summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2011-06-17 03:31:59 -0400
committerRoger Dingledine <arma@torproject.org>2011-06-17 03:31:59 -0400
commit64bfbcb918a59edf8e7167954171f311d032fc4b (patch)
treee811c71eb98cbe88531b23e090ef6a0f7af2344d
parenta25c0a5bf81768c4d4f6fe377cea48f47333a8c8 (diff)
downloadtor-64bfbcb918a59edf8e7167954171f311d032fc4b.tar.gz
tor-64bfbcb918a59edf8e7167954171f311d032fc4b.zip
log when we finish ssl handshake and move to renegotiation
debug-level since it will be quite common. logged at both client and server side. this step should help us track what's going on with people filtering tor connections by our ssl habits.
-rw-r--r--src/or/connection_or.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/src/or/connection_or.c b/src/or/connection_or.c
index ed174c922e..c019f6592b 100644
--- a/src/or/connection_or.c
+++ b/src/or/connection_or.c
@@ -929,13 +929,16 @@ connection_tls_continue_handshake(or_connection_t *conn)
if (! tor_tls_used_v1_handshake(conn->tls)) {
if (!tor_tls_is_server(conn->tls)) {
if (conn->_base.state == OR_CONN_STATE_TLS_HANDSHAKING) {
- // log_notice(LD_OR,"Done. state was TLS_HANDSHAKING.");
+ log_debug(LD_OR, "Done with initial SSL handshake (client-side). "
+ "Requesting renegotiation.");
conn->_base.state = OR_CONN_STATE_TLS_CLIENT_RENEGOTIATING;
goto again;
}
// log_notice(LD_OR,"Done. state was %d.", conn->_base.state);
} else {
/* improved handshake, but not a client. */
+ log_debug(LD_OR, "Done with initial SSL handshake (server-side). "
+ "Expecting renegotiation.");
tor_tls_set_renegotiate_callback(conn->tls,
connection_or_tls_renegotiated_cb,
conn);