summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* sandboxing: allow writing to stats/hidserv-statsbug19557Peter Palfrader2016-07-03
| | | | | | Our sandboxing code would not allow us to write to stats/hidserv-stats, causing tor to abort while trying to write stats. This was previously masked by bug#19556.
* Note which bug this fixes in the changes entrybug19556Peter Palfrader2016-07-03
|
* sandboxing: allow open() of stats dirPeter Palfrader2016-07-03
| | | | | | | | When sandboxing is enabled, we could not write any stats to disk. check_or_create_data_subdir("stats"), which prepares the private stats directory, calls check_private_dir(), which also opens and not just stats() the directory. Therefore, we need to also allow open() for the stats dir in our sandboxing setup.
* When tor can't find a directory, log lessteor (Tim Wilson-Brown)2016-07-01
|
* Merge branch 'bug19071-extra-squashed' into maint-0.2.8Nick Mathewson2016-06-28
|\
| * Comment-out fallbacks in a way the stem fallback parser understandsteor (Tim Wilson-Brown)2016-06-28
| | | | | | | | | | | | | | | | If we manually remove fallbacks in C by adding '/*' and '*/' on separate lines, stem still parses them as being present, because it only looks at the start of a line. Add a comment to this effect in the generated source code.
| * Whitelist a fallback's new IPv6 addressteor (Tim Wilson-Brown)2016-06-23
| | | | | | | | | | The IPv4-only entry will be used for 0.2.8. The IPv4 and IPv6 entry will be considered in 0.2.9.
| * Remove a fallback that changed DirPortteor (Tim Wilson-Brown)2016-06-23
| | | | | | | | | | The operator has confirmed that the DirPort change is perament. The relay will be reconsidered as a fallback in 0.2.9.
* | whitespace fixesNick Mathewson2016-06-28
| |
* | Merge remote-tracking branch 'teor/bug18812' into maint-0.2.8Nick Mathewson2016-06-28
|\ \
| * | Resolve bug18812 by logging fallback key changes at info levelteor (Tim Wilson-Brown)2016-06-28
| | |
| * | Make it clear that fallbacks include authoritiesteor (Tim Wilson-Brown)2016-06-28
| | | | | | | | | | | | Comment-only change
| * | Refactor connection_or_client_learned_peer_id for bug18812teor (Tim Wilson-Brown)2016-06-28
| | | | | | | | | | | | | | | No behavioural change. Also clarify some comments.
* | | Bug19499: Fix GCC warnings when building against bleeding edge OpenSSL.Yawning Angel2016-06-24
| |/ |/| | | | | | | The previous version of the new accessors didn't specify const but it was changed in master.
* | Changes file for 19071 and 19480teor (Tim Wilson-Brown)2016-06-22
| |
* | Remove and blacklist 3 fallbacks which disappearedteor (Tim Wilson-Brown)2016-06-22
| | | | | | | | Blacklist them in case they appear again.
* | Remove 2 fallbacks: one lost guard, the other had bad uptimeteor (Tim Wilson-Brown)2016-06-22
| | | | | | | | Leave these fallbacks in the whitelist, they may improve before 0.2.9.
* | Remove and blacklist 4 fallbacks which are unsuitableteor (Tim Wilson-Brown)2016-06-22
| | | | | | | | | | | | | | | | | | | | | | | | | | Remove a fallback that changed its fingerprint after it was listed This happened after to a software update: https://lists.torproject.org/pipermail/tor-relays/2016-June/009473.html Remove a fallback that changed IPv4 address Remove two fallbacks that were slow to deliver consensuses, we can't guarantee they'll be fast in future. Blacklist all these fallbacks until operators confirm they're stable.
* | Update the fallback whitelist and blacklistteor (Tim Wilson-Brown)2016-06-22
| | | | | | | | | | | | | | Operators have sent emails asking to have their relays added or removed from the fallback list. Since none of the blacklisted relays are in the hard-coded falback list, it does not need to be changed.
* | Avoid errors in updateFallbackDirs.py when there are no fallbacksteor (Tim Wilson-Brown)2016-06-22
| |
* | Document how to test the hard-coded fallback listteor (Tim Wilson-Brown)2016-06-22
| |
* | Remove useless message about nonexistent onion services after uploading a ↵Ivan Markin2016-06-21
| | | | | | | | descriptor
* | Fix bug when disabling heartbeats.George Kadianakis2016-06-21
| | | | | | | | Callbacks can't return 0.
* | Bump to 0.2.8.4-rc-devNick Mathewson2016-06-15
| |
* | bump version to 0.2.8.4-rcNick Mathewson2016-06-14
| |
* | Resolve the remaining openssl "-Wredundant-decls" warnings.Nick Mathewson2016-06-14
| | | | | | | | Another part of 19406
* | Suppress the Wredundant-decls warning in another set of openssl headersNick Mathewson2016-06-14
| |
* | Bug 19406: Add a changes file.Yawning Angel2016-06-14
| |
* | Bug 19406: Fix the unit tests to work with OpenSSL 1.1.xYawning Angel2016-06-14
| | | | | | | | | | Just as it says on the tin. Don't need to fully disable any tests and reduce coverage either. Yay me.
* | Bug 19406: OpenSSL removed SSL_R_RECORD_TOO_LARGE in 1.1.0.Yawning Angel2016-06-14
| | | | | | | | | | | | This is a logging onlu change, we were suppressing the severity down to INFO when it occured (treating it as "Mostly harmless"). Now it is no more.
* | Bug 19406: OpenSSL made RSA and DH opaque in 1.1.0.Yawning Angel2016-06-14
| | | | | | | | | | | | | | | | | | There's accessors to get at things, but it ends up being rather cumbersome. The only place where behavior should change is that the code will fail instead of attempting to generate a new DH key if our internal sanity check fails. Like the previous commit, this probably breaks snapshots prior to pre5.
* | Bug 19406: OpenSSL changed the Thread API in 1.1.0 again.Yawning Angel2016-06-14
| | | | | | | | | | | | | | | | Instead of `ERR_remove_thread_state()` having a modified prototype, it now has the old prototype and a deprecation annotation. Since it's pointless to add extra complexity just to remain compatible with an old OpenSSL development snapshot, update the code to work with 1.1.0pre5 and later.
* | lintChanges fixesNick Mathewson2016-06-13
| |
* | Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson2016-06-13
|\ \
| * \ Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson2016-06-13
| |\ \
| | * \ Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson2016-06-13
| | |\ \
| | | * \ Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson2016-06-13
| | | |\ \
| | | | * | Update geoip and geoip6 to the June 7 2016 database.Karsten Loesing2016-06-12
| | | | | |
* | | | | | Merge remote-tracking branch 'public/bug19203_027' into maint-0.2.8Nick Mathewson2016-06-11
|\ \ \ \ \ \
| * | | | | | Fix a warning on unnamed nodes in node_get_by_nickname().Nick Mathewson2016-05-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | There was a > that should have been an ==, and a missing !. These together prevented us from issuing a warning in the case that a nickname matched an Unnamed node only. Fixes bug 19203; bugfix on 0.2.3.1-alpha.
* | | | | | | Use directory_must_use_begindir to predict we'll surely use begindirNick Mathewson2016-06-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, we used !directory_fetches_from_authorities() to predict that we would tunnel connections. But the rules have changed somewhat over the course of 0.2.8
* | | | | | | Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson2016-06-02
|\ \ \ \ \ \ \ | | |/ / / / / | |/| | | | |
| * | | | | | Use tor_sscanf, not sscanf, in test_util.c.Nick Mathewson2016-06-02
| |/ / / / / | | | | | | | | | | | | | | | | | | | | | | | | Fixes the 0.2.7 case of bug #19213, which prevented mingw64 from working.
* | | | | | Bump to 0.2.8.3-alpha-devNick Mathewson2016-05-26
| | | | | |
* | | | | | Bump to 0.2.8.3-alphaNick Mathewson2016-05-26
| | | | | |
* | | | | | Fix two long linesNick Mathewson2016-05-26
| | | | | |
* | | | | | Merge branch 'bug18668_028' into maint-0.2.8Nick Mathewson2016-05-25
|\ \ \ \ \ \
| * | | | | | Initialize networking _before_ initializing libevent in the testsNick Mathewson2016-05-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This prevents WSANOTINITIALISED errors and fixes bug 18668. Bugfix on 0.2.8.1-alpha -- 1bac468882fd732460d8a25735131 specifically.
* | | | | | | Merge branch 'bug19175_028_v2' into maint-0.2.8Nick Mathewson2016-05-25
|\ \ \ \ \ \ \
| * | | | | | | Fix a double-free bug in routerlist_reparse_oldNick Mathewson2016-05-25
|/ / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I introduced this bug when I moved signing_key_cert into signed_descriptor_t. Bug not in any released Tor. Fixes bug 19175, and another case of 19128. Just like signed_descriptor_from_routerinfo(), routerlist_reparse_old() copies the fields from one signed_descriptor_t to another, and then clears the fields from the original that would have been double-freed by freeing the original. But when I fixed the s_d_f_r() bug [#19128] in 50cbf220994c7cec593, I missed the fact that the code was duplicated in r_p_o(). Duplicated code strikes again! For a longer-term solution here, I am not only adding the missing fix to r_p_o(): I am also extracting the duplicated code into a new function. Many thanks to toralf for patiently sending me stack traces until one made sense.