Nick Mathewson | 2011-07-21 |
* | | | | | | Add a bufferevent note to startup log•••This should help us easily spot if a tor was built with
--enable-bufferevent or not
| Sebastian Hahn | 2011-08-29 |
* | | | | | | Make --quiet and --hush apply to default logs, not only initial logs•••Fixes bug 3550; bugfix on 0.2.0.10-alpha (where --quiet was introduced).
| Nick Mathewson | 2011-08-04 |
|/ / / / / |
|
* | | | | | Add a new isolation type and field: "nym epoch"•••The "nym epoch" of a stream is defined as the number of times that
NEWNYM had been called before the stream was opened. All streams
are isolated by nym epoch.
This feature should be redundant with existing signewnym stuff, but
it provides a good belt-and-suspenders way for us to avoid ever
letting any circuit type bypass signewnym.
| Nick Mathewson | 2011-07-19 |
* | | | | | Refactor listener_connection_t into its own type.•••This will allow us to add more fields to listener_connection_t
without bloating the other connection types.
| Nick Mathewson | 2011-07-19 |
* | | | | | Merge remote-tracking branch 'public/bug2841'•••Conflicts:
src/or/config.c
| Nick Mathewson | 2011-07-11 |
|\ \ \ \ \
| | |_|/ /
| |/| | | |
|
| * | | | | Trivial code tweaks and documentation updates. | George Kadianakis | 2011-06-28 |
| * | | | | Our warning now is much more specific, mentioning proxy type/addr/port.•••Not included in the previous commit, because the implementation is
ugly; I see no other way of doing this though.
| George Kadianakis | 2011-06-14 |
| * | | | | We now warn the user if a proxy server is not up when we try to connect with it. | George Kadianakis | 2011-06-14 |
* | | | | | Merge remote-tracking branch 'rransom-tor/bug3349' | Nick Mathewson | 2011-06-14 |
|\ \ \ \ \ |
|
| * | | | | | Report SIGNAL event to controllers when acting on delayed NEWNYM•••Fixes bug 3349.
| Robert Ransom | 2011-06-05 |
| |/ / / / |
|
* / / / / | Make the get_options() return const•••This lets us make a lot of other stuff const, allows the compiler to
generate (slightly) better code, and will make me get slightly fewer
patches from folks who stick mutable stuff into or_options_t.
const: because not every input is an output!
| Nick Mathewson | 2011-06-14 |
|/ / / / |
|
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/rendclient.c
| Nick Mathewson | 2011-06-02 |
|\| | | |
|
| * | | | Refactor HS client state-clearing code into a separate function | Robert Ransom | 2011-06-02 |
| * | | | Clear last_hid_serv_requests on SIGNAL NEWNYM•••Fixes bug #3309.
| Robert Ransom | 2011-06-02 |
* | | | | Unbreak the build | Robert Ransom | 2011-06-01 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/common/compat.c
src/or/main.c
| Nick Mathewson | 2011-05-30 |
|\| | | |
|
| * | | | Merge remote-tracking branch 'public/bug3270' into maint-0.2.2 | Nick Mathewson | 2011-05-30 |
| |\ \ \ |
|
| | * | | | Use a 64-bit type to hold sockets on win64.•••On win64, sockets are of type UINT_PTR; on win32 they're u_int;
elsewhere they're int. The correct windows way to check a socket for
being set is to compare it with INVALID_SOCKET; elsewhere you see if
it is negative.
On Libevent 2, all callbacks take sockets as evutil_socket_t; we've
been passing them int.
This patch should fix compilation and correctness when built for
64-bit windows. Fixes bug 3270.
| Nick Mathewson | 2011-05-23 |
* | | | | | Merge branch 'maint-0.2.2' | Roger Dingledine | 2011-05-29 |
|\| | | | |
|