summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* | | | | | | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-26
|\ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / /
| * | | | | | | | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-26
| |\ \ \ \ \ \ \ \ \ | | |/ / / / / / / /
| | * | | | | | | | Remove the -F option from tor-resolve.Nick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It used to mean "Force": it would tell tor-resolve to ask tor to resolve an address even if it ended with .onion. But when AutomapHostsOnResolve was added, automatically refusing to resolve .onion hosts stopped making sense. So in 0.2.1.16-rc (commit 298dc95dfd8), we made tor-resolve happy to resolve anything. The -F option stayed in, though, even though it didn't do anything. Oddly, it never got documented. Found while fixing GCC 4.6 "set, unused variable" warnings.
| | * | | | | | | | manually backport a5232e0c4cRoger Dingledine2011-10-26
| | | | | | | | | |
* | | | | | | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-26
|\ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / /
| * | | | | | | | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-26
| |\ \ \ \ \ \ \ \ \ | | |/ / / / / / / /
| | * | | | | | | | stop asserting at bootRoger Dingledine2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The patch for 3228 made us try to run init_keys() before we had loaded our state file, resulting in an assert inside init_keys. We had moved it too early in the function. Now it's later in the function, but still above the accounting calls.
| | * | | | | | | | Reinit keys at the start of options_act().Nick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously we did this nearer to the end (in the old_options && transition_affects_workers() block). But other stuff cares about keys being consistent with options... particularly anything which tries to access a key, which can die in assert_identity_keys_ok(). Fixes bug 3228; bugfix on 0.2.2.18-alpha. Conflicts: src/or/config.c
| | * | | | | | | | Don't crash a bridge authority on SIGHUP if it's not in the consensusRobert Ransom2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes bug 2572.
| | * | | | | | | | Fix assert for relay/bridge state changeSebastian Hahn2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433. Conflicts: src/or/config.c
| | * | | | | | | | Don't crash when accountingmax is set in non-server TorsNick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We use a hash of the identity key to seed a prng to tell when an accounting period should end. But thanks to the bug998 changes, clients no longer have server-identity keys to use as a long-term seed in accounting calculations. In any case, their identity keys (as used in TLS) were never never fixed. So we can just set the wakeup time from a random seed instead there. Still open is whether everybody should be random. This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha. Diagnosed with help from boboper on irc.
| | * | | | | | | | Properly refcount client_identity_keySebastian Hahn2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In a2bb0bf we started using a separate client identity key. When we are in "public server mode" (that means not a bridge) we will use the same key. Reusing the key without doing the proper refcounting leads to a segfault on cleanup during shutdown. Fix that. Also introduce an assert that triggers if our refcount falls below 0. That should never happen.
| | * | | | | | | | Add some asserts to get_{tlsclient|server}_identity_keyNick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We now require that: - Only actual servers should ever call get_server_identity_key - If you're being a client or bridge, the client and server keys should differ. - If you're being a public relay, the client and server keys should be the same.
| | * | | | | | | | Rename get_client_identity_key to get_tlsclient_identity_keyNick Mathewson2011-10-26
| | | | | | | | | |
| | * | | | | | | | Maintain separate server and client identity keys when appropriate.Robert Ransom2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes a bug described in ticket #988. Conflicts: src/or/main.c src/or/router.c
| | * | | | | | | | Make crypto_free_pk_env tolerate NULL arg in 0.2.1. Error-proofing against ↵Nick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | bug 988 backport
| | * | | | | | | | Maintain separate server and client TLS contexts.Robert Ransom2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes bug #988. Conflicts: src/or/main.c src/or/router.c
| | * | | | | | | | Refactor tor_tls_context_new:Robert Ransom2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Make tor_tls_context_new internal to tortls.c, and return the new tor_tls_context_t from it. * Add a public tor_tls_context_init wrapper function to replace it. Conflicts: src/or/main.c src/or/router.c
| | * | | | | | | | Add public_server_mode function.Robert Ransom2011-10-26
| | | | | | | | | |
* | | | | | | | | | closer to a changelog for the next alphaRoger Dingledine2011-10-26
| | | | | | | | | |
* | | | | | | | | | Merge branch 'cov_run224_squashed'Nick Mathewson2011-10-26
|\ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | Changelog for recent coverity issuesNick Mathewson2011-10-26
| | | | | | | | | | |
| * | | | | | | | | | Fix memory leak in retry_all_listeners: Coverity CID 485Nick Mathewson2011-10-26
| | | | | | | | | | |
| * | | | | | | | | | Fix memory leak in options_act_reversible: fix Coverity CID 486,487Nick Mathewson2011-10-26
|/ / / / / / / / / /
* | | | | | | | | | Do not tread vpadding cell as versions cell. Not in any released version.Nick Mathewson2011-10-26
| | | | | | | | | |
* | | | | | | | | | Fix a NULL pointer dereference in parse_server_transport_line().George Kadianakis2011-10-26
| | | | | | | | | |
* | | | | | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-26
|\ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / /
| * | | | | | | | | Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2Nick Mathewson2011-10-26
| |\ \ \ \ \ \ \ \ \
| | * | | | | | | | | Make internal error check for unrecognized digest algorithm more robustNick Mathewson2011-10-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes Coverity CID 479.
| | * | | | | | | | | Check return of init_keys() ip_address_changed: fix Coverity CID 484Nick Mathewson2011-10-06
| | | | | | | | | | |
* | | | | | | | | | | Fix a couple of pluggable transport bugsSebastian Hahn2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fix coverity complaints 490, 491 and 492. Especially the one in parse_client_transport_line() could've been a remotely triggerable segfault, I think.
* | | | | | | | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-26
|\ \ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / /
| * | | | | | | | | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-26
| |\ \ \ \ \ \ \ \ \ \ | | | |/ / / / / / / / | | |/| | | | | | | |
| | * | | | | | | | | Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.Nick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | From the code: zlib 1.2.4 and 1.2.5 do some "clever" things with macros. Instead of saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory that nobody will care if the compile outputs a no-such-identifier warning. Sorry, but we like -Werror over here, so I guess we need to define these. I hope that zlib 1.2.6 doesn't break these too. Possible fix for bug 1526.
* | | | | | | | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-25
|\ \ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / /
| * | | | | | | | | | unmangle the fingerprint example in the man pageRoger Dingledine2011-10-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Remove a confusing dollar sign from the example fingerprint in the man page, and also make example fingerprint a valid one.
* | | | | | | | | | | Merge branch 'ticket4294'Nick Mathewson2011-10-25
|\ \ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | | Avoid likely memory fragmentation from rep_hist_note_descs_servedNick Mathewson2011-10-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When you're doing malloc(sizeof(int)), something may well have gone wrong. This technique is a bit abusive, but we're already relying on it working correctly in geoip.c.
| * | | | | | | | | | | Add percentiles to the desc stats reportingSebastian Hahn2011-10-25
|/ / / / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To get a better idea what's going on on Tonga, add some code to report how often the most and least frequently fetched descriptor was fetched, as well as 25, 50, 75 percentile. Also ensure we only count bridge descriptors here.
* | | | | | | | | | | Merge remote-tracking branch 'sebastian/bug4293'Nick Mathewson2011-10-24
|\ \ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | | Don't initialize desc stats for non-bridgedirauth nodesSebastian Hahn2011-10-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also make sure that calling rep_hist_note_desc_served() while stats aren't initialized just returns. Bug spotted by SwissTorHelp. Thanks!
* | | | | | | | | | | | checkpoint: fold in changes filesRoger Dingledine2011-10-24
|/ / / / / / / / / / /
* | | | | | | | | | | bump to 0.2.3.5-alpha-devRoger Dingledine2011-10-23
| | | | | | | | | | |
* | | | | | | | | | | Double-check that we really can get RSA keys from ID/Auth certsNick Mathewson2011-10-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Addresses issue 4287; issue not in any released Tor.
* | | | | | | | | | | Fix a reference-leak in tor_tls_received_v3_certificateNick Mathewson2011-10-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We were calling SSL_get_peer_certificate but not X509_free. This is a major part of bug4252; the bug has been in no released version.
* | | | | | | | | | | Fix memory leak in prop176 codeNick Mathewson2011-10-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes part of bug4252. Bug not in any released version.
* | | | | | | | | | | Merge remote-tracking branch 'rransom-tor/bug3825c'Nick Mathewson2011-10-23
|\ \ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | | Check for intro circ timeouts properlyRobert Ransom2011-10-12
| | |_|_|_|_|_|_|/ / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, we would treat an intro circuit failure as a timeout iff the circuit failed due to a mismatch in relay identity keys. (Due to a bug elsewhere, we only recognize relay identity-key mismatches on the first hop, so this isn't as bad as it could have been.) Bugfix on commit eaed37d14c6e1dc93a392f62ef2e501f75e4878a, not yet in any release.
* | | | | | | | | | | Merge branch 'ticket4200'Nick Mathewson2011-10-21
|\ \ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | | Fix missing word in changes/ticket4200Nick Mathewson2011-10-21
| | | | | | | | | | | |