| Commit message (Expand) | Author | Age |
... | |
* | | | First chunk of support for bridges on IPv6•••Comments below focus on changes, see diff for added code.
New type tor_addr_port_t holding an IP address and a TCP/UDP port.
New flag in routerinfo_t, ipv6_preferred. This should go in the
node_t instead but not now.
Replace node_get_addr() with
- node_get_prim_addr() for primary address, i.e. IPv4 for now
- node_get_pref_addr() for preferred address, IPv4 or IPv6.
Rename node_get_addr_ipv4h() node_get_prim_addr_ipv4h() for
consistency. The primary address will not allways be an IPv4 address.
Same for node_get_orport() -> node_get_prim_orport().
Rewrite node_is_a_configured_bridge() to take all OR ports into account.
Extend argument list to extend_info_from_node and
extend_info_from_router with a flag indicating if we want to use the
routers primary address or the preferred address. Use the preferred
address in as few situtations as possible for allowing clients to
connect to bridges over IPv6.
| Linus Nordberg | 2011-11-30 |
* | | | Initial support for simplest use of prop186 or-address lines•••This lets a routerinfo_t have a single IPv6 or-address, and adds
support for formatting and parsing those lines.
| Nick Mathewson | 2011-11-30 |
* | | | Initial hacking for proposal 186.•••This code handles the new ORPort options, and incidentally makes all
remaining port types use the new port configuration systems.
There are some rough edges! It doesn't do well in the case where your
Address says one thing but you say to Advertise another ORPort. It
doesn't handle AllAddrs. It doesn't actually advertise anything besides
the first listed advertised IPv4 ORPort and DirPort. It doesn't do
port forwarding to them either.
It's not tested either, it needs more documentation, and it probably
forgets to put the milk back in the refrigerator.
| Nick Mathewson | 2011-11-30 |
* | | | Merge remote-tracking branch 'rransom-tor/bug3460-v4'•••Conflicts:
src/or/rendservice.c
| Nick Mathewson | 2011-11-29 |
|\ \ \ |
|
| * | | | Correct documentation comments for fields formerly named accepted_intros | Robert Ransom | 2011-11-27 |
| * | | | Rename accepted_intros fields | Robert Ransom | 2011-11-27 |
| * | | | Reduce lifetime of DH public key replay-detection cache elements | Robert Ransom | 2011-10-31 |
| * | | | Ignore timestamps of INTRODUCE2 cells | Robert Ransom | 2011-10-31 |
| * | | | Move the real INTRODUCE2 replay-detection cache into rend_intro_point_t | Robert Ransom | 2011-10-30 |
| * | | | Make introduction points expire | Robert Ransom | 2011-10-30 |
| * | | | Allow intro points to expire somewhat gracefully•••The Right Way to expire an intro point is to establish a new one to
replace it, publish a new descriptor that doesn't list any expiring intro
points, and *then*, once our upload attempts for the new descriptor have
ended (whether in success or failure), close the expiring intro points.
Unfortunately, we can't find out when the new descriptor has actually been
uploaded, so we'll have to settle for a five-minute timer.
There should be no significant behaviour changes due to this commit (only
a log-message change or two), despite the rather massive overhaul, so this
commit doesn't include a changes/ file. (The commit that teaches
intro_point_should_expire_now to return non-zero gets a changes/ file,
though.)
| Robert Ransom | 2011-10-30 |
| * | | | Record which intro points were listed in the last HS desc | Robert Ransom | 2011-10-30 |
| * | | | Record the number of INTRODUCE2 cells each intro point has received | Robert Ransom | 2011-10-30 |
| * | | | Record the time at which each intro point was first published | Robert Ransom | 2011-10-30 |
* | | | | Merge remote-tracking branch 'asn-mytor/bug4548_take2' | Nick Mathewson | 2011-11-29 |
|\ \ \ \ |
|
| * | | | | Finishing touches.•••- Make check-spaces happy.
- Remove a stray header from crypto.h
| George Kadianakis | 2011-11-25 |
| * | | | | s/DynamicPrimes/DynamicDHGroups/g | George Kadianakis | 2011-11-25 |
| * | | | | Introduce the DynamicPrimes configuration option. | George Kadianakis | 2011-11-24 |
| | |/ /
| |/| | |
|
* | | | | Merge branch 'disable_network' | Nick Mathewson | 2011-11-29 |
|\ \ \ \ |
|
| * | | | | New 'DisableNetwork' option to prevent Tor from using the network•••Some controllers want this so they can mess with Tor's configuration
for a while via the control port before actually letting Tor out of
the house.
We do this with a new DisableNetwork option, that prevents Tor from
making any outbound connections or binding any non-control
listeners. Additionally, it shuts down the same functionality as
shuts down when we are hibernating, plus the code that launches
directory downloads.
To make sure I didn't miss anything, I added a clause straight to
connection_connect, so that we won't even try to open an outbound
socket when the network is disabled. In my testing, I made this an
assert, but since I probably missed something, I've turned it into a
BUG warning for testing.
| Nick Mathewson | 2011-11-28 |
* | | | | | Merge branch 'multilevel_cfg' | Nick Mathewson | 2011-11-29 |
|\ \ \ \ \ |
|
| * | | | | | Add the ability to append and clear linelist options from cmdline•••This will be important for getting stuff to work right across zones.
| Nick Mathewson | 2011-11-27 |
| * | | | | | Make linelists always overridden by the command line•••This starts an effort to refactor torrc handling code to make it easier
to live with. It makes it possible to override exit policies from the
command line, and possible to override (rather than append to) socksport
lists from the command line.
It'll be necessary to make a "base" torrc implementation work at all.
| Nick Mathewson | 2011-11-27 |
| |/ / / / |
|
* / / / / | Make pending libevent actions cancelable•••This avoids a dangling pointer issue in the 3412 code, and should
fix bug 4599.
| Nick Mathewson | 2011-11-29 |
|/ / / / |
|
* | | | | Merge remote-tracking branch 'ioerror/DisableDebuggerAttachment'•••Conflicts:
src/or/config.c
| Nick Mathewson | 2011-11-24 |
|\ \ \ \ |
|
| * | | | | New configuration option: DisableDebuggerAttachment•••If set to 1, Tor will attempt to prevent basic debugging
attachment attempts by other processes. (Default: 1)
Supports Mac OS X and Gnu/Linux.
Sebastian provided useful feedback and refactoring suggestions.
Signed-off-by: Jacob Appelbaum <jacob@appelbaum.net>
| Jacob Appelbaum | 2011-06-01 |
* | | | | | Merge remote-tracking branch 'public/feature4516' | Nick Mathewson | 2011-11-24 |
|\ \ \ \ \
| |_|/ / /
|/| | | | |
|
| * | | | | New UserspaceIOCPBuffers option to set SO_{SND,RCV}BUF to zero•••When running with IOCP, we are in theory able to use userspace-
allocated buffers to avoid filling up the stingy amount of kernel
space allocated for sockets buffers.
The bufferevent_async implementation in Libevent provides this
ability, in theory. (There are likely to be remaining bugs). This
patch adds a new option that, when using IOCP bufferevents, sets
each socket's send and receive buffers to 0, so that we should use
this ability.
When all the bugs are worked out here, if we are right about bug 98,
this might solve or mitigate bug 98.
This option is experimental and will likely require lots of testing
and debugging.
| Nick Mathewson | 2011-11-18 |
* | | | | | Merge branch 'maint-0.2.2'•••Conflicts:
src/or/dirserv.c
| Roger Dingledine | 2011-11-21 |
|\ \ \ \ \
| | |_|_|/
| |/| | | |
|
| * | | | | parameterize bw cutoffs to guarantee Fast and Guard flags•••Now it will be easier for researchers to simulate Tor networks with
different values. Resolves ticket 4484.
| Roger Dingledine | 2011-11-21 |
* | | | | | normalize the name of the CERTS cell | Roger Dingledine | 2011-10-31 |
| |/ / /
|/| | | |
|
* | | | | Merge branch 'maint-0.2.2_secfix' into master_secfix•••Conflicts:
src/common/tortls.c
src/or/connection_or.c
src/or/dirserv.c
src/or/or.h
| Sebastian Hahn | 2011-10-27 |
|\| | | |
|
| * | | | Add option to give guard flag to relays without the CVE-2011-2768 fix•••This way, all of the DA operators can upgrade immediately, without nuking
every client's set of entry guards as soon as a majority of them upgrade.
Until enough guards have upgraded, a majority of dirauths should set this
config option so that there are still enough guards in the network. After
a few days pass, all dirauths should use the default.
| Robert Ransom | 2011-10-26 |
| * | | | Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix•••Conflicts:
src/or/connection_or.c
| Sebastian Hahn | 2011-10-26 |
| |\ \ \ |
|
| | * | | | Mark which OR connections are outgoing | Robert Ransom | 2011-10-26 |
| | * | | | Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND•••Fix suggested by Nick Mathewson.
| Robert Ransom | 2011-10-26 |
| | * | | | Rename get_client_identity_key to get_tlsclient_identity_key | Nick Mathewson | 2011-10-26 |
| | * | | | Maintain separate server and client identity keys when appropriate.•••Fixes a bug described in ticket #988.
Conflicts:
src/or/main.c
src/or/router.c
| Robert Ransom | 2011-10-26 |
| | * | | | Add public_server_mode function. | Robert Ransom | 2011-10-26 |
* | | | | | remove code related to tracking descriptor serving times•••This had broken due to bitrot - it doesn't know about microdescriptors
at all, and afaik hasn't generally been used in ages.
| Sebastian Hahn | 2011-10-21 |
* | | | | | Quiet two notices, and spelling mistake cleanup | Sebastian Hahn | 2011-10-10 |
* | | | | | Remove auth_challenge field from or_handshake_state_t•••We didn't need to record this value; it was already recorded
implicitly while computing cell digests for later examination in the
authenticate cells.
| Nick Mathewson | 2011-10-10 |
* | | | | | Make sure we stop putting cells into our hash at the right time. | Nick Mathewson | 2011-10-10 |
* | | | | | Hook up all of the prop176 code; allow v3 negotiations to actually work | Nick Mathewson | 2011-10-10 |
* | | | | | Implement cert/auth cell reading | Nick Mathewson | 2011-10-10 |
* | | | | | Functions to send cert and auth_challenge cells. | Nick Mathewson | 2011-10-10 |
* | | | | | Cell types and states for new OR handshake•••Also, define all commands > 128 as variable-length when using
v3 or later link protocol. Running into a var cell with an
unrecognized type is no longer a bug.
| Nick Mathewson | 2011-10-10 |
* | | | | | Merge remote-tracking branch 'asn2/bug3656'•••Conflicts:
src/common/util.c
src/common/util.h
src/or/config.h
src/or/main.c
src/test/test_util.c
| Nick Mathewson | 2011-10-07 |
|\ \ \ \ \ |
|
| * | | | | | Server transport proxies should bind on the same port each time, if possible. | George Kadianakis | 2011-08-07 |
| * | | | | | Add support for managed {Client,Server}TransportPlugin parsing. | George Kadianakis | 2011-07-13 |