summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
| * | | | | | | | | | | Check for jumping clock in *format_*stats functionsSebastian Hahn2011-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | None of these were real bugs (yet), because the callers made sure everything was fine. Make it more explicit. Suggested by Nick
| * | | | | | | | | | | Add new stats type: descriptor fetch statsSebastian Hahn2011-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is used for the bridge authority currently, to get a better intuition on how many descriptors are actually fetched from it and how many fetches happen in total. Implements ticket 4200.
| * | | | | | | | | | | remove code related to tracking descriptor serving timesSebastian Hahn2011-10-21
|/ / / / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This had broken due to bitrot - it doesn't know about microdescriptors at all, and afaik hasn't generally been used in ages.
* | | | | | | | | | | Merge remote-tracking branch 'rransom-tor/bug4091'Nick Mathewson2011-10-20
|\ \ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | | Check whether a client port is a Unix socket before using its IP addrRobert Ransom2011-10-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bugfix on commit c1ac0695d5bc64b555c345e4be87b18bab3ae56b, not yet in any release. Fixes bug 4091; bug reported by SwissTorHelp.
* | | | | | | | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-20
|\ \ \ \ \ \ \ \ \ \ \ \ | | |_|/ / / / / / / / / | |/| | | | | | | | | |
| * | | | | | | | | | | Merge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2Nick Mathewson2011-10-20
| |\ \ \ \ \ \ \ \ \ \ \
| | * | | | | | | | | | | Free rend_data and intro_key when extra intro circs become general-purposeRobert Ransom2011-10-18
| | | | | | | | | | | | |
* | | | | | | | | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-19
|\ \ \ \ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / / / / | | | / / / / / / / / / / | |_|/ / / / / / / / / / |/| | | | | | | | | | |
| * | | | | | | | | | | Fix crash when changing node restrictions with DNS lookup in progressNick Mathewson2011-10-19
| |/ / / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes bug 4259, bugfix on 0.2.2.25-alpha. Bugfix by "Tey'". Original message by submitter: Changing nodes restrictions using a controller while Tor is doing DNS resolution could makes Tor crashes (on WinXP at least). The problem can be repeated by trying to reach a non-existent domain using Tor: curl --socks4a 127.0.0.1:9050 inexistantdomain.ext .. and changing the ExitNodes parameter through the control port before Tor returns a DNS resolution error (of course, the following command won't work directly if the control port is password protected): echo SETCONF ExitNodes=TinyTurtle | nc -v 127.0.0.1 9051 Using a non-existent domain is needed to repeat the issue so that Tor takes a few seconds for resolving the domain (which allows us to change the configuration). Tor will crash while processing the configuration change. The bug is located in the addressmap_clear_excluded_trackexithosts method which iterates over the entries of the addresses map in order to check whether the changes made to the configuration will impact those entries. When a DNS resolving is in progress, the new_adress field of the associated entry will be set to NULL. The method doesn't expect this field to be NULL, hence the crash.
* | | | | | | | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-13
|\ \ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / /
| * | | | | | | | | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-13
| |\ \ \ \ \ \ \ \ \ \ | | | |/ / / / / / / / | | |/| | | | | | | |
| | * | | | | | | | | Update to the October 2011 GeoIP database.Karsten Loesing2011-10-13
| | | | | | | | | | |
* | | | | | | | | | | Merge branch 'bug3512'Nick Mathewson2011-10-11
|\ \ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | | Stop using addr_port_lookup as an address splitting functionNick Mathewson2011-10-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It's too risky to have a function where if you leave one parameter NULL, it splits up address:port strings, but if you set it, it does hostname resolution.
| * | | | | | | | | | | Change "reverse_lookup_name" functions to refer to "PTR_name"sNick Mathewson2011-10-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Under the new convention, having a tor_addr.*lookup function that doesn't do hostname resolution is too close for comfort. I used this script here, and have made no other changes. s/tor_addr_parse_reverse_lookup_name/tor_addr_parse_PTR_name/g; s/tor_addr_to_reverse_lookup_name/tor_addr_to_PTR_name/g;
| * | | | | | | | | | | Fix names of functions that convert strings to addrsNick Mathewson2011-10-11
|/ / / / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Now let's have "lookup" indicate that there can be a hostname resolution, and "parse" indicate that there wasn't. Previously, we had one "lookup" function that did resolution; four "parse" functions, half of which did resolution; and a "from_str()" function that didn't do resolution. That's confusing and error-prone! The code changes in this commit are exactly the result of this perl script, run under "perl -p -i.bak" : s/tor_addr_port_parse/tor_addr_port_lookup/g; s/parse_addr_port(?=[^_])/addr_port_lookup/g; s/tor_addr_from_str/tor_addr_parse/g; This patch leaves aton and pton alone: their naming convention and behavior is is determined by the sockets API. More renaming may be needed.
* | | | | | | | | | | Fix a bunch of whitespace errorsNick Mathewson2011-10-11
| |_|_|_|_|_|_|/ / / |/| | | | | | | | |
* | | | | | | | | | Merge branch 'prop176-v2'Nick Mathewson2011-10-10
|\ \ \ \ \ \ \ \ \ \
| * | | | | | | | | | Add some points to make it easy to turn off v3 supportNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Changes file for prop176 branchNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Quiet two notices, and spelling mistake cleanupSebastian Hahn2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Fix a few 64bit compiler warningsSebastian Hahn2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Add more log statements for protocol/internal failuresNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Remove auth_challenge field from or_handshake_state_tNick Mathewson2011-10-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We didn't need to record this value; it was already recorded implicitly while computing cell digests for later examination in the authenticate cells.
| * | | | | | | | | | spec conformance: allow only one cert of each typeNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Give tor_cert_get_id_digests() fail-fast behaviorNick Mathewson2011-10-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Right now we can take the digests only of an RSA key, and only expect to take the digests of an RSA key. The old tor_cert_get_id_digests() would return a good set of digests for an RSA key, and an all-zero one for a non-RSA key. This behavior is too error-prone: it carries the risk that we will someday check two non-RSA keys for equality and conclude that they must be equal because they both have the same (zero) "digest". Instead, let's have tor_cert_get_id_digests() return NULL for keys we can't handle, and make its callers explicitly test for NULL.
| * | | | | | | | | | Fix some more issues wrt tor_cert_new found by asnNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Make more safe_str usage happen for new logs in command.cNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Set up network parameters on non-authenticated incoming connectionsNick Mathewson2011-10-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also add some info log messages for the steps of the v3 handshake. Now my test network bootstraps!
| * | | | | | | | | | Make sure we stop putting cells into our hash at the right time.Nick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Bugfixes for authenticate handling and generationNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Fix log message about what cells we are sendingNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | more verbose log for recording an odd cellNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Actually accept cells in SERVER_RENEGOTIATINGNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Generate certificates that enable v3 handshakeNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Allow "finished flushing" during v3 handshakeNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Hook up all of the prop176 code; allow v3 negotiations to actually workNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Remove a no-longer-relevant commentNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Make tor_tls_cert_is_valid check key lengthsNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | New functions to record digests of cells during v3 handshakeNick Mathewson2011-10-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also, free all of the new fields in or_handshake_state_t
| * | | | | | | | | | Implement cert/auth cell readingNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Basic function to write authenticate cellsNick Mathewson2011-10-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also, tweak the cert cell code to send auth certs
| * | | | | | | | | | Function to return peer cert as tor_tls_certNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Add AUTH keys as specified in proposal 176Nick Mathewson2011-10-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Our keys and x.509 certs are proliferating here. Previously we had: An ID cert (using the main ID key), self-signed A link cert (using a shorter-term link key), signed by the ID key Once proposal 176 and 179 are done, we will also have: Optionally, a presentation cert (using the link key), signed by whomever. An authentication cert (using a shorter-term ID key), signed by the ID key. These new keys are managed as part of the tls context infrastructure, since you want to rotate them under exactly the same circumstances, and since they need X509 certificates.
| * | | | | | | | | | Functions to get a public RSA key from a certNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Function to detect certificate types that signal v3 certificatesNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Function to get digests of the certs and their keysNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | More functions to manipulate certs received in cellsNick Mathewson2011-10-10
| | | | | | | | | | |
| * | | | | | | | | | Function to extract the TLSSECRETS field for v3 handshakesNick Mathewson2011-10-10
| | | | | | | | | | |