summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2009-11-19bump to 0.2.2.6-alphator-0.2.2.6-alphaRoger Dingledine
2009-11-19remove the 0.2.1.20 debian changelog from master's changelogRoger Dingledine
2009-11-18Not everybody likes debugging printfs as much as INick Mathewson
2009-11-17Merge commit 'origin/maint-0.2.1'Roger Dingledine
Conflicts: debian/changelog
2009-11-17add the 0.2.1.20 changelog blurb, plus update the releasenotesRoger Dingledine
2009-11-17Do not report a partially-successful detached signature add as failed.Nick Mathewson
Also, regenerate the detached-signature document whenever any signatures are successfully added.
2009-11-17only complain when rejecting a descriptor if it has contact infoRoger Dingledine
2009-11-17clean up changelog for the 0.2.2.6-alpha releaseRoger Dingledine
2009-11-15Merge commit 'debian-tor-0.2.2.5-alpha-1'Roger Dingledine
2009-11-15Change the dependency on tsocks to torsocks | tsocks (see: #554717)Peter Palfrader
2009-11-15Allegedly echo -e is a bashism. Remove it from debian/rules, we don't need ↵Peter Palfrader
it anyways (closes: #478631)
2009-11-15Change order of recommends from privoxy | polipo to polipo | privoxy.Peter Palfrader
2009-11-15Build-Depend on libssl-dev >= 0.9.8k-6.Peter Palfrader
libssl 0.9.8k-6 disabled autorenegotation, and the -dev package introduced the SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION flag. Since we now set that flag if available we want to make sure that it *is* available when building. Therefore build-depend on libssl-dev >= 0.9.8k-6. If we build against earlier versions we will not work once libssl gets upgraded to a version that disabled renegotiations.
2009-11-15Pick 0a58567ce3418f410cf1dd0143dd3e56b4a4bd1f from master git treePeter Palfrader
work with libssl that has renegotiation disabled by default. (debian/patches/0a58567c-work-with-reneg-ssl.dpatch)
2009-11-15Merge branch 'debian-merge' into debianPeter Palfrader
* debian-merge: New upstream version fix compile on windows bump to 0.2.2.5-alpha Move dizum to an alternate IP address. Ship test.h in release
2009-11-15New upstream versionPeter Palfrader
2009-11-15Merge commit 'tor-0.2.2.5-alpha' into debian-mergePeter Palfrader
* commit 'tor-0.2.2.5-alpha': fix compile on windows bump to 0.2.2.5-alpha Move dizum to an alternate IP address. Ship test.h in release
2009-11-14Fix compilation with with bionic libc.Jacob Appelbaum
This fixes bug 1147: bionic doesn't have an actual implementation of mlockall(); mlockall() is merely in the headers but not actually in the library. This prevents Tor compilation with the bionic libc for Android handsets.
2009-11-13Merge commit 'debian-tor-0.2.1.20-1' into maint-0.2.1Nick Mathewson
2009-11-13Merge branch 'debian-merge' into debian-0.2.1Peter Palfrader
* debian-merge: (37 commits) New upstream version bump to 0.2.1.20 Move moria1 and Tonga to alternate IP addresses. read the "circwindow" parameter from the consensus Code to parse and access network parameters. Revert "Teach connection_ap_can_use_exit about Exclude*Nodes" Work around a memory leak in openssl 0.9.8g (and maybe others) Teach connection_ap_can_use_exit about Exclude*Nodes make some bug 1090 warnings go away Fix a memory leak when parsing a ns Fix obscure 64-bit big-endian hidserv bug turns out the packaging changes aren't in 0.2.1.20 update changelog with bundle details Use an _actual_ fix for the byte-reverse warning. Use a simpler fix for the byte-reversing warning Fix compile warnings on Snow Leopard Add getinfo accepted-server-descriptor. Clean spec. Reduce log level for bug case that we now know really exists. Only send reachability status events on overall success/failure update the README instructions and OS X makefiles ...
2009-11-13New upstream versionPeter Palfrader
2009-11-13Merge commit 'tor-0.2.1.20' into debian-mergePeter Palfrader
* commit 'tor-0.2.1.20': (36 commits) bump to 0.2.1.20 Move moria1 and Tonga to alternate IP addresses. read the "circwindow" parameter from the consensus Code to parse and access network parameters. Revert "Teach connection_ap_can_use_exit about Exclude*Nodes" Work around a memory leak in openssl 0.9.8g (and maybe others) Teach connection_ap_can_use_exit about Exclude*Nodes make some bug 1090 warnings go away Fix a memory leak when parsing a ns Fix obscure 64-bit big-endian hidserv bug turns out the packaging changes aren't in 0.2.1.20 update changelog with bundle details Use an _actual_ fix for the byte-reverse warning. Use a simpler fix for the byte-reversing warning Fix compile warnings on Snow Leopard Add getinfo accepted-server-descriptor. Clean spec. Reduce log level for bug case that we now know really exists. Only send reachability status events on overall success/failure update the README instructions and OS X makefiles Avoid segfault when accessing hidden service. ...
2009-11-12Fix a memory leak on directory authorities during votingRoger Dingledine
Fix a memory leak on directory authorities during voting that was introduced in 0.2.2.1-alpha. Found via valgrind.
2009-11-08Fix building from a separate build directory.Nick Mathewson
2009-11-06Add changelog entry to 0.2.2.x about openssl 0.9.8l fixNick Mathewson
2009-11-06Merge commit 'origin/maint-0.2.1'Nick Mathewson
Conflicts: src/common/tortls.c
2009-11-05Make Tor work with OpenSSL 0.9.8lNick Mathewson
To fix a major security problem related to incorrect use of SSL/TLS renegotiation, OpenSSL has turned off renegotiation by default. We are not affected by this security problem, however, since we do renegotiation right. (Specifically, we never treat a renegotiated credential as authenticating previous communication.) Nevertheless, OpenSSL's new behavior requires us to explicitly turn renegotiation back on in order to get our protocol working again. Amusingly, this is not so simple as "set the flag when you create the SSL object" , since calling connect or accept seems to clear the flags. For belt-and-suspenders purposes, we clear the flag once the Tor handshake is done. There's no way to exploit a second handshake either, but we might as well not allow it.
2009-11-04Fix a URL in a log message.Nick Mathewson
2009-10-27Implement DisableAllSwap to avoid putting secret info in page files.Jacob Appelbaum
This commit implements a new config option: 'DisableAllSwap' This option probably only works properly when Tor is started as root. We added two new functions: tor_mlockall() and tor_set_max_memlock(). tor_mlockall() attempts to mlock() all current and all future memory pages. For tor_mlockall() to work properly we set the process rlimits for memory to RLIM_INFINITY (and beyond) inside of tor_set_max_memlock(). We behave differently from mlockall() by only allowing tor_mlockall() to be called one single time. All other calls will result in a return code of 1. It is not possible to change DisableAllSwap while running. A sample configuration item was added to the torrc.complete.in config file. A new item in the man page for DisableAllSwap was added. Thanks to Moxie Marlinspike and Chris Palmer for their feedback on this patch. Please note that we make no guarantees about the quality of your OS and its mlock/mlockall implementation. It is possible that this will do nothing at all. It is also possible that you can ulimit the mlock properties of a given user such that root is not required. This has not been extensively tested and is unsupported. I have included some comments for possible ways we can handle this on win32.
2009-10-27Fix bug 1113.Karsten Loesing
Bridges do not use the default exit policy, but reject *:* by default.
2009-10-27Merge commit 'karsten/log-1092'Roger Dingledine
2009-10-26Improve log statement when publishing v2 hs desc.Karsten Loesing
2009-10-26Fix bug 1042.Karsten Loesing
If your relay can't keep up with the number of incoming create cells, it would log one warning per failure into your logs. Limit warnings to 1 per minute.
2009-10-26Merge commit 'origin/maint-0.2.1'Nick Mathewson
2009-10-26Fix an apparently bogus check; fortunately, it seems to be untriggered.Nick Mathewson
2009-10-26Fix an accidentally removed free in 385853a282138a61, and repair a check.Nick Mathewson
2009-10-26Merge commit 'karsten/fix-1066-3'Roger Dingledine
2009-10-26Note coverity fixes in changelog.Nick Mathewson
2009-10-26Fix/annotate deadcode for CID 402,403Nick Mathewson
2009-10-26Fix the very noisy unit test memory leak of CID 420-421.Nick Mathewson
On any failing case in test_util_config_line, we would leak a couple of strings.
2009-10-26Fix dead code found by Coverity (CID 419).Nick Mathewson
This was left over from an early draft of the microdescriptor code; it began to populate the signatures array of a networkstatus vote, even though there's no actual need to do that for a vote.
2009-10-26Fix a very stupid coverity complaint (CID 416).Nick Mathewson
In its zeal to keep me from saying memset(x, '0', sizeof(x)), Coverity disallows memset(x, 48, sizeof(x)). Fine. I'll choose a different magic number, see if I care!
2009-10-26Remove checks for array existence. (CID 410..415)Nick Mathewson
In C, the code "char x[10]; if (x) {...}" always takes the true branch of the if statement. Coverity notices this now. In some cases, we were testing arrays to make sure that an operation we wanted to do would suceed. Those cases are now always-true. In some cases, we were testing arrays to see if something was _set_. Those caes are now tests for strlen(s), or tests for !tor_mem_is_zero(d,len).
2009-10-26Fix CID 409: check return value of base64_encode in testsNick Mathewson
2009-10-26Clarification to suppress Coverity CID 405.Nick Mathewson
Every or conn has an outbuf, but coverity has no way of knowing that. Add an assert to ease its conscience.
2009-10-26Merge commit 'origin/maint-0.2.1'Nick Mathewson
2009-10-26Add changelog to describe coverity fixes for 0.2.1.21Nick Mathewson
2009-10-26Fix bug 1066.Karsten Loesing
If all authorities restart at once right before a consensus vote, nobody will vote about "Running", and clients will get a consensus with no usable relays. Instead, authorities refuse to build a consensus if this happens.
2009-10-26Fix two memory leaks found by Coverity (CIDs 417-418)Nick Mathewson
The first happens on an error case when a controller wants an impossible directory object. The second happens when we can't write our fingerprint file.
2009-10-26Add missing break statements for Coverity CIDs #406,407.Nick Mathewson
The code for these was super-wrong, but will only break things when we reset an option on a platform where sizeof(time_t) is different from sizeof(int).