aboutsummaryrefslogtreecommitdiff
path: root/src/or
Commit message (Collapse)AuthorAge
* Implement 'safe cookie authentication'Robert Ransom2012-02-22
|
* Properly protect paths to sed, sha1sum, opensslSebastian Hahn2012-02-10
| | | | | | in Makefile.am, we used it without quoting it, causing build failure if your openssl/sed/sha1sum happened to live in a directory with a space in it (very common on windows)
* Downgrade "missing a certificate" from notice to infoNick Mathewson2012-02-10
| | | | | | | It was apparently getting mistaken for a problem, even though it was at notice. Fixes 5067; fix on 0.2.0.10-alpha.
* Fix a trivial log message error in renservice.cNick Mathewson2012-01-09
| | | | | | Fixes bug 4856; bugfix on 0.0.6 This bug was introduced in 79fc5217, back in 2004.
* when the consensus fails, list which dir auths were in or outRoger Dingledine2012-01-08
|
* nickname, not identity fingerprint, will help moreRoger Dingledine2012-01-08
|
* tell me who votes are actually for, not just where they're fromRoger Dingledine2012-01-08
|
* Fix spelling in a controlsocket log msgSebastian Hahn2011-12-30
| | | | Fixes bug 4803.
* Merge remote-tracking branch 'public/bug4788' into maint-0.2.2Nick Mathewson2011-12-28
|\
| * Authorities reject insecure Tors.Nick Mathewson2011-12-27
| | | | | | | | | | | | This patch should make us reject every Tor that was vulnerable to CVE-2011-0427. Additionally, it makes us reject every Tor that couldn't handle RELAY_EARLY cells, which helps with proposal 110 (#4339).
* | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-12-28
|\ \ | |/ |/|
| * Bug 4786 fix: don't convert EARLY to RELAY on v1 connectionsNick Mathewson2011-12-28
| | | | | | | | | | | | We used to do this as a workaround for older Tors, but now it's never the correct thing to do (especially since anything that didn't understand RELAY_EARLY is now deprecated hard).
* | Do not even try to keep going on a socket with socklen==0Nick Mathewson2011-12-21
| | | | | | | | | | | | | | | | | | | | Back in #1240, r1eo linked to information about how this could happen with older Linux kernels in response to nmap. Bugs #4545 and #4547 are about how our approach to trying to deal with this condition was broken and stupid. Thanks to wanoskarnet for reminding us about #1240. This is a fix for the abovementioned bugs, and is a bugfix on 0.1.0.3-rc.
* | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-12-15
|\|
| * Add a fix for the buf_pullup bug that Vektor reportedNick Mathewson2011-12-15
| |
* | Don't call tor_tls_set_logged_address till after checking conn->tlsNick Mathewson2011-12-02
| | | | | | | | Fixes bug 4531; partial backport of e27a26d5.
* | Fix a compile warning on 64bit OS XSebastian Hahn2011-11-23
| | | | | | | | | | | | Backport of 68475fc5c5a806ebbb5657de1667dab2c3e09b7c which accidentally only made it into master. Fixes bug 4547. Bug isn't in any released version.
* | parameterize bw cutoffs to guarantee Fast and Guard flagsRoger Dingledine2011-11-21
| | | | | | | | | | Now it will be easier for researchers to simulate Tor networks with different values. Resolves ticket 4484.
* | Merge branch 'bug4518' into maint-0.2.2Nick Mathewson2011-11-21
|\ \
| * | Only call cull_wedged_cpuworkers once every 60 seconds.Nick Mathewson2011-11-19
| | | | | | | | | | | | | | | | | | | | | | | | | | | The function is over 10 or 20% on some of Moritz's profiles, depending on how you could. Since it's checking for a multi-hour timeout, this is safe to do. Fixes bug 4518.
* | | Merge remote-tracking branch 'public/bug3963' into maint-0.2.2Nick Mathewson2011-11-21
|\ \ \
| * | | All NT service configuration commands should make the process exit.Nick Mathewson2011-09-08
| | | | | | | | | | | | | | | | Fixes bug 3963; fix on 0.2.0.7-alpha.
* | | | Don't log about stats when running as a client without geoipSebastian Hahn2011-11-19
| |/ / |/| | | | | | | | | | | | | | | | | | | | | | | Completely disable stats if we aren't running as a relay. We won't collect any anyway, so setting up the infrastructure for them and logging about them is wrong. This also removes a confusing log message that clients without a geoip db would have seen. Fixes bug 4353.
* | | Use real_addr in send_netinfoNick Mathewson2011-11-14
| | | | | | | | | | | | Reported by "troll_un"; bugfix on 0.2.0.10-alpha; fixes bug 4349.
* | | Include HiddenServiceDir in some warning messagesRobert Ransom2011-11-07
| | |
* | | Merge branch 'bug4424' into maint-0.2.2Nick Mathewson2011-11-07
|\ \ \
| * | | Remove an extraneous "if" in the 4424 fixNick Mathewson2011-11-07
| | | |
| * | | Don't leak an extend_info_t in rend_client_any_intro_points_usableRobert Ransom2011-11-07
| | | |
* | | | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson2011-11-07
|\ \ \ \ | |/ / / |/| | / | | |/ | |/|
| * | Fix remotely triggerable assert during ip decryptionDan Rosenberg2011-11-06
| | | | | | | | | | | | Fixes bug 4410.
* | | Fix a memleak when fetching descriptors for bridges in ExcludeNodes.George Kadianakis2011-11-03
| | |
* | | Disable stats requiring geoip info if we have noneSebastian Hahn2011-10-29
| | | | | | | | | | | | | | | In other parts of the code we will otherwise attempt to collect these statistics, and that will lead to crashes.
* | | Discard all cells on a marked connectionNick Mathewson2011-10-28
| | | | | | | | | | | | Fix for bug 4299
* | | Fix typo, spotted by tmpname0901. Thanks!Sebastian Hahn2011-10-28
| | |
* | | Add option to give guard flag to relays without the CVE-2011-2768 fixRobert Ransom2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | This way, all of the DA operators can upgrade immediately, without nuking every client's set of entry guards as soon as a majority of them upgrade. Until enough guards have upgraded, a majority of dirauths should set this config option so that there are still enough guards in the network. After a few days pass, all dirauths should use the default.
* | | Don't give the Guard flag to relays without the CVE-2011-2768 fixRobert Ransom2011-10-26
| | |
* | | Make tor_version_same_series non-staticRobert Ransom2011-10-26
| | |
* | | Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfixSebastian Hahn2011-10-26
|\| | | | | | | | | | | | | | Conflicts: src/or/connection_or.c
| * | Reject create cells on outgoing OR connections from bridgesRobert Ransom2011-10-26
| | |
| * | Mark which OR connections are outgoingRobert Ransom2011-10-26
| | |
| * | Don't use any OR connection which sent us a CREATE_FAST cell for an EXTENDRobert Ransom2011-10-26
| | | | | | | | | | | | Fix suggested by Nick Mathewson.
| * | manually backport a5232e0c4cRoger Dingledine2011-10-26
| | |
| * | stop asserting at bootRoger Dingledine2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | The patch for 3228 made us try to run init_keys() before we had loaded our state file, resulting in an assert inside init_keys. We had moved it too early in the function. Now it's later in the function, but still above the accounting calls.
| * | Reinit keys at the start of options_act().Nick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously we did this nearer to the end (in the old_options && transition_affects_workers() block). But other stuff cares about keys being consistent with options... particularly anything which tries to access a key, which can die in assert_identity_keys_ok(). Fixes bug 3228; bugfix on 0.2.2.18-alpha. Conflicts: src/or/config.c
| * | Don't crash a bridge authority on SIGHUP if it's not in the consensusRobert Ransom2011-10-26
| | | | | | | | | | | | Fixes bug 2572.
| * | Fix assert for relay/bridge state changeSebastian Hahn2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433. Conflicts: src/or/config.c
| * | Don't crash when accountingmax is set in non-server TorsNick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We use a hash of the identity key to seed a prng to tell when an accounting period should end. But thanks to the bug998 changes, clients no longer have server-identity keys to use as a long-term seed in accounting calculations. In any case, their identity keys (as used in TLS) were never never fixed. So we can just set the wakeup time from a random seed instead there. Still open is whether everybody should be random. This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha. Diagnosed with help from boboper on irc.
| * | Properly refcount client_identity_keySebastian Hahn2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In a2bb0bf we started using a separate client identity key. When we are in "public server mode" (that means not a bridge) we will use the same key. Reusing the key without doing the proper refcounting leads to a segfault on cleanup during shutdown. Fix that. Also introduce an assert that triggers if our refcount falls below 0. That should never happen.
| * | Add some asserts to get_{tlsclient|server}_identity_keyNick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | We now require that: - Only actual servers should ever call get_server_identity_key - If you're being a client or bridge, the client and server keys should differ. - If you're being a public relay, the client and server keys should be the same.
| * | Rename get_client_identity_key to get_tlsclient_identity_keyNick Mathewson2011-10-26
| | |