summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2011-05-17give 0.2.2.26-beta a changelog blurbtor-0.2.2.26-betaRoger Dingledine
2011-05-17add a trac entry number to bug, er, 3207Roger Dingledine
2011-05-16nickm wanted to call this one a beta, so a beta it isRoger Dingledine
because hey, if the new status tag breaks something, it's still an alpha after all. ;)
2011-05-16bump to 0.2.2.26-alphaRoger Dingledine
2011-05-16elevate some changelog entriesRoger Dingledine
2011-05-16two cleanupsRoger Dingledine
2011-05-16Fold in and clean up remaining changes filesNick Mathewson
2011-05-16mikey has a real name.Nick Mathewson
2011-05-16Merge remote-tracking branch 'origin/maint-0.2.2' into release-0.2.2Nick Mathewson
2011-05-16Remove from maint-0.2.2 changes files merged in release-0.2.2 and masterNick Mathewson
2011-05-16Merge remote-tracking branch 'origin/maint-0.2.2' into release-0.2.2Nick Mathewson
2011-05-16Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
Conflicts: changes/bug2190 changes/forget-rend-descs-on-newnym
2011-05-16rm files for changes merged in all of release021, release022, masterNick Mathewson
2011-05-16Merge branch 'maint-0.2.2' into release-0.2.2Nick Mathewson
2011-05-16Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
Fixed trivial conflict due to headers moving into their own .h files from or.h. Conflicts: src/or/or.h
2011-05-16squash! Add crypto_pk_check_key_public_exponent functionNick Mathewson
Rename crypto_pk_check_key_public_exponent to crypto_pk_public_exponent_ok: it's nice to name predicates s.t. you can tell how to interpret true and false.
2011-05-16Require that certain public keys have public exponent 65537Robert Ransom
2011-05-16Add crypto_pk_check_key_public_exponent functionRobert Ransom
2011-05-16Check fetched rendezvous descriptors' service IDsRobert Ransom
2011-05-16Merge remote-tracking branch 'public/bug2850' into maint-0.2.2Nick Mathewson
Fixed a trivial conflict where this and the ControlSocketGroupWritable code both added different functions to the same part of connection.c. Conflicts: src/or/connection.c
2011-05-16Merge remote-tracking branch 'origin/maint-0.2.2' into release-0.2.2Nick Mathewson
2011-05-15Increase the length of the buffer in smartlist_string_num_isin().Nick Mathewson
This was harmless, since we only used this for checking for lists of port values, but it's the principle of the thing. Fixes 3175; bugfix on 0.1.0.1-rc
2011-05-15Merge branch 'bug2972' into maint-0.2.2Nick Mathewson
2011-05-15Make check_private_dir check for group ownership as appropriateNick Mathewson
2011-05-15Fix up some comment issues spotted by rransomNick Mathewson
2011-05-15Check permissions on the directory holding a control socketNick Mathewson
2011-05-15Add a new flag to check_private_dir to make it _not_ change permissionsNick Mathewson
We'll need this for checking permissions on the directories that hold control sockets: if somebody says "ControlSocket ~/foo", it would be pretty rude to do a chmod 700 on their homedir.
2011-05-15Add a function to pull off the final component of a pathNick Mathewson
2011-05-15Make check_private_dir accept g+rx dirs if told to do so.Nick Mathewson
2011-05-15Clean up the 2972 implementation a littleSebastian Hahn
2011-05-15Add UnixSocketsGroupWritable config flagJérémy Bobbio
When running a system-wide instance of Tor on Unix-like systems, having a ControlSocket is a quite handy mechanism to access Tor control channel. But it would be easier if access to the Unix domain socket can be granted by making control users members of the group running the Tor process. This change introduces a UnixSocketsGroupWritable option, which will create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows ControlSocket to offer same access control measures than ControlPort+CookieAuthFileGroupReadable. See <http://bugs.debian.org/552556> for more details.
2011-05-15Preserve bridge download status across SETCONF, HUPNick Mathewson
This code changes it so that we don't remove bridges immediately when we start re-parsing our configuration. Instead, we mark them all, and remove all the marked ones after re-parsing our bridge lines. As we add a bridge, we see if it's already in the list. If so, we just unmark it. This new behavior will lose the property we used to have that bridges were in bridge_list in the same order in which they appeared in the torrc. I took a quick look through the code, and I'm pretty sure we didn't actually depend on that anywhere. This is for bug 3019; it's a fix on 0.2.0.3-alpha.
2011-05-15Fixup whitespace issues from 3122 commitNick Mathewson
2011-05-15Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
Conflicts: src/or/networkstatus.c
2011-05-15Fixup whitespace issues from 3122 commitNick Mathewson
2011-05-15Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
2011-05-15Another doc tweak on tor_memcmp: <b>b</b>, not <b>.Nick Mathewson
2011-05-15minor tweaks to 4b19730c8234dRoger Dingledine
2011-05-15Merge branch 'bug3026' into maint-0.2.2Nick Mathewson
2011-05-15Replace a nasty add-malloc-snprintf with a nice clean asprintfNick Mathewson
2011-05-15Merge branch 'bug1345' into maint-0.2.2Nick Mathewson
2011-05-15Better doc for consider_recording_trackexithostNick Mathewson
2011-05-15Merge branch 'bug2732-simpler' into maint-0.2.2Nick Mathewson
2011-05-15Rip out more of hid_serv_acting_as_directoryNick Mathewson
rransom notes correctly that now that we aren't checking our HSDir flag, we have no actual reason to check whether we are listed in the consensus at all when determining if we should act like a hidden service directory.
2011-05-14start folding in changes entries for 0.2.2.26-alphaRoger Dingledine
2011-05-13Merge branch 'maint-0.2.2' into release-0.2.2Roger Dingledine
2011-05-13Handle transitions in Automap*, VirtualAddrNetwork correctlyNick Mathewson
Previously, if they changed in torrc during a SIGHUP, all was well, since we would just clear all transient entries from the addrmap thanks to bug 1345. But if you changed them from the controller, Tor would leave old mappings in place. The VirtualAddrNetwork bug has been here since 0.1.1.19-rc; the AutomapHosts* bug has been here since 0.2.0.1-alpha.
2011-05-13When TrackExitHosts changes, remove all no-longer-valid mappingsNick Mathewson
This bug couldn't happen when TrackExitHosts changed in torrc, since the SIGHUP to reload the torrc would clear out all the transient addressmap entries before. But if you used SETCONF to change TrackExitHosts, old entries would be left alone: that's a bug, and so this is a bugfix on Tor 0.1.0.1-rc.
2011-05-13Raise the TrackHostExits membership code into its own functionNick Mathewson
2011-05-13Don't clear out transient addressmap entries on HUPNick Mathewson
If you really want to purge the client DNS cache, the TrackHostExits mappings, and the virtual address mappings, you should be using NEWNYM instead. Fixes bug 1345; bugfix on Tor 0.1.0.1-rc. Note that this needs more work: now that we aren't nuking the transient addressmap entries on HUP, we need to make sure that configuration changes to VirtualAddressMap and TrackHostExits actually have a reasonable effect.