aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-12-08Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2015-12-08Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2015-12-08Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2015-12-08Merge branch 'bug17772_024' into maint-0.2.4Nick Mathewson
2015-12-08Ensure node is a guard candidate when picking a directory guardArlo Breault
2015-12-08Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2015-12-08Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2015-12-08Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2015-12-08Fix a compilation warning introduced by clang 3.6Nick Mathewson
There was a dead check when we made sure that an array member of a struct was non-NULL. Tor has been doing this check since at least 0.2.3, maybe earlier. Fixes bug 17781.
2015-12-08Format IPv6 policies correctly.Nick Mathewson
Previously we'd suppressed the mask-bits field in the output when formatting a policy if it was >=32. But that should be a >=128 if we're talking about IPv6. Since we didn't put these in descriptors, this bug affects only log messages and controller outputs. Fix for bug 16056. The code in question was new in 0.2.0, but the bug was introduced in 0.2.4 when we started supporting IPv6 exits.
2015-12-07Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2015-12-07Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2015-12-07Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2015-12-05Update geoip and geoip6 to the December 1 2015 database.Karsten Loesing
2015-11-30Add changes file for 17722cypherpunks
2015-11-30Fix undefined behavior caused by memory overlapcypherpunks
The tor_cert_get_checkable_sig function uses the signing key included in the certificate (if available) when a separate public key is not given. When the signature is valid, the tor_cert_checksig function copies the public key from the checkable structure to the public key field of the certificate signing key. In situations where the separate public key is not given but the certificate includes a signing key, the source and destination pointers in the copy operation are equal and invoke undefined behavior. Undefined behaviour is avoided by ensuring both pointers are different.
2015-11-25Include netinet/in.h (if detected) in check for net/pfvar.hNick Mathewson
Patch from rubiate; fixes bug 17551.
2015-11-23Fix: use the right list in find_expiring_intro_point()David Goulet
The wrong list was used when looking up expired intro points in a rend service object causing what we think could be reachability issues and triggering a BUG log. Fixes #16702 Signed-off-by: David Goulet <dgoulet@ev0ke.net>
2015-11-20bump version to 0.2.7-devNick Mathewson
2015-11-13Bump to 0.2.7.5Nick Mathewson
2015-10-21Note that you can use a unix domain socket for hsportNick Mathewson
2015-10-21Merge remote-tracking branch 'public/bug17404_024' into maint-0.2.7Nick Mathewson
2015-10-21Fix the return valueNick Mathewson
2015-10-21Merge remote-tracking branch 'public/bug17404_024' into maint-0.2.7Nick Mathewson
2015-10-21Check for len < 4 in dn_indicates_v3_certNick Mathewson
Without this check, we potentially look up to 3 characters before the start of a malloc'd segment, which could provoke a crash under certain (weird afaik) circumstances. Fixes 17404; bugfix on 0.2.6.3-alpha.
2015-10-21Fix a memory leak in reading an expired ed signing key.Nick Mathewson
Closes 17403.
2015-10-21Whoops; infinite recursionNick Mathewson
2015-10-21Fix memory leak in rend_cache_failure_entry_free()Nick Mathewson
Bug 17402.
2015-10-21Fix an (unreachable) memory leak in rendcache.cNick Mathewson
The 0.2.8 unit tests provoke this leak, though I don't think it can happen IRL.
2015-10-21Fix a use-after-free in validate_intro_point_failure. Bug 17401. Found w ↵Nick Mathewson
valgrind
2015-10-21Fix a memory leak; bug 17398.Nick Mathewson
2015-10-19Bump version to 0.2.7.4-rcNick Mathewson
2015-10-19tweak some changes filesNick Mathewson
2015-10-15Merge remote-tracking branch 'origin/maint-0.2.6' into maint-0.2.7Nick Mathewson
2015-10-15Add hidserv-stats filname to our sandbox filterDavid Goulet
Fixes #17354 Signed-off-by: David Goulet <dgoulet@ev0ke.net>
2015-10-15Fix compilation of sandbox.[ch] under musl-libcNick Mathewson
Patch from jamestk; fix on 0.2.5.1-alpha. Fixes 17347.
2015-10-09Merge remote-tracking branch 'origin/maint-0.2.6' into maint-0.2.7Nick Mathewson
2015-10-09Merge remote-tracking branch 'origin/maint-0.2.5' into maint-0.2.6Nick Mathewson
2015-10-09Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2015-10-09Update geoip and geoip6 to the October 9 2015 database.Karsten Loesing
2015-10-07Make get_ifaddrs tests more tolerant of unusual network configsteor (Tim Wilson-Brown)
* Don't assume that every test box has an IPv4 address * Don't assume that every test box has a non-local address Resolves issue #17255 released in unit tests in 0.2.7.3-rc.
2015-10-06Work around openssl declaring x509_get_not{Before,After} as functionsNick Mathewson
Now that x509_get_not{Before,After} are functions in OpenSSL 1.1 (not yet releasesd), we need to define a variant that takes a const pointer to X509 and returns a const pointer to ASN1_time. Part of 17237. I'm not convinced this is an openssl bug or a tor bug. It might be just one of those things.
2015-10-06Fix 17251: avoid integer overflow in test_crypto_slowNick Mathewson
2015-09-29fix compilation; mark test fns staticNick Mathewson
2015-09-29Fix past changelog spelling again!Nick Mathewson
2015-09-29go back in time to fix a changelog entry. Fix for 17165Nick Mathewson
2015-09-29Socks->SOCKS in torrcs. Fixes 15609Nick Mathewson
2015-09-29Add checks and unit tests for get_interface_address* failureteor (Tim Wilson-Brown)
Ensure that either a valid address is returned in address pointers, or that the address data is zeroed on error. Ensure that free_interface_address6_list handles NULL lists. Add unit tests for get_interface_address* failure cases. Fixes bug #17173. Patch by fk/teor, not in any released version of tor.
2015-09-29get_interface_address6_list(): Bring back a return code checkFabian Keil
... that was removed by 31eb486c46 which first appeared in 0.2.7.3-rc. If tor is running in a ElectroBSD (or FreeBSD) jail it can't get any IP addresses that aren't assigned to the jail by looking at the interfaces and (by design) the get_interface_address6_via_udp_socket_hack() fallback doesn't work either. The missing return code check resulted in tor_addr_is_internal() complaining about a "non-IP address of type 49", due to reading uninitialised memory. Fixes #17173.
2015-09-29Changes file for bug17154Nick Mathewson