aboutsummaryrefslogtreecommitdiff
path: root/src/or
Commit message (Collapse)AuthorAge
* Merge commit 'karsten/fix-bridge-stats-master-4'Nick Mathewson2009-12-18
|\
| * Permit an empty "bridge-ips" line when parsing bridge stats.Karsten Loesing2009-12-18
| |
| * Remove duplicate words and a duplicate newline.Karsten Loesing2009-12-18
| |
| * Refactor out the 'find string at start of any line' logic.Nick Mathewson2009-12-17
| | | | | | | | | | | | | | | | We do this in too many places throughout the code; it's time to start clamping down. Also, refactor Karsten's patch to use strchr-then-strndup, rather than malloc-then-strlcpy-then-strchr-then-clear.
| * Make changes to latest bridge-stats fixes as suggested by Nick.Karsten Loesing2009-12-17
| |
| * Fix bridge statistics.Karsten Loesing2009-12-17
| | | | | | | | | | | | Fix statistics on client numbers by country as seen by bridges that were broken in 0.2.2.1-alpha. Also switch to reporting full 24-hour intervals instead of variable 12-to-48-hour intervals.
* | Remove v0 hidden service statistics code.Karsten Loesing2009-12-17
|/ | | | | | | | | | The HSAuthorityRecordStats option was used to track statistics of overall hidden service usage on the version 0 hidden service authorities. With the version 2 hidden service directories being deployed and version 0 descriptors being phased out, these statistics are not as useful anymore. Goodbye, you fine piece of software; my first major code contribution to Tor.
* Merge commit 'karsten/fix-cell-stats'Nick Mathewson2009-12-16
|\ | | | | | | | | Conflicts: ChangeLog
| * Minor fix to buffer stats.Karsten Loesing2009-12-03
| | | | | | | | | | | | | | Do not segfault when writing buffer stats when we haven't observed a single circuit to report about. This is a minor bug that would only show up in testing environments with no traffic and with reduced stats intervals.
* | Merge branch 'safelogging2'Nick Mathewson2009-12-15
|\ \ | | | | | | | | | | | | Conflicts: ChangeLog
| * | Refactor the safe_str_*() API to make more sense.Nick Mathewson2009-12-15
| | | | | | | | | | | | | | | | | | The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log".
| * | Cache the parsed value of SafeLogging as an enum.Nick Mathewson2009-12-12
| | |
| * | Allow SafeLogging to exclude client related informationSebastian Hahn2009-12-12
| |/
* | Stop using lround in or.h, and check for bad values of RECENT_CIRCUITSNick Mathewson2009-12-15
| |
* | Merge commit 'sebastian/coverity'Nick Mathewson2009-12-15
|\ \
| * | Fix compile warning on Panther.Sebastian Hahn2009-12-14
| | | | | | | | | | | | Apparently Panther doesn't like comparing ints and enums
| * | Remove some dead code found by coverity, cid 404Sebastian Hahn2009-12-14
| | | | | | | | | | | | | | | | | | | | | In connection_dir_client_reached_eof, we make sure that we either return when we get an http status code of 503 or handle the problem and set it to 200. Later we check if the status code is 503. Remove that check.
* | | Merge branch 'mathlog'Nick Mathewson2009-12-15
|\ \ \ | |/ / |/| |
| * | Refactor a bit so that it is safe to include math.h, and mostly not needed.Nick Mathewson2009-12-15
| | |
* | | New controller command "getinfo config-text"Roger Dingledine2009-12-13
|/ / | | | | | | | | It returns the contents that Tor would write if you send it a SAVECONF command, so the controller can write the file to disk itself.
* | Merge commit 'sebastian/coverity'Nick Mathewson2009-12-12
|\ \
| * | Disallow command line keywords with more than two dashes as prefix.Sebastian Hahn2009-10-27
| | | | | | | | | | | | | | | This might help fix cid 422, where coverity fails to notice that argv strings are null-escaped.
| * | Make it more obvious for coverity that cid 404 is not dead codeSebastian Hahn2009-10-27
| | |
* | | Now that FOO_free(NULL) always works, remove checks before calling it.Nick Mathewson2009-12-12
| | |
* | | Make rend_cache_entry_free() typecheck when possible.Nick Mathewson2009-12-12
| | |
* | | *_free functions now accept NULLSebastian Hahn2009-12-12
| |/ |/| | | | | | | | | | | | | Some *_free functions threw asserts when passed NULL. Now all of them accept NULL as input and perform no action when called that way. This gains us consistence for our free functions, and allows some code simplifications where an explicit null check is no longer necessary.
* | Merge commit 'origin/maint-0.2.1'Roger Dingledine2009-11-23
|\ \
| * | fix race condition that can cause crashes at client or exit relayRoger Dingledine2009-11-23
| | | | | | | | | | | | | | | | | | Avoid crashing if the client is trying to upload many bytes and the circuit gets torn down at the same time, or if the flip side happens on the exit relay. Bugfix on 0.2.0.1-alpha; fixes bug 1150.
* | | add a minimum for CircuitStreamTimeout, plus a man pageRoger Dingledine2009-11-22
| | | | | | | | | | | | | | | plus some other unrelated touchups that have been sitting in my sandbox
* | | New config option "CircuitStreamTimeout"Roger Dingledine2009-11-21
| | | | | | | | | | | | | | | | | | | | | New config option "CircuitStreamTimeout" to override our internal timeout schedule for how many seconds until we detach a stream from a circuit and try a new circuit. If your network is particularly slow, you might want to set this to a number like 60.
* | | If somebody tries to overflow my dirport, don't log his IP by default.Roger Dingledine2009-11-21
| | | | | | | | | | | | | | | | | | aka Fix an instance where a Tor directory mirror might accidentally log the IP address of a misbehaving Tor client. Bugfix on 0.1.0.1-rc.
* | | clobber connections with different number than we clobber circuitsRoger Dingledine2009-11-21
| | |
* | | stop assuming that our downcasts have a struct offset of 0Roger Dingledine2009-11-21
| | | | | | | | | | | | shouldn't actually change anything, but who knows.
* | | Not everybody likes debugging printfs as much as INick Mathewson2009-11-18
| | |
* | | Do not report a partially-successful detached signature add as failed.Nick Mathewson2009-11-17
| | | | | | | | | | | | | | | Also, regenerate the detached-signature document whenever any signatures are successfully added.
* | | only complain when rejecting a descriptor if it has contact infoRoger Dingledine2009-11-17
| | |
* | | Fix a memory leak on directory authorities during votingRoger Dingledine2009-11-12
| | | | | | | | | | | | | | | Fix a memory leak on directory authorities during voting that was introduced in 0.2.2.1-alpha. Found via valgrind.
* | | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-11-06
|\| | | | | | | | | | | | | | Conflicts: src/common/tortls.c
| * | Make Tor work with OpenSSL 0.9.8lNick Mathewson2009-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it.
| * | Fix an apparently bogus check; fortunately, it seems to be untriggered.Nick Mathewson2009-10-26
| | |
* | | Fix a URL in a log message.Nick Mathewson2009-11-04
| | |
* | | Implement DisableAllSwap to avoid putting secret info in page files.Jacob Appelbaum2009-10-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit implements a new config option: 'DisableAllSwap' This option probably only works properly when Tor is started as root. We added two new functions: tor_mlockall() and tor_set_max_memlock(). tor_mlockall() attempts to mlock() all current and all future memory pages. For tor_mlockall() to work properly we set the process rlimits for memory to RLIM_INFINITY (and beyond) inside of tor_set_max_memlock(). We behave differently from mlockall() by only allowing tor_mlockall() to be called one single time. All other calls will result in a return code of 1. It is not possible to change DisableAllSwap while running. A sample configuration item was added to the torrc.complete.in config file. A new item in the man page for DisableAllSwap was added. Thanks to Moxie Marlinspike and Chris Palmer for their feedback on this patch. Please note that we make no guarantees about the quality of your OS and its mlock/mlockall implementation. It is possible that this will do nothing at all. It is also possible that you can ulimit the mlock properties of a given user such that root is not required. This has not been extensively tested and is unsupported. I have included some comments for possible ways we can handle this on win32.
* | | Fix bug 1113.Karsten Loesing2009-10-27
| | | | | | | | | | | | Bridges do not use the default exit policy, but reject *:* by default.
* | | Merge commit 'karsten/log-1092'Roger Dingledine2009-10-27
|\ \ \
| * | | Improve log statement when publishing v2 hs desc.Karsten Loesing2009-10-26
| | |/ | |/|
* / | Fix bug 1042.Karsten Loesing2009-10-26
|/ / | | | | | | | | | | If your relay can't keep up with the number of incoming create cells, it would log one warning per failure into your logs. Limit warnings to 1 per minute.
* | Fix an accidentally removed free in 385853a282138a61, and repair a check.Nick Mathewson2009-10-26
| |
* | Merge commit 'karsten/fix-1066-3'Roger Dingledine2009-10-26
|\ \
| * | Fix bug 1066.Karsten Loesing2009-10-26
| | | | | | | | | | | | | | | | | | If all authorities restart at once right before a consensus vote, nobody will vote about "Running", and clients will get a consensus with no usable relays. Instead, authorities refuse to build a consensus if this happens.
* | | Fix/annotate deadcode for CID 402,403Nick Mathewson2009-10-26
| | |