| Commit message (Expand) | Author | Age |
* | Don't call flush_pending_log_callbacks while logging LD_NOCB messages.•••Found by boboper.
| Robert Ransom | 2010-12-11 |
* | Better fix for 2190: defer libevent->controller messages instead of dropping | Nick Mathewson | 2010-11-19 |
* | Do not send Libevent log messages to a controller.•••Doing so could make Libevent call Libevent from inside a Libevent
logging call, which is a recipe for reentrant confusion and
hard-to-debug crashes. This would especially hurt if Libevent
debug-level logging is enabled AND the user has a controller
watching for low-severity log messages.
Fix bug 2190; fix on 0.1.0.2-rc.
| Nick Mathewson | 2010-11-19 |
* | Fix a unit test broken by fix for 2195 | Nick Mathewson | 2010-11-19 |
*-. | Merge branch 'fix2183', remote branch 'rransom/fix2195-v2' into maint-0.2.2 | Nick Mathewson | 2010-11-19 |
|\ \ |
|
| | * | Fix logic error in router_dump_router_to_string.•••Spotted by Nick Mathewson.
| Robert Ransom | 2010-11-19 |
| | * | Generate a router descriptor even if generating an extra-info descriptor fails.•••Fixes bug #2195.
| Robert Ransom | 2010-11-17 |
| | * | Do not emit an extra-info-digest descriptor line if the digest is zero. | Robert Ransom | 2010-11-17 |
| * | | Add comments to some of the bug2183 fix code | Nick Mathewson | 2010-11-19 |
| * | | Tweak the bugfix for 2183 a bit more. | Karsten Loesing | 2010-11-17 |
| * | | Don't use log_err for non-criticial warnings. | Karsten Loesing | 2010-11-15 |
| * | | Try harder not to exceed the 50 KB extra-info descriptor limit.•••Our checks that we don't exceed the 50 KB size limit of extra-info
descriptors apparently failed. This patch fixes these checks and reserves
another 250 bytes for appending the signature. Fixes bug 2183.
| Karsten Loesing | 2010-11-15 |
| |/ |
|
* | | new development version | Roger Dingledine | 2010-11-16 |
* | | bump to 0.2.2.18-alpha | Roger Dingledine | 2010-11-16 |
* | | warn more about AllowSingleHopExits | Roger Dingledine | 2010-11-16 |
* | | Merge commit 'nickm/1776_redux_v1' into maint-0.2.2 | Roger Dingledine | 2010-11-15 |
|\ \ |
|
| * | | Clean up my 1776 fix a bit•••Sebastian notes (and I think correctly) that one of our ||s should
have been an &&, which simplifies a boolean expression to decide
whether to replace bridges. I'm also refactoring out the negation at
the start of the expression, to make it more readable.
| Nick Mathewson | 2010-11-15 |
| * | | Bulletproof the routerlist manipulation functions to handle reinserting the s... | Nick Mathewson | 2010-11-10 |
| * | | Fix the assert in bug 1776•••In the case where old_router == NULL but sdmap has an entry for the
router, we can currently safely infer that the old_router was not a
bridge. Add an assert to ensure that this remains true, and fix the
logic not to die with the tor_assert(old_router) call.
| Nick Mathewson | 2010-11-02 |
* | | | Move controller event for socks warning into log_unsafe_socks_warning | Nick Mathewson | 2010-11-15 |
* | | | Merge branch 'bug2000_nm_022' into maint-0.2.2 | Nick Mathewson | 2010-11-15 |
|\ \ \ |
|
| * | | | Rate-limit unsafe socks warning•••Pick 5 seconds as the limit. 5 seconds is a compromise here between
making sure the user notices that the bad behaviour is (still) happening
and not spamming their log too much needlessly (the log message is
pretty long). We also keep warning every time if safesocks is
specified, because then the user presumably wants to hear about every
blocked instance.
(This is based on the original patch by Sebastian, then backported to
0.2.2 and with warnings split into their own function.)
| Sebastian Hahn | 2010-11-15 |
| | |/
| |/| |
|
* | | | Merge remote branch 'sebastian/manpagefixups' into maint-0.2.2 | Nick Mathewson | 2010-11-15 |
|\ \ \
| |/ /
|/| | |
|
| * | | Break NoPublish support | Sebastian Hahn | 2010-11-10 |
| * | | Change Natd into NATD in our options.•••Breaking this out of the last commit because this might be more
controversial.
| Sebastian Hahn | 2010-11-10 |
| * | | Synx manpage and source wrt option capitalization•••We had a spelling discrepancy between the manpage and the source code
for some option. Resolve these in favor of the manpage, because it
makes more sense (for example, HTTP should be capitalized).
| Sebastian Hahn | 2010-11-10 |
| * | | Comment out the (unused) RunTesting option•••The code that makes use of the RunTesting option is #if 0, so setting
this option has no effect. Mark the option as obsolete for now, so that
Tor doesn't list it as an available option erroneously.
| Sebastian Hahn | 2010-11-10 |
| * | | Remove the torrc.complete file.•••We haven't been keeping it up to date, and the manpage exists as a
replacement for users who want an overview of all available options.
| Sebastian Hahn | 2010-11-10 |
* | | | Avoid perma-blocking the controller on bug in shrink_freelist•••In all likelihood, this bug would make Tor assert, but if it doesn't,
let's not have two bugs.
| Nick Mathewson | 2010-11-12 |
* | | | Disable logging to control port connections in buf_shrink_freelists.•••If buf_shrink_freelists calls log_warn for some reason, we don't want the log
call itself to throw buf_shrink_freelists further off the rails.
| Robert Ransom | 2010-11-12 |
* | | | Move the original log_info call out of the core of buf_shrink_freelists.•••Sending a log message to a control port can cause Tor to allocate a buffer,
thereby changing the length of the freelist behind buf_shrink_freelists's back,
thereby causing an assertion to fail.
Fixes bug #1125.
| Robert Ransom | 2010-11-12 |
* | | | Merge branch 'maint-0.2.1' into maint-0.2.2 | Roger Dingledine | 2010-11-11 |
|\ \ \ |
|
| * | | | let unpublished bridges learn their ip address too | Roger Dingledine | 2010-11-11 |
* | | | | Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2 | Nick Mathewson | 2010-11-10 |
|\| | |
| |/ /
|/| | |
|
| * | | Enforce multiplicity rules when parsing annotations.•••We would never actually enforce multiplicity rules when parsing
annotations, since the counts array never got entries added to it for
annotations in the token list that got added by earlier calls to
tokenize_string.
Found by piebeer.
| Nick Mathewson | 2010-11-10 |
| * | | Fix a bug where seting allow_annotations==0 only ignores annotations, but doe... | Nick Mathewson | 2010-11-10 |
* | | | move to the november 1 maxmind geoip db | Roger Dingledine | 2010-11-06 |
* | | | Remove delay to become HSDir in privnets | Sebastian Hahn | 2010-10-26 |
| |/
|/| |
|
* | | Properly refcount client_identity_key•••In a2bb0bf we started using a separate client identity key. When we are
in "public server mode" (that means not a bridge) we will use the same
key. Reusing the key without doing the proper refcounting leads to a
segfault on cleanup during shutdown. Fix that.
Also introduce an assert that triggers if our refcount falls below 0.
That should never happen.
| Sebastian Hahn | 2010-10-26 |
* | | Fix a whitespace error | Nick Mathewson | 2010-10-21 |
* | | Merge branch 'bug988-nm' into maint-0.2.2 | Nick Mathewson | 2010-10-21 |
|\ \ |
|
| * | | Add some asserts to get_{tlsclient|server}_identity_key•••We now require that:
- Only actual servers should ever call get_server_identity_key
- If you're being a client or bridge, the client and server keys should
differ.
- If you're being a public relay, the client and server keys
should be the same.
| Nick Mathewson | 2010-10-21 |
| * | | Rename get_client_identity_key to get_tlsclient_identity_key | Nick Mathewson | 2010-10-21 |
| * | | Maintain separate server and client identity keys when appropriate.•••Fixes a bug described in ticket #988.
| Robert Ransom | 2010-10-04 |
| * | | Maintain separate server and client TLS contexts.•••Fixes bug #988.
| Robert Ransom | 2010-10-04 |
| * | | Refactor tor_tls_context_new:•••* Make tor_tls_context_new internal to tortls.c, and return the new
tor_tls_context_t from it.
* Add a public tor_tls_context_init wrapper function to replace it.
| Robert Ransom | 2010-10-04 |
| * | | Add public_server_mode function. | Robert Ransom | 2010-10-04 |
* | | | Fix a remaining bug in Robert's bug1859 fix.•••When intro->extend_info is created for an introduction point, it
only starts out with a nickname, not necessarily an identity digest.
Thus, doing router_get_by_digest isn't necessarily safe.
| Nick Mathewson | 2010-10-21 |
* | | | Merge remote branch 'hoganrobert/bug1859' into maint-0.2.2 | Nick Mathewson | 2010-10-21 |
|\ \ \ |
|
| * | | | Issues with router_get_by_nickname()•••https://trac.torproject.org/projects/tor/ticket/1859
Use router_get_by_digest() instead of router_get_by_hexdigest()
in circuit_discard_optional_exit_enclaves() and
rend_client_get_random_intro(), per Nick's comments.
Using router_get_by_digest() in rend_client_get_random_intro() will
break hidden services published by Tor versions pre 0.1.2.18 and
0.2.07-alpha as they only publish by nickname. This is acceptable
however as these versions only publish to authority tor26 and
don't work for versions in the 0.2.2.x series anyway.
| Robert Hogan | 2010-10-17 |