aboutsummaryrefslogtreecommitdiff
path: root/src/or
Commit message (Collapse)AuthorAge
* Don't crash a bridge authority on SIGHUP if it's not in the consensusRobert Ransom2011-02-16
| | | | Fixes bug 2572.
* Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-02-11
|\
| * fix the other half of bug 1074Roger Dingledine2011-02-10
| |
| * Make the DH parameter we use for TLS match the one from Apache's mod_sslNick Mathewson2011-02-10
| | | | | | | | | | | | | | | | Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance. (Backport from 0.2.2's 5ed73e3807d90dd0a3)
* | Merge branch 'bug2408-v2-021-common' into bug2408-v2-022Robert Ransom2011-02-09
|\|
| * Ignore and warn about "PublishServerDescriptor hidserv"Robert Ransom2011-02-09
| | | | | | | | Fixes #2408.
* | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-02-08
|\|
| * move the clause above the "if bw is too low" checkRoger Dingledine2011-02-07
| |
| * dtrt when only relaybandwidthburst is setRoger Dingledine2011-02-07
| | | | | | | | fixes bug 2470
* | Merge branch 'bug2279' into maint-0.2.2Nick Mathewson2011-02-07
|\ \
| * | Some cleanups to bug2279 messages/docs from rransomNick Mathewson2011-02-07
| | |
| * | Add an option to disable the block-private-addresses featureNick Mathewson2011-01-26
| | | | | | | | | | | | Suggested by rransom. Probably necessary for testing network mode.
| * | Add client code to detect attempts to connect to 127.0.0.1 etcNick Mathewson2011-01-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We detect and reject said attempts if there is no chosen exit node or circuit: connecting to a private addr via a randomly chosen exit node will usually fail (if all exits reject private addresses), is always ill-defined (you're not asking for any particular host or service), and usually an error (you've configured all requests to go over Tor when you really wanted to configure all _remote_ requests to go over Tor). This can also help detect forwarding loop requests. Found as part of bug2279.
| * | Fix double-mark bug when failing to init transparent connectionNick Mathewson2011-01-25
| | | | | | | | | | | | Fixes part of bug 2279. Bugfix on 0.1.2.1-alpha.
* | | Merge branch 'bug2203_rebased' into maint-0.2.2Nick Mathewson2011-02-04
|\ \ \
| * | | Fix authority side of 2203.Mike Perry2011-01-25
| | | | | | | | | | | | | | | | Do not add Exit bandwidth to E if BadExit is set.
| * | | Fix client side of 2203: Do not count BadExits as Exits.Mike Perry2011-01-25
| | | |
* | | | Enable ASLR and permanent DEP for Windows executablesJohn Brooks2011-02-03
| | | | | | | | | | | | | | | | Fix for #2358
* | | | Merge remote branch 'public/bug2378' into maint-0.2.2Nick Mathewson2011-02-03
|\ \ \ \
| * | | | Handle failing cases of DH allocationNick Mathewson2011-01-25
| | |/ / | |/| |
* | | | Merge branch 'bug2181' into maint-0.2.2Nick Mathewson2011-01-26
|\ \ \ \
| * | | | Log more about soft-hibernationNick Mathewson2011-01-25
| |/ / /
* | | | Merge branch 'bug2409' into maint-0.2.2Nick Mathewson2011-01-26
|\ \ \ \
| * | | | Fix bug in verifying directory signatures with short digestsNick Mathewson2011-01-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If we got a signed digest that was shorter than the required digest length, but longer than 20 bytes, we would accept it as long enough.... and then immediately fail when we want to check it. Fixes bug 2409; bug in 0.2.2.20-alpha; found by piebeer.
* | | | | Merge branch 'bug2321' into maint-0.2.2Nick Mathewson2011-01-26
|\ \ \ \ \ | |_|/ / / |/| | | |
| * | | | Avoid sketchy integer cast in cbt codeNick Mathewson2011-01-26
| |/ / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When calling circuit_build_times_shuffle_and_store_array, we were passing a uint32_t as an int. arma is pretty sure that this can't actually cause a bug, because of checks elsewhere in the code, but it's best not to pass a uint32_t as an int anyway. Found by doorss; fix on 0.2.2.4-alpha.
* | / / Comment remaining CBT functions.Mike Perry2011-01-25
| |/ / |/| | | | | | | | | | | | | | Left circuit_build_times_get_bw_scale() uncommented because it is in the wrong place due to an improper bug2317 fix. It needs to be moved and renamed, as it is not a cbt parameter.
* | | Fix bug #2004 by demoting a log message.Mike Perry2011-01-25
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | To quote arma: "So instead of stopping your CBT from screaming, you're just going to throw it in the closet and hope you can't hear it?" Yep. The log message can happen because at 95% point on the curve, we can be way beyond the max timeout we've seen, if the curve has few points and is shallow. Also applied Nick's rule of thumb for rewriting some other notice log messages to read like how you would explain them to a raving lunatic on #tor who was shouting at you demanding what they meant. Hopefully the changes live up to that standard.
* | Tell which geoip file we're parsingSebastian Hahn2011-01-25
| |
* | Fix assert for relay/bridge state changeSebastian Hahn2011-01-25
| | | | | | | | | | | | | | | | | | When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433.
* | Make the DH parameter we use for TLS match the one from Apache's mod_sslNick Mathewson2011-01-24
| | | | | | | | | | | | Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance.
* | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-20
|\|
| * Merge remote branch 'rransom/policy_summarize-assert' into maint-0.2.1Nick Mathewson2011-01-20
| |\
| | * Fix bounds-checking in policy_summarizeRobert Ransom2011-01-20
| | | | | | | | | | | | Found by piebeer.
* | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-19
|\| |
| * | Oops; actually add the code to the last patch. :/Nick Mathewson2011-01-19
| |/
* | Merge commit 'sebastian/bug2317' into maint-0.2.2Roger Dingledine2011-01-15
|\ \
| * | Tighten accepted circwindow parametersSebastian Hahn2011-01-15
| | | | | | | | | | | | Based on discussion in bug 2317, these values seem to be sane.
| * | Provide constant limits for all consensus paramsSebastian Hahn2011-01-15
| | | | | | | | | | | | | | | This addresses Nick's concern about doing non-constant bounds checking inside networkstatus_get_param().
| * | Sanity-check consensus param valuesSebastian Hahn2011-01-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We need to make sure that the worst thing that a weird consensus param can do to us is to break our Tor (and only if the other Tors are reliably broken in the same way) so that the majority of directory authorities can't pull any attacks that are worse than the DoS that they can trigger by simply shutting down. One of these worse things was the cbtnummodes parameter, which could lead to heap corruption on some systems if the value was sufficiently large. This commit fixes this particular issue and also introduces sanity checking for all consensus parameters.
| * | Make get_net_param_from_list() staticSebastian Hahn2011-01-15
| | | | | | | | | | | | | | | This prepares for making the accessor method for consensus parameters safer in the next commit.
* | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\ \ \ | |/ / |/| / | |/
| * Fix a couple of non-cleared key issues in hidden servicesNick Mathewson2011-01-15
| | | | | | | | we need to do more hunting, but this fixes the ones mentioned in 2385.
* | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\| | | | | | | | | | | Conflicts: src/or/routerparse.c src/or/test.c
| * Merge branch 'bug2352_obsize' into maint-0.2.1Nick Mathewson2011-01-15
| |\
| | * catch another overlong malloc possibility. found by cypherpunksNick Mathewson2011-01-15
| | |
| | * Impose maximum sizes on parsed objectsNick Mathewson2011-01-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | An object, you'll recall, is something between -----BEGIN----- and -----END----- tags in a directory document. Some of our code, as doorss has noted in bug 2352, could assert if one of these ever overflowed SIZE_T_CEILING but not INT_MAX. As a solution, I'm setting a maximum size on a single object such that neither of these limits will ever be hit. I'm also fixing the INT_MAX checks, just to be sure.
| | * Add logic in routerparse to not read overlong private keysNick Mathewson2011-01-10
| | | | | | | | | | | | | | | I am not at all sure that it is possible to trigger a bug here, but better safe than sorry.
* | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-01-15
|\| |
| * | Add missing check for hostname answer_len in dnsserv sizeNick Mathewson2011-01-15
| | | | | | | | | | | | This is checked elsewhere too, but let's be RFC-conformant.