summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2011-10-30blurb and version bump for 0.2.3.7-alphator-0.2.3.7-alphaRoger Dingledine
2011-10-30there will be a new alpha release today (oct 30)Roger Dingledine
2011-10-29bridges send netinfo cells like clients on outgoing connsRoger Dingledine
fixes bug 4348
2011-10-29amend the changelog entry for 4299Roger Dingledine
it doesn't have to do with small cells. rather, it has to do with using cells to decide whether to mark the connection for close.
2011-10-29fold in changes entriesRoger Dingledine
2011-10-29Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
Conflicts: src/or/config.c
2011-10-29Add a changes file for the 4340 fixSebastian Hahn
2011-10-29Disable stats requiring geoip info if we have noneSebastian Hahn
In other parts of the code we will otherwise attempt to collect these statistics, and that will lead to crashes.
2011-10-28Merge branch 'bug4343'Nick Mathewson
2011-10-28Bump version to 0.2.3.6-alpha-devNick Mathewson
2011-10-28Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
Conflicts: src/or/command.c
2011-10-28Discard all cells on a marked connectionNick Mathewson
Fix for bug 4299
2011-10-28"Authetnicate" is not the usual spellingNick Mathewson
2011-10-28Fix a double-free that would occur on an invalid cert in a CERTS cellNick Mathewson
We would stash the certs in the handshake state before checking them for validity... and then if they turned out to be invalid, we'd give an error and free them. Then, later, we'd free them again when we tore down the connection. Fixes bug 4343; fix on 0.2.3.6-alpha.
2011-10-28Fix a memory-poisoning memset in tortls.cNick Mathewson
2011-10-28Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
2011-10-28Fix typo, spotted by tmpname0901. Thanks!Sebastian Hahn
2011-10-27Merge branch 'maint-0.2.2'Roger Dingledine
2011-10-27bump maint-0.2.2 to 0.2.2.34-devRoger Dingledine
2011-10-27find all those stanzas in master tooRoger Dingledine
2011-10-27Merge branch 'maint-0.2.2'Roger Dingledine
2011-10-27Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine
2011-10-27bump maint to 0.2.1.31Roger Dingledine
2011-10-26a little blurb for 0.2.3.6-alphator-0.2.3.6-alphaRoger Dingledine
2011-10-26forward-port the stable releases notesRoger Dingledine
2011-10-26bump to 0.2.3.6-alphaRoger Dingledine
2011-10-26fold in changes entriesRoger Dingledine
2011-10-27Merge branch 'maint-0.2.2_secfix' into master_secfixSebastian Hahn
Conflicts: src/common/tortls.c src/or/connection_or.c src/or/dirserv.c src/or/or.h
2011-10-26Add option to give guard flag to relays without the CVE-2011-2768 fixRobert Ransom
This way, all of the DA operators can upgrade immediately, without nuking every client's set of entry guards as soon as a majority of them upgrade. Until enough guards have upgraded, a majority of dirauths should set this config option so that there are still enough guards in the network. After a few days pass, all dirauths should use the default.
2011-10-26Don't give the Guard flag to relays without the CVE-2011-2768 fixRobert Ransom
2011-10-26Make tor_version_same_series non-staticRobert Ransom
2011-10-26Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfixSebastian Hahn
Conflicts: src/or/connection_or.c
2011-10-26Reject create cells on outgoing OR connections from bridgesRobert Ransom
2011-10-26Mark which OR connections are outgoingRobert Ransom
2011-10-26Don't use any OR connection which sent us a CREATE_FAST cell for an EXTENDRobert Ransom
Fix suggested by Nick Mathewson.
2011-10-26Don't send a certificate chain on outgoing TLS connections from non-relaysNick Mathewson
2011-10-26Merge branch 'maint-0.2.2'Roger Dingledine
2011-10-26Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine
2011-10-26Remove the -F option from tor-resolve.Nick Mathewson
It used to mean "Force": it would tell tor-resolve to ask tor to resolve an address even if it ended with .onion. But when AutomapHostsOnResolve was added, automatically refusing to resolve .onion hosts stopped making sense. So in 0.2.1.16-rc (commit 298dc95dfd8), we made tor-resolve happy to resolve anything. The -F option stayed in, though, even though it didn't do anything. Oddly, it never got documented. Found while fixing GCC 4.6 "set, unused variable" warnings.
2011-10-26manually backport a5232e0c4cRoger Dingledine
2011-10-26Merge branch 'maint-0.2.2'Roger Dingledine
2011-10-26Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine
2011-10-26closer to a changelog for the next alphaRoger Dingledine
2011-10-26stop asserting at bootRoger Dingledine
The patch for 3228 made us try to run init_keys() before we had loaded our state file, resulting in an assert inside init_keys. We had moved it too early in the function. Now it's later in the function, but still above the accounting calls.
2011-10-26Reinit keys at the start of options_act().Nick Mathewson
Previously we did this nearer to the end (in the old_options && transition_affects_workers() block). But other stuff cares about keys being consistent with options... particularly anything which tries to access a key, which can die in assert_identity_keys_ok(). Fixes bug 3228; bugfix on 0.2.2.18-alpha. Conflicts: src/or/config.c
2011-10-26Don't crash a bridge authority on SIGHUP if it's not in the consensusRobert Ransom
Fixes bug 2572.
2011-10-26Fix assert for relay/bridge state changeSebastian Hahn
When we added support for separate client tls certs on bridges in a2bb0bfdd5 we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433. Conflicts: src/or/config.c
2011-10-26Merge branch 'cov_run224_squashed'Nick Mathewson
2011-10-26Changelog for recent coverity issuesNick Mathewson
2011-10-26Fix memory leak in retry_all_listeners: Coverity CID 485Nick Mathewson