summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2010-03-16give us a blurb; add stanza to the releasenotestor-0.2.1.25Roger Dingledine
2010-03-15bump to 0.2.1.25Roger Dingledine
it's perfect, let's ship it
2010-03-06clean up the 0.2.1.25 changelogRoger Dingledine
2010-03-04Apply Roger's bug 1269 fix.Nick Mathewson
From http://archives.seul.org/tor/relays/Mar-2010/msg00006.html : As I understand it, the bug should show up on relays that don't set Address to an IP address (so they need to resolve their Address line or their hostname to guess their IP address), and their hostname or Address line fails to resolve -- at that point they'll pick a random 4 bytes out of memory and call that their address. At the same time, relays that *do* successfully resolve their address will ignore the result, and only come up with a useful address if their interface address happens to be a public IP address.
2010-03-02Backport fix for time-goes-forward test. Fix bug 1267Nick Mathewson
2010-02-27Update Tor Project copyright yearsNick Mathewson
2010-02-27Properly handle non-terminated stringsSebastian Hahn
Treat strings returned from signed_descriptor_get_body_impl() as not NUL-terminated. Since the length of the strings is available, this is not a big problem. Discovered by rieo.
2010-02-26Proper NULL checking in circuit_list_path_impl()Sebastian Hahn
Another dereference-then-NULL-check sequence. No reports of this bug triggered in the wild. Fixes bugreport 1256. Thanks to ekir for discovering and reporting this bug.
2010-02-26Proper NULL checking for hsdesc publicationSebastian Hahn
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered in the wild, but we should fix it anyways in case it ever happens. Also make sure users get a note about this being a bug when they see it in their log. Thanks to ekir for discovering and reporting this bug.
2010-02-26Zero a cipher completely before freeing itSebastian Hahn
We used to only zero the first ptrsize bytes of the cipher. Since cipher is large enough, we didn't zero too many bytes. Discovered and fixed by ekir. Fixes bug 1254.
2010-02-21put 0.2.1.24 in release notes tootor-0.2.1.24Roger Dingledine
2010-02-21bump to 0.2.1.24Roger Dingledine
2010-02-18Bump version to 0.2.1.23-devNick Mathewson
2010-02-18Add changelog for latest openssl fixNick Mathewson
2010-02-18Fix compileSebastian Hahn
2010-02-17Even more conservative option-setting for SSL renegotiation.Nick Mathewson
This time, set the SSL3_FLAGS_ALLOW_UNSAFE_RENEGOTIATION flag on every version before OpenSSL 0.9.8l. I can confirm that the option value (0x0010) wasn't reused until OpenSSL 1.0.0beta3.
2010-02-13give it a blurb, update the datetor-0.2.1.23Roger Dingledine
2010-02-12new dannenberg address; make moria2's demise official.Roger Dingledine
2010-02-12prepare for 0.2.1.23Roger Dingledine
2010-02-08Don't use gethostbyname() in resolve_my_address()Sebastian Hahn
Tor has tor_lookup_hostname(), which prefers ipv4 addresses automatically. Bug 1244 occured because gethostbyname() returned an ipv6 address, which Tor cannot handle currently. Fixes bug 1244; bugfix on 0.0.2pre25. Reported by Mike Mestnik.
2010-02-07lookup_last_hid_serv_request() could overflow and leak memorySebastian Hahn
The problem was that we didn't allocate enough memory on 32-bit platforms with 64-bit time_t. The memory leak occured every time we fetched a hidden service descriptor we've fetched before.
2010-02-02Link libssl and libcrypto in the right order.Nick Mathewson
For most linking setups, this doesn't matter. But for some setups, when statically linking openssl, it does matter, since you need to link things with dependencies before you link things they depend on. Fix for bug 1237.
2010-01-31Revise OpenSSL fix to work with OpenSSL 1.0.0beta*Nick Mathewson
In brief: you mustn't use the SSL3_FLAG solution with anything but 0.9.8l, and you mustn't use the SSL_OP solution with anything before 0.9.8m, and you get in _real_ trouble if you try to set the flag in 1.0.0beta, since they use it for something different. For the ugly version, see my long comment in tortls.c
2010-01-29Decide whether to use SSL flags based on runtime OpenSSL version.Nick Mathewson
We need to do this because Apple doesn't update its dev-tools headers when it updates its libraries in a security patch. On the bright side, this might get us out of shipping a statically linked OpenSSL on OSX. May fix bug 1225. [backported]
2010-01-24Add --enable-static-(openssl|libevent) optionsNick Mathewson
These options only work when using --with-(openssl|libevent)-dir to explicitly pick a libevent or openssl location.
2010-01-24New configure option: --enable-gcc-warnings-advisoryPeter Palfrader
the new configure option --enable-gcc-warnings-advisory enables all the gcc flags that --enable-gcc-warnings does with the exception of -Werror.
2010-01-23Fix two rare leaks spotted by rieo.Nick Mathewson
2010-01-22Avoid a possible crash in tls_log_errors.Nick Mathewson
We were checking for msg==NULL, but not lib or proc. This case can only occur if we have an error whose string we somehow haven't loaded, but it's worth coding defensively here. Spotted by rieo on IRC.
2010-01-19spread guard rotation out throughout the monthRoger Dingledine
2010-01-19weight guard choice by bandwidth; discard old guardsRoger Dingledine
2010-01-19bump to 0.2.1.22, and give it a changelogtor-0.2.1.22Roger Dingledine
2010-01-19downgrade a warningRoger Dingledine
this case can now legitimately happen, if you have a cached v2 status from moria1, and you run with the new list of dirservers that's missing the old moria1. it's nothing to worry about; the file will die off in a month or two.
2010-01-19rotate keys for moria1 and gabelmooRoger Dingledine
2010-01-17stop bridge authorities from leaking their bridge listRoger Dingledine
2009-12-21bump to 0.2.1.21 so we can releasetor-0.2.1.21Roger Dingledine
2009-12-15Fix bug 1173: remove an assert(unsigned >= 0).Nick Mathewson
2009-12-04Improved workaround for disabled OpenSSL renegotiation.Martin Peck
It turns out that OpenSSL 0.9.8m is likely to take a completely different approach for reenabling renegotiation than OpenSSL 0.9.8l did, so we need to work with both. :p Fixes bug 1158. (patch by coderman; commit message by nickm)
2009-11-23fix race condition that can cause crashes at client or exit relayRoger Dingledine
Avoid crashing if the client is trying to upload many bytes and the circuit gets torn down at the same time, or if the flip side happens on the exit relay. Bugfix on 0.2.0.1-alpha; fixes bug 1150.
2009-11-17add the 0.2.1.20 changelog blurb, plus update the releasenotesRoger Dingledine
2009-11-13Merge commit 'debian-tor-0.2.1.20-1' into maint-0.2.1Nick Mathewson
2009-11-13Merge branch 'debian-merge' into debian-0.2.1Peter Palfrader
* debian-merge: (37 commits) New upstream version bump to 0.2.1.20 Move moria1 and Tonga to alternate IP addresses. read the "circwindow" parameter from the consensus Code to parse and access network parameters. Revert "Teach connection_ap_can_use_exit about Exclude*Nodes" Work around a memory leak in openssl 0.9.8g (and maybe others) Teach connection_ap_can_use_exit about Exclude*Nodes make some bug 1090 warnings go away Fix a memory leak when parsing a ns Fix obscure 64-bit big-endian hidserv bug turns out the packaging changes aren't in 0.2.1.20 update changelog with bundle details Use an _actual_ fix for the byte-reverse warning. Use a simpler fix for the byte-reversing warning Fix compile warnings on Snow Leopard Add getinfo accepted-server-descriptor. Clean spec. Reduce log level for bug case that we now know really exists. Only send reachability status events on overall success/failure update the README instructions and OS X makefiles ...
2009-11-13New upstream versionPeter Palfrader
2009-11-13Merge commit 'tor-0.2.1.20' into debian-mergePeter Palfrader
* commit 'tor-0.2.1.20': (36 commits) bump to 0.2.1.20 Move moria1 and Tonga to alternate IP addresses. read the "circwindow" parameter from the consensus Code to parse and access network parameters. Revert "Teach connection_ap_can_use_exit about Exclude*Nodes" Work around a memory leak in openssl 0.9.8g (and maybe others) Teach connection_ap_can_use_exit about Exclude*Nodes make some bug 1090 warnings go away Fix a memory leak when parsing a ns Fix obscure 64-bit big-endian hidserv bug turns out the packaging changes aren't in 0.2.1.20 update changelog with bundle details Use an _actual_ fix for the byte-reverse warning. Use a simpler fix for the byte-reversing warning Fix compile warnings on Snow Leopard Add getinfo accepted-server-descriptor. Clean spec. Reduce log level for bug case that we now know really exists. Only send reachability status events on overall success/failure update the README instructions and OS X makefiles Avoid segfault when accessing hidden service. ...
2009-11-05Make Tor work with OpenSSL 0.9.8lNick Mathewson
To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it.
2009-10-26Fix an apparently bogus check; fortunately, it seems to be untriggered.Nick Mathewson
2009-10-26Add changelog to describe coverity fixes for 0.2.1.21Nick Mathewson
2009-10-26Fix two memory leaks found by Coverity (CIDs 417-418)Nick Mathewson
The first happens on an error case when a controller wants an impossible directory object. The second happens when we can't write our fingerprint file.
2009-10-26Add missing break statements for Coverity CIDs #406,407.Nick Mathewson
The code for these was super-wrong, but will only break things when we reset an option on a platform where sizeof(time_t) is different from sizeof(int).
2009-10-26Only send the if_modified_since header for a v3 consensus.Nick Mathewson
Spotted by xmux; bugfix on 0.2.0.10-alpha. (Bug introduced by 20b10859)
2009-10-15bump to 0.2.1.20tor-0.2.1.20Roger Dingledine