aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-12-21Move destroy cells into a separate queue type of their own, to save RAMNick Mathewson
We've been seeing problems with destroy cells queues taking up a huge amount of RAM. We can mitigate this, since while a full packed destroy cell takes 514 bytes, we only need 5 bytes to remember a circuit ID and a reason. Fixes bug 24666. Bugfix on 0.2.5.1-alpha, when destroy cell queues were introduced.
2017-12-11Merge branch 'bug24167_025' into maint-0.2.5Nick Mathewson
2017-12-11Merge remote-tracking branch 'public/ticket23856_025_01' into maint-0.2.5Nick Mathewson
2017-12-01Fix a clang compilation warning in rendservice.cNick Mathewson
Fixes bug 24480; bugfix on 0.2.5.16.
2017-12-01bump to 0.2.5.16-devNick Mathewson
2017-11-30bump to 0.2.5.16Nick Mathewson
2017-11-30Merge branch 'trove-2017-012_025' into maint-0.2.5Nick Mathewson
2017-11-30Merge branch 'trove-2017-011_025' into maint-0.2.5Nick Mathewson
2017-11-30Merge branch 'trove-2017-009_025' into maint-0.2.5Nick Mathewson
2017-11-30Fix changes fileNick Mathewson
2017-11-28Use local descriptor object to exclude self in path selectionDavid Goulet
TROVE-2017-12. Severity: Medium When choosing a random node for a circuit, directly use our router descriptor to exclude ourself instead of the one in the global descriptor list. That list could be empty because tor could be downloading them which could lead to not excluding ourself. Closes #21534
2017-11-27Avoid asking for passphrase on junky PEM inputNick Mathewson
Fixes bug 24246 and TROVE-2017-011. This bug is so old, it's in Matej's code. Seems to have been introduced with e01522bbed6eea.
2017-11-27Fix length of replaycache-checked data.Nick Mathewson
This is a regression; we should have been checking only the public-key encrypted portion. Fixes bug 24244, TROVE-2017-009, and CVE-2017-8819.
2017-11-27relay: Change bandwidth stats interval to 24 hoursDavid Goulet
Going from 4 hours to 24 hours in order to try reduce the efficiency of guard discovery attacks. Closes #23856 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-11-18Merge branch 'ticket18329_minimal_025' into maint-0.2.5Nick Mathewson
2017-11-16Fix a traceback when closing a blocked connection "immediately".Nick Mathewson
When we close a connection via connection_close_immediately, we kill its events immediately. But if it had been blocked on bandwidth read/write, we could try to re-add its (nonexistent) events later from connection_bucket_refill -- if we got to that callback before we swept the marked connections. Fixes bug 24167. Fortunately, this hasn't been a crash bug since we introduced connection_check_event in 0.2.9.10, and backported it. This is a bugfix on commit 89d422914a0c3cb, I believe, which appeared in Tor 0.1.0.1-rc.
2017-11-13Minimal implementation of bridge-distribution-requestNick Mathewson
Just advertise the line when we're a bridge, using "any" if we're published or "none" if we aren't. This is done in lieu of a full backport of #18329.
2017-11-10Update geoip and geoip6 to the November 6 2017 database.Karsten Loesing
2017-10-25bump to 0.2.5.15-devNick Mathewson
2017-10-24bump to 0.2.5.15Nick Mathewson
2017-10-23dirauth: Add bastet to the default authoritiesDavid Goulet
Fixes #23910 Based on a patch by dgoulet; backported to 0.2.5
2017-10-17Update Longclaw's IP address; fixes 23592.Nick Mathewson
2017-10-05add missing subcategory in changes fileNick Mathewson
2017-10-05Update geoip and geoip6 to the October 4 2017 database.Karsten Loesing
2017-09-07Update geoip and geoip6 to the September 6 2017 database.Karsten Loesing
2017-08-03Update geoip and geoip6 to the August 3 2017 database.Karsten Loesing
2017-08-01Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-08-01Merge remote-tracking branch 'karsten/geoip-jul2017' into maint-0.2.4maint-0.2.4Nick Mathewson
2017-07-26Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-07-26Point travis to #tor-ci, not #tor-botsNick Mathewson
2017-07-26Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-07-25In < 0.2.9.x, --enable-fatal-warnings was --enable-gcc-warnings.Isis Lovecruft
2017-07-25Builds on CI should use --enable-fragile-hardening.Isis Lovecruft
(cherry picked from commit c91a57ccf90308c6728184b43519f96b61acb95d)
2017-07-25Install optional dependencies during Travis CI builds.Isis Lovecruft
(cherry picked from commit 1bb00fb812c0df7a574ed62e9f53b0e8192c7d04)
2017-07-25Fix CI homebrew checks for outdated packages.Isis Lovecruft
(cherry picked from commit 8f8689f70235dc19cbc5092ea148af5772a9cdc3)
2017-07-17Add a changes file for bug22636.Isis Lovecruft
2017-07-17Fix and expand upon our Travis CI configuration.Isis Lovecruft
* CHANGE .travis.yml so that commands for different purposes (e.g. getting dependencies, building, testing) are in separate config lines and sections. * CHANGE .travis.yml to use their mechanism for installing dependencies via apt. [0] This also allows us to not need sudo (the "sudo: false" line). * CHANGE Travis CI tests (the "script:" section) to build and run tests in the same manner as Jenkins (i.e. with --enable-fatal-warnings and --disable-silent-rules and run `make check`). * ADD Travis configuration to do all the target builds with both GCC and clang. * ADD make flags to build with both of the cores available. * ADD notifications for IRC, and configure email notifications (to the author of the commit) only if the branch was previously building successfully and the latest commit broke it. * ADD the ability to run the Travis build matrix for OSX as well, but leave it commented out by default (because it takes roughly ten times longer, due to a shortage of OSX build machines). * ADD Travis config option to cancel/fail the build early if one target has already failed ("fast_finish: true"). * ADD comments to describe what our Travis config is doing and why it is configured that way. [0]: https://docs.travis-ci.com/user/installing-dependencies/#Installing-Packages-on-Container-Based-Infrastructure)
2017-07-13.travis.yml to run test suitePatrick O'Doherty
Installs dependencies (including rust) and runs the existing test suite. TODO: Introduce build matrix utilizing the rust toolchain to run test suites both with and without the rust components.
2017-07-07Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-07-07Mention TROVE-2017-007 in changes file for 22789Nick Mathewson
2017-07-07Update geoip and geoip6 to the July 4 2017 database.Karsten Loesing
2017-07-05Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-07-05Merge branch 'bug22789_024' into maint-0.2.4Nick Mathewson
2017-07-03Fix assertion failure related to openbsd strtol().Nick Mathewson
Fixes bug 22789; bugfix on 0.2.3.8-alpha.
2017-06-27Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-06-27Merge branch 'bug22737_024' into maint-0.2.4Nick Mathewson
2017-06-27Fix an errant memset() into the middle of a struct in cell_pack().Nick Mathewson
This mistake causes two possible bugs. I believe they are both harmless IRL. BUG 1: memory stomping When we call the memset, we are overwriting two 0 bytes past the end of packed_cell_t.body. But I think that's harmless in practice, because the definition of packed_cell_t is: // ... typedef struct packed_cell_t { TOR_SIMPLEQ_ENTRY(packed_cell_t) next; char body[CELL_MAX_NETWORK_SIZE]; uint32_t inserted_time; } packed_cell_t; So we will overwrite either two bytes of inserted_time, or two bytes of padding, depending on how the platform handles alignment. If we're overwriting padding, that's safe. If we are overwriting the inserted_time field, that's also safe: In every case where we call cell_pack() from connection_or.c, we ignore the inserted_time field. When we call cell_pack() from relay.c, we don't set or use inserted_time until right after we have called cell_pack(). SO I believe we're safe in that case too. BUG 2: memory exposure The original reason for this memset was to avoid the possibility of accidentally leaking uninitialized ram to the network. Now remember, if wide_circ_ids is false on a connection, we shouldn't actually be sending more than 512 bytes of packed_cell_t.body, so these two bytes can only leak to the network if there is another bug somewhere else in the code that sends more data than is correct. Fortunately, in relay.c, where we allocate packed_cell_t in packed_cell_new() , we allocate it with tor_malloc_zero(), which clears the RAM, right before we call cell_pack. So those packed_cell_t.body bytes can't leak any information. That leaves the two calls to cell_pack() in connection_or.c, which use stack-alocated packed_cell_t instances. In or_handshake_state_record_cell(), we pass the cell's contents to crypto_digest_add_bytes(). When we do so, we get the number of bytes to pass using the same setting of wide_circ_ids as we passed to cell_pack(). So I believe that's safe. In connection_or_write_cell_to_buf(), we also use the same setting of wide_circ_ids in both calls. So I believe that's safe too. I introduced this bug with 1c0e87f6d8c7a0abdadf1b5cd9082c10abc7f4e2 back in 0.2.4.11-alpha; it is bug 22737 and CID 1401591
2017-06-09Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-06-09Update geoip and geoip6 to the June 8 2017 database.Karsten Loesing
2017-06-08Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
"ours" merge to avoid version bump.