Age | Commit message (Collapse) | Author | |
---|---|---|---|
2011-11-19 | Don't log about stats when running as a client without geoip | Sebastian Hahn | |
Completely disable stats if we aren't running as a relay. We won't collect any anyway, so setting up the infrastructure for them and logging about them is wrong. This also removes a confusing log message that clients without a geoip db would have seen. Fixes bug 4353. | |||
2011-11-16 | Merge branch 'bug4457_022' into maint-0.2.2 | Nick Mathewson | |
2011-11-14 | Use real_addr in send_netinfo | Nick Mathewson | |
Reported by "troll_un"; bugfix on 0.2.0.10-alpha; fixes bug 4349. | |||
2011-11-14 | Detect failure from event_init() or event_base_new_with_config() | Nick Mathewson | |
2011-11-14 | Use the EVENT_BASE_FLAG_NOLOCK flag to prevent socketpair() invocation | Nick Mathewson | |
In Tor 0.2.2, we never need the event base to be notifiable, since we don't call it from other threads. This is a workaround for bug 4457, which is not actually a Tor bug IMO. | |||
2011-11-14 | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2 | Nick Mathewson | |
2011-11-14 | Merge remote-tracking branch 'karsten/geoip-november2011' into maint-0.2.1 | Nick Mathewson | |
2011-11-09 | Merge remote-tracking branch 'rransom-tor/bug4426' into maint-0.2.2 | Nick Mathewson | |
2011-11-09 | Don't warn when compiling with --disable-threads | Sebastian Hahn | |
STMT_VOID semantics suggested by nick, thanks! | |||
2011-11-07 | Include HiddenServiceDir in some warning messages | Robert Ransom | |
2011-11-07 | Robert says that this bug was not in fact one of frosty's | Nick Mathewson | |
2011-11-07 | Merge branch 'bug4424' into maint-0.2.2 | Nick Mathewson | |
2011-11-07 | Remove an extraneous "if" in the 4424 fix | Nick Mathewson | |
2011-11-07 | Don't leak an extend_info_t in rend_client_any_intro_points_usable | Robert Ransom | |
2011-11-07 | Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2 | Nick Mathewson | |
2011-11-07 | Update to the November 2011 GeoIP database. | Karsten Loesing | |
2011-11-06 | Add a changes file for 4410 | Sebastian Hahn | |
2011-11-06 | Fix remotely triggerable assert during ip decryption | Dan Rosenberg | |
Fixes bug 4410. | |||
2011-11-03 | Merge branch 'bug4383_nm' into maint-0.2.2 | Nick Mathewson | |
2011-11-03 | Fix a memleak when fetching descriptors for bridges in ExcludeNodes. | George Kadianakis | |
2011-10-30 | Merge remote-tracking branch 'erinn/win-bundle-fix' into maint-0.2.2 | Nick Mathewson | |
2011-10-31 | remove absolute path from contrib/package_nsis-mingw.sh in order to make it ↵ | Erinn Clark | |
easier to automatically build tor expert bundle | |||
2011-10-29 | Add a changes file for the 4340 fix | Sebastian Hahn | |
2011-10-29 | Disable stats requiring geoip info if we have none | Sebastian Hahn | |
In other parts of the code we will otherwise attempt to collect these statistics, and that will lead to crashes. | |||
2011-10-28 | Discard all cells on a marked connection | Nick Mathewson | |
Fix for bug 4299 | |||
2011-10-28 | Fix typo, spotted by tmpname0901. Thanks! | Sebastian Hahn | |
2011-10-27 | bump maint-0.2.2 to 0.2.2.34-dev | Roger Dingledine | |
2011-10-27 | Merge branch 'maint-0.2.1' into maint-0.2.2 | Roger Dingledine | |
2011-10-27 | bump maint to 0.2.1.31 | Roger Dingledine | |
2011-10-26 | Add option to give guard flag to relays without the CVE-2011-2768 fix | Robert Ransom | |
This way, all of the DA operators can upgrade immediately, without nuking every client's set of entry guards as soon as a majority of them upgrade. Until enough guards have upgraded, a majority of dirauths should set this config option so that there are still enough guards in the network. After a few days pass, all dirauths should use the default. | |||
2011-10-26 | Don't give the Guard flag to relays without the CVE-2011-2768 fix | Robert Ransom | |
2011-10-26 | Make tor_version_same_series non-static | Robert Ransom | |
2011-10-26 | Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix | Sebastian Hahn | |
Conflicts: src/or/connection_or.c | |||
2011-10-26 | Reject create cells on outgoing OR connections from bridges | Robert Ransom | |
2011-10-26 | Mark which OR connections are outgoing | Robert Ransom | |
2011-10-26 | Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND | Robert Ransom | |
Fix suggested by Nick Mathewson. | |||
2011-10-26 | Don't send a certificate chain on outgoing TLS connections from non-relays | Nick Mathewson | |
2011-10-26 | Merge branch 'maint-0.2.1' into maint-0.2.2 | Roger Dingledine | |
2011-10-26 | Remove the -F option from tor-resolve. | Nick Mathewson | |
It used to mean "Force": it would tell tor-resolve to ask tor to resolve an address even if it ended with .onion. But when AutomapHostsOnResolve was added, automatically refusing to resolve .onion hosts stopped making sense. So in 0.2.1.16-rc (commit 298dc95dfd8), we made tor-resolve happy to resolve anything. The -F option stayed in, though, even though it didn't do anything. Oddly, it never got documented. Found while fixing GCC 4.6 "set, unused variable" warnings. | |||
2011-10-26 | manually backport a5232e0c4c | Roger Dingledine | |
2011-10-26 | Merge branch 'maint-0.2.1' into maint-0.2.2 | Roger Dingledine | |
2011-10-26 | stop asserting at boot | Roger Dingledine | |
The patch for 3228 made us try to run init_keys() before we had loaded our state file, resulting in an assert inside init_keys. We had moved it too early in the function. Now it's later in the function, but still above the accounting calls. | |||
2011-10-26 | Reinit keys at the start of options_act(). | Nick Mathewson | |
Previously we did this nearer to the end (in the old_options && transition_affects_workers() block). But other stuff cares about keys being consistent with options... particularly anything which tries to access a key, which can die in assert_identity_keys_ok(). Fixes bug 3228; bugfix on 0.2.2.18-alpha. Conflicts: src/or/config.c | |||
2011-10-26 | Don't crash a bridge authority on SIGHUP if it's not in the consensus | Robert Ransom | |
Fixes bug 2572. | |||
2011-10-26 | Fix assert for relay/bridge state change | Sebastian Hahn | |
When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433. Conflicts: src/or/config.c | |||
2011-10-26 | Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2 | Nick Mathewson | |
2011-10-26 | Don't crash when accountingmax is set in non-server Tors | Nick Mathewson | |
We use a hash of the identity key to seed a prng to tell when an accounting period should end. But thanks to the bug998 changes, clients no longer have server-identity keys to use as a long-term seed in accounting calculations. In any case, their identity keys (as used in TLS) were never never fixed. So we can just set the wakeup time from a random seed instead there. Still open is whether everybody should be random. This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha. Diagnosed with help from boboper on irc. | |||
2011-10-26 | Properly refcount client_identity_key | Sebastian Hahn | |
In a2bb0bf we started using a separate client identity key. When we are in "public server mode" (that means not a bridge) we will use the same key. Reusing the key without doing the proper refcounting leads to a segfault on cleanup during shutdown. Fix that. Also introduce an assert that triggers if our refcount falls below 0. That should never happen. | |||
2011-10-26 | Add some asserts to get_{tlsclient|server}_identity_key | Nick Mathewson | |
We now require that: - Only actual servers should ever call get_server_identity_key - If you're being a client or bridge, the client and server keys should differ. - If you're being a public relay, the client and server keys should be the same. | |||
2011-10-26 | Rename get_client_identity_key to get_tlsclient_identity_key | Nick Mathewson | |