summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2013-09-05give it a blurb and touch up the changelog stanzastor-0.2.4.17-rcRoger Dingledine
2013-09-05bump to 0.2.4.17-rcRoger Dingledine
2013-09-05fold in another changes itemRoger Dingledine
2013-09-05Merge branch 'maint-0.2.4' into release-0.2.4Roger Dingledine
2013-09-05collect and log statistics about onionskins received/processedRoger Dingledine
we skip onionskins that came from non-relays, so we're less likely to run into privacy troubles. starts to implement ticket 9658.
2013-09-05Revert e443beff and solve it a different wayRoger Dingledine
Now we explicitly check for overflow. This approach seemed smarter than a cascade of "change int to unsigned int and hope nothing breaks right before the release". Nick, feel free to fix in a better way, maybe in master.
2013-09-05don't let recently_chosen_ntors overflowRoger Dingledine
with commit c6f1668d we let it grow arbitrarily large. it can still overflow, but the damage is very small now.
2013-09-04fold in recent changes entriesRoger Dingledine
2013-09-04Merge branch 'maint-0.2.4' into release-0.2.4Roger Dingledine
2013-09-04nickm wants us to prioritize tap in a currently-rare edge caseRoger Dingledine
2013-09-04add a changes entry for ticket 9574Roger Dingledine
2013-09-04Be more general in calculating expected onion queue processing timeRoger Dingledine
Now we consider the TAP cells we'll process while draining the NTor queue, and vice versa.
2013-09-04let the NumNTorsPerTAP consensus param override our queue choiceRoger Dingledine
2013-09-04do a lopsided round-robin between the onion queuesRoger Dingledine
that way tap won't starve entirely, but we'll still handle ntor requests quicker.
2013-09-04check bounds on handshake_type more thoroughlyRoger Dingledine
2013-09-04add info-level logs to help track onion queue sizesRoger Dingledine
2013-09-04refactor and give it unit testsRoger Dingledine
2013-09-04Separate cpuworker queues by handshake typeRoger Dingledine
Now we prioritize ntor create cells over tap create cells. Starts to address ticket 9574.
2013-09-04Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/circuitbuild.c
2013-09-04Merge branch 'bug9671_023' into maint-0.2.3Nick Mathewson
2013-09-04use !cbt_disabled in place of LearnCBT to avoid needless circsNick Mathewson
This would make us do testing circuits "even when cbt is disabled by consensus, or when we're a directory authority, or when we've failed to write cbt history to our state file lately." (Roger's words.) This is a fix for 9671 and an improvement in our fix for 5049. The original misbehavior was in 0.2.2.14-alpha; the incomplete fix was in 0.2.3.17-beta.
2013-09-03Merge branch 'bug9400_024_squashed' into maint-0.2.4Nick Mathewson
2013-09-03Avoid a double-close on one failing case of the socketpair replacement codeNick Mathewson
Fix for bug 9400, spotted by coverity. Bug introduced in revision 2cb4f7a4 (subversion revision r389).
2013-08-31fold in changes entriesRoger Dingledine
2013-08-31Merge branch 'maint-0.2.4' into release-0.2.4Roger Dingledine
2013-08-25Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
(Using "ours" strategy to avoid taking 9546 fix in 0.2.3; we just merged our own into 0.2.4)
2013-08-25Merge remote-tracking branch 'public/bug9546_023_v2' into maint-0.2.3Nick Mathewson
2013-08-25Merge remote-tracking branch 'public/bug9546_v2' into maint-0.2.4Nick Mathewson
2013-08-25Merge remote-tracking branch 'public/bug9366' into maint-0.2.4Nick Mathewson
2013-08-25Merge remote-tracking branch 'public/bug9543' into maint-0.2.4Nick Mathewson
2013-08-22Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2013-08-22Merge remote-tracking branch 'public/bug9564' into maint-0.2.3Nick Mathewson
2013-08-22Replace return with continue in update_consensus_networkstatus_downloadsNick Mathewson
Fix for bug 9564; bugfix on 0.2.3.14-alpha.
2013-08-21Add a 30-day maximum on user-supplied MaxCircuitDirtinessNick Mathewson
Fix for bug 9543.
2013-08-21Make bridges send AUTH_CHALLENGE cellsNick Mathewson
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
2013-08-21Make bridges send AUTH_CHALLENGE cellsNick Mathewson
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
2013-08-21Send NETINFO on receiving a NETINFO if we have not yet sent one.Nick Mathewson
(Backport to Tor 0.2.3) Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
2013-08-20Send NETINFO on receiving a NETINFO if we have not yet sent one.Nick Mathewson
Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
2013-08-16Document the correct loglevel for the heartbeat messageNick Mathewson
2013-08-13Correction in the 0.2.4.16-rc changelogNick Mathewson
2013-08-12Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2013-08-12Merge remote-tracking branch 'origin/maint-0.2.2' into maint-0.2.3Nick Mathewson
2013-08-12Update to the August 2013 GeoIP database.Karsten Loesing
2013-08-10bump to 0.2.4.16-rctor-0.2.4.16-rcRoger Dingledine
2013-08-10give it a blurb and a dateRoger Dingledine
2013-08-10fold in change stanzaRoger Dingledine
2013-08-10Merge branch 'maint-0.2.4' into release-0.2.4Roger Dingledine
2013-08-10Fix an uninitialized-read when parsing v3 introduction requests.Nick Mathewson
Fortunately, later checks mean that uninitialized data can't get sent to the network by this bug. Unfortunately, reading uninitialized heap *can* (in some cases, with some allocators) cause a crash if you get unlucky and go off the end of a page. Found by asn. Bugfix on 0.2.4.1-alpha.
2013-08-06Use SOCKET_OK/TOR_INVALID_SOCKET in socketpair replacement codeNick Mathewson
2013-08-05Don't allow all ORPort values to be NoAdvertiseNick Mathewson
Fix for bug #9366