aboutsummaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAge
* Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-12-04
|\
| * Improved workaround for disabled OpenSSL renegotiation.Martin Peck2009-12-04
| | | | | | | | | | | | | | | | It turns out that OpenSSL 0.9.8m is likely to take a completely different approach for reenabling renegotiation than OpenSSL 0.9.8l did, so we need to work with both. :p Fixes bug 1158. (patch by coderman; commit message by nickm)
* | Merge commit 'origin/maint-0.2.1'Roger Dingledine2009-11-23
|\|
| * fix race condition that can cause crashes at client or exit relayRoger Dingledine2009-11-23
| | | | | | | | | | | | Avoid crashing if the client is trying to upload many bytes and the circuit gets torn down at the same time, or if the flip side happens on the exit relay. Bugfix on 0.2.0.1-alpha; fixes bug 1150.
* | add a minimum for CircuitStreamTimeout, plus a man pageRoger Dingledine2009-11-22
| | | | | | | | | | plus some other unrelated touchups that have been sitting in my sandbox
* | New config option "CircuitStreamTimeout"Roger Dingledine2009-11-21
| | | | | | | | | | | | | | New config option "CircuitStreamTimeout" to override our internal timeout schedule for how many seconds until we detach a stream from a circuit and try a new circuit. If your network is particularly slow, you might want to set this to a number like 60.
* | If somebody tries to overflow my dirport, don't log his IP by default.Roger Dingledine2009-11-21
| | | | | | | | | | | | aka Fix an instance where a Tor directory mirror might accidentally log the IP address of a misbehaving Tor client. Bugfix on 0.1.0.1-rc.
* | clobber connections with different number than we clobber circuitsRoger Dingledine2009-11-21
| |
* | stop assuming that our downcasts have a struct offset of 0Roger Dingledine2009-11-21
| | | | | | | | shouldn't actually change anything, but who knows.
* | bump to 0.2.2.6-alpha-devRoger Dingledine2009-11-21
| |
* | Use the same mlockall checks with tor_set_max_memlockNick Mathewson2009-11-20
| |
* | Fix compilation on OSX 10.3.Nick Mathewson2009-11-20
| | | | | | | | | | | | | | | | | | | | On this OSX version, there is a stub mlockall() function that doesn't work, *and* the declaration for it is hidden by an '#ifdef _P1003_1B_VISIBLE'. This would make autoconf successfully find the function, but our code fail to build when no declaration was found. This patch adds an additional test for the declaration.
* | bump to 0.2.2.6-alphaRoger Dingledine2009-11-19
| |
* | Not everybody likes debugging printfs as much as INick Mathewson2009-11-18
| |
* | Do not report a partially-successful detached signature add as failed.Nick Mathewson2009-11-17
| | | | | | | | | | Also, regenerate the detached-signature document whenever any signatures are successfully added.
* | only complain when rejecting a descriptor if it has contact infoRoger Dingledine2009-11-17
| |
* | Fix compilation with with bionic libc.Jacob Appelbaum2009-11-14
| | | | | | | | | | | | | | | | This fixes bug 1147: bionic doesn't have an actual implementation of mlockall(); mlockall() is merely in the headers but not actually in the library. This prevents Tor compilation with the bionic libc for Android handsets.
* | Fix a memory leak on directory authorities during votingRoger Dingledine2009-11-12
| | | | | | | | | | Fix a memory leak on directory authorities during voting that was introduced in 0.2.2.1-alpha. Found via valgrind.
* | Fix building from a separate build directory.Nick Mathewson2009-11-08
| |
* | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-11-06
|\| | | | | | | | | Conflicts: src/common/tortls.c
| * Make Tor work with OpenSSL 0.9.8lNick Mathewson2009-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it.
| * Fix an apparently bogus check; fortunately, it seems to be untriggered.Nick Mathewson2009-10-26
| |
* | Fix a URL in a log message.Nick Mathewson2009-11-04
| |
* | Implement DisableAllSwap to avoid putting secret info in page files.Jacob Appelbaum2009-10-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit implements a new config option: 'DisableAllSwap' This option probably only works properly when Tor is started as root. We added two new functions: tor_mlockall() and tor_set_max_memlock(). tor_mlockall() attempts to mlock() all current and all future memory pages. For tor_mlockall() to work properly we set the process rlimits for memory to RLIM_INFINITY (and beyond) inside of tor_set_max_memlock(). We behave differently from mlockall() by only allowing tor_mlockall() to be called one single time. All other calls will result in a return code of 1. It is not possible to change DisableAllSwap while running. A sample configuration item was added to the torrc.complete.in config file. A new item in the man page for DisableAllSwap was added. Thanks to Moxie Marlinspike and Chris Palmer for their feedback on this patch. Please note that we make no guarantees about the quality of your OS and its mlock/mlockall implementation. It is possible that this will do nothing at all. It is also possible that you can ulimit the mlock properties of a given user such that root is not required. This has not been extensively tested and is unsupported. I have included some comments for possible ways we can handle this on win32.
* | Fix bug 1113.Karsten Loesing2009-10-27
| | | | | | | | Bridges do not use the default exit policy, but reject *:* by default.
* | Merge commit 'karsten/log-1092'Roger Dingledine2009-10-27
|\ \
| * | Improve log statement when publishing v2 hs desc.Karsten Loesing2009-10-26
| | |
* | | Fix bug 1042.Karsten Loesing2009-10-26
|/ / | | | | | | | | | | If your relay can't keep up with the number of incoming create cells, it would log one warning per failure into your logs. Limit warnings to 1 per minute.
* | Fix an accidentally removed free in 385853a282138a61, and repair a check.Nick Mathewson2009-10-26
| |
* | Merge commit 'karsten/fix-1066-3'Roger Dingledine2009-10-26
|\ \
| * | Fix bug 1066.Karsten Loesing2009-10-26
| | | | | | | | | | | | | | | | | | If all authorities restart at once right before a consensus vote, nobody will vote about "Running", and clients will get a consensus with no usable relays. Instead, authorities refuse to build a consensus if this happens.
* | | Fix/annotate deadcode for CID 402,403Nick Mathewson2009-10-26
| | |
* | | Fix the very noisy unit test memory leak of CID 420-421.Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | On any failing case in test_util_config_line, we would leak a couple of strings.
* | | Fix dead code found by Coverity (CID 419).Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | | | | This was left over from an early draft of the microdescriptor code; it began to populate the signatures array of a networkstatus vote, even though there's no actual need to do that for a vote.
* | | Fix a very stupid coverity complaint (CID 416).Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | | | | In its zeal to keep me from saying memset(x, '0', sizeof(x)), Coverity disallows memset(x, 48, sizeof(x)). Fine. I'll choose a different magic number, see if I care!
* | | Remove checks for array existence. (CID 410..415)Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In C, the code "char x[10]; if (x) {...}" always takes the true branch of the if statement. Coverity notices this now. In some cases, we were testing arrays to make sure that an operation we wanted to do would suceed. Those cases are now always-true. In some cases, we were testing arrays to see if something was _set_. Those caes are now tests for strlen(s), or tests for !tor_mem_is_zero(d,len).
* | | Fix CID 409: check return value of base64_encode in testsNick Mathewson2009-10-26
| | |
* | | Clarification to suppress Coverity CID 405.Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | Every or conn has an outbuf, but coverity has no way of knowing that. Add an assert to ease its conscience.
* | | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-10-26
|\ \ \ | | |/ | |/|
| * | Fix two memory leaks found by Coverity (CIDs 417-418)Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | | | | The first happens on an error case when a controller wants an impossible directory object. The second happens when we can't write our fingerprint file.
| * | Add missing break statements for Coverity CIDs #406,407.Nick Mathewson2009-10-26
| | | | | | | | | | | | | | | | | | The code for these was super-wrong, but will only break things when we reset an option on a platform where sizeof(time_t) is different from sizeof(int).
* | | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-10-26
|\| | | |/ |/| | | | | Conflicts: ChangeLog
| * Only send the if_modified_since header for a v3 consensus.Nick Mathewson2009-10-26
| | | | | | | | | | Spotted by xmux; bugfix on 0.2.0.10-alpha. (Bug introduced by 20b10859)
* | Reduce log level for someone else sending us weak DH keys.Karsten Loesing2009-10-25
| | | | | | | | | | | | | | | | See task 1114. The most plausible explanation for someone sending us weak DH keys is that they experiment with their Tor code or implement a new Tor client. Usually, we don't care about such events, especially not on warn level. If we really care about someone not following the Tor protocol, we can set ProtocolWarnings to 1.
* | clean up the XXX comments around bug 1038Roger Dingledine2009-10-26
| |
* | Fix two bugs found by Coverity scan.Nick Mathewson2009-10-19
| | | | | | | | | | One was a simple buffer overrun; the other was a high-speed pointer collision. Both were introduced by my microdescs branch.
* | Merge branch 'microdesc'Nick Mathewson2009-10-19
|\ \
| * | Fix compile with warnings problems on Snow LeopardSebastian Hahn2009-10-19
| | |
| * | Add functions to serve microdescs and flavored consensuses.Nick Mathewson2009-10-18
| | |
| * | Document the microdescriptor code better.Nick Mathewson2009-10-18
| | |