aboutsummaryrefslogtreecommitdiff
path: root/src/or/or.h
Commit message (Expand)AuthorAge
...
* | | First chunk of support for bridges on IPv6•••Comments below focus on changes, see diff for added code. New type tor_addr_port_t holding an IP address and a TCP/UDP port. New flag in routerinfo_t, ipv6_preferred. This should go in the node_t instead but not now. Replace node_get_addr() with - node_get_prim_addr() for primary address, i.e. IPv4 for now - node_get_pref_addr() for preferred address, IPv4 or IPv6. Rename node_get_addr_ipv4h() node_get_prim_addr_ipv4h() for consistency. The primary address will not allways be an IPv4 address. Same for node_get_orport() -> node_get_prim_orport(). Rewrite node_is_a_configured_bridge() to take all OR ports into account. Extend argument list to extend_info_from_node and extend_info_from_router with a flag indicating if we want to use the routers primary address or the preferred address. Use the preferred address in as few situtations as possible for allowing clients to connect to bridges over IPv6. Linus Nordberg2011-11-30
* | | Initial support for simplest use of prop186 or-address lines•••This lets a routerinfo_t have a single IPv6 or-address, and adds support for formatting and parsing those lines. Nick Mathewson2011-11-30
* | | Initial hacking for proposal 186.•••This code handles the new ORPort options, and incidentally makes all remaining port types use the new port configuration systems. There are some rough edges! It doesn't do well in the case where your Address says one thing but you say to Advertise another ORPort. It doesn't handle AllAddrs. It doesn't actually advertise anything besides the first listed advertised IPv4 ORPort and DirPort. It doesn't do port forwarding to them either. It's not tested either, it needs more documentation, and it probably forgets to put the milk back in the refrigerator. Nick Mathewson2011-11-30
* | | Merge remote-tracking branch 'rransom-tor/bug3460-v4'•••Conflicts: src/or/rendservice.c Nick Mathewson2011-11-29
|\ \ \
| * | | Correct documentation comments for fields formerly named accepted_introsRobert Ransom2011-11-27
| * | | Rename accepted_intros fieldsRobert Ransom2011-11-27
| * | | Reduce lifetime of DH public key replay-detection cache elementsRobert Ransom2011-10-31
| * | | Ignore timestamps of INTRODUCE2 cellsRobert Ransom2011-10-31
| * | | Move the real INTRODUCE2 replay-detection cache into rend_intro_point_tRobert Ransom2011-10-30
| * | | Make introduction points expireRobert Ransom2011-10-30
| * | | Allow intro points to expire somewhat gracefully•••The Right Way to expire an intro point is to establish a new one to replace it, publish a new descriptor that doesn't list any expiring intro points, and *then*, once our upload attempts for the new descriptor have ended (whether in success or failure), close the expiring intro points. Unfortunately, we can't find out when the new descriptor has actually been uploaded, so we'll have to settle for a five-minute timer. There should be no significant behaviour changes due to this commit (only a log-message change or two), despite the rather massive overhaul, so this commit doesn't include a changes/ file. (The commit that teaches intro_point_should_expire_now to return non-zero gets a changes/ file, though.) Robert Ransom2011-10-30
| * | | Record which intro points were listed in the last HS descRobert Ransom2011-10-30
| * | | Record the number of INTRODUCE2 cells each intro point has receivedRobert Ransom2011-10-30
| * | | Record the time at which each intro point was first publishedRobert Ransom2011-10-30
* | | | Merge remote-tracking branch 'asn-mytor/bug4548_take2'Nick Mathewson2011-11-29
|\ \ \ \
| * | | | Finishing touches.•••- Make check-spaces happy. - Remove a stray header from crypto.h George Kadianakis2011-11-25
| * | | | s/DynamicPrimes/DynamicDHGroups/gGeorge Kadianakis2011-11-25
| * | | | Introduce the DynamicPrimes configuration option.George Kadianakis2011-11-24
| | |/ / | |/| |
* | | | Merge branch 'disable_network'Nick Mathewson2011-11-29
|\ \ \ \
| * | | | New 'DisableNetwork' option to prevent Tor from using the network•••Some controllers want this so they can mess with Tor's configuration for a while via the control port before actually letting Tor out of the house. We do this with a new DisableNetwork option, that prevents Tor from making any outbound connections or binding any non-control listeners. Additionally, it shuts down the same functionality as shuts down when we are hibernating, plus the code that launches directory downloads. To make sure I didn't miss anything, I added a clause straight to connection_connect, so that we won't even try to open an outbound socket when the network is disabled. In my testing, I made this an assert, but since I probably missed something, I've turned it into a BUG warning for testing. Nick Mathewson2011-11-28
* | | | | Merge branch 'multilevel_cfg'Nick Mathewson2011-11-29
|\ \ \ \ \
| * | | | | Add the ability to append and clear linelist options from cmdline•••This will be important for getting stuff to work right across zones. Nick Mathewson2011-11-27
| * | | | | Make linelists always overridden by the command line•••This starts an effort to refactor torrc handling code to make it easier to live with. It makes it possible to override exit policies from the command line, and possible to override (rather than append to) socksport lists from the command line. It'll be necessary to make a "base" torrc implementation work at all. Nick Mathewson2011-11-27
| |/ / / /
* / / / / Make pending libevent actions cancelable•••This avoids a dangling pointer issue in the 3412 code, and should fix bug 4599. Nick Mathewson2011-11-29
|/ / / /
* | | | Merge remote-tracking branch 'ioerror/DisableDebuggerAttachment'•••Conflicts: src/or/config.c Nick Mathewson2011-11-24
|\ \ \ \
| * | | | New configuration option: DisableDebuggerAttachment•••If set to 1, Tor will attempt to prevent basic debugging attachment attempts by other processes. (Default: 1) Supports Mac OS X and Gnu/Linux. Sebastian provided useful feedback and refactoring suggestions. Signed-off-by: Jacob Appelbaum <jacob@appelbaum.net> Jacob Appelbaum2011-06-01
* | | | | Merge remote-tracking branch 'public/feature4516'Nick Mathewson2011-11-24
|\ \ \ \ \ | |_|/ / / |/| | | |
| * | | | New UserspaceIOCPBuffers option to set SO_{SND,RCV}BUF to zero•••When running with IOCP, we are in theory able to use userspace- allocated buffers to avoid filling up the stingy amount of kernel space allocated for sockets buffers. The bufferevent_async implementation in Libevent provides this ability, in theory. (There are likely to be remaining bugs). This patch adds a new option that, when using IOCP bufferevents, sets each socket's send and receive buffers to 0, so that we should use this ability. When all the bugs are worked out here, if we are right about bug 98, this might solve or mitigate bug 98. This option is experimental and will likely require lots of testing and debugging. Nick Mathewson2011-11-18
* | | | | Merge branch 'maint-0.2.2'•••Conflicts: src/or/dirserv.c Roger Dingledine2011-11-21
|\ \ \ \ \ | | |_|_|/ | |/| | |
| * | | | parameterize bw cutoffs to guarantee Fast and Guard flags•••Now it will be easier for researchers to simulate Tor networks with different values. Resolves ticket 4484. Roger Dingledine2011-11-21
* | | | | normalize the name of the CERTS cellRoger Dingledine2011-10-31
| |/ / / |/| | |
* | | | Merge branch 'maint-0.2.2_secfix' into master_secfix•••Conflicts: src/common/tortls.c src/or/connection_or.c src/or/dirserv.c src/or/or.h Sebastian Hahn2011-10-27
|\| | |
| * | | Add option to give guard flag to relays without the CVE-2011-2768 fix•••This way, all of the DA operators can upgrade immediately, without nuking every client's set of entry guards as soon as a majority of them upgrade. Until enough guards have upgraded, a majority of dirauths should set this config option so that there are still enough guards in the network. After a few days pass, all dirauths should use the default. Robert Ransom2011-10-26
| * | | Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix•••Conflicts: src/or/connection_or.c Sebastian Hahn2011-10-26
| |\ \ \
| | * | | Mark which OR connections are outgoingRobert Ransom2011-10-26
| | * | | Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND•••Fix suggested by Nick Mathewson. Robert Ransom2011-10-26
| | * | | Rename get_client_identity_key to get_tlsclient_identity_keyNick Mathewson2011-10-26
| | * | | Maintain separate server and client identity keys when appropriate.•••Fixes a bug described in ticket #988. Conflicts: src/or/main.c src/or/router.c Robert Ransom2011-10-26
| | * | | Add public_server_mode function.Robert Ransom2011-10-26
* | | | | remove code related to tracking descriptor serving times•••This had broken due to bitrot - it doesn't know about microdescriptors at all, and afaik hasn't generally been used in ages. Sebastian Hahn2011-10-21
* | | | | Quiet two notices, and spelling mistake cleanupSebastian Hahn2011-10-10
* | | | | Remove auth_challenge field from or_handshake_state_t•••We didn't need to record this value; it was already recorded implicitly while computing cell digests for later examination in the authenticate cells. Nick Mathewson2011-10-10
* | | | | Make sure we stop putting cells into our hash at the right time.Nick Mathewson2011-10-10
* | | | | Hook up all of the prop176 code; allow v3 negotiations to actually workNick Mathewson2011-10-10
* | | | | Implement cert/auth cell readingNick Mathewson2011-10-10
* | | | | Functions to send cert and auth_challenge cells.Nick Mathewson2011-10-10
* | | | | Cell types and states for new OR handshake•••Also, define all commands > 128 as variable-length when using v3 or later link protocol. Running into a var cell with an unrecognized type is no longer a bug. Nick Mathewson2011-10-10
* | | | | Merge remote-tracking branch 'asn2/bug3656'•••Conflicts: src/common/util.c src/common/util.h src/or/config.h src/or/main.c src/test/test_util.c Nick Mathewson2011-10-07
|\ \ \ \ \
| * | | | | Server transport proxies should bind on the same port each time, if possible.George Kadianakis2011-08-07
| * | | | | Add support for managed {Client,Server}TransportPlugin parsing.George Kadianakis2011-07-13