Age | Commit message (Collapse) | Author | |
---|---|---|---|
2014-05-16 | copy 0.2.4.22 notes into releasenotestor-0.2.4.22 | Nick Mathewson | |
2014-05-16 | Pick a release date for 0.2.4.22 | Nick Mathewson | |
2014-05-14 | match the changelog entries from 0.2.5.x when possible | Roger Dingledine | |
2014-05-14 | group the sections | Roger Dingledine | |
2014-05-14 | two small fixes, and downgrade a severity | Roger Dingledine | |
2014-05-14 | Bump release-0.2.4 version to 0.2.4.22 | Nick Mathewson | |
This is not officially released yet; it needs some QA first. | |||
2014-05-14 | Reflow, slightly tidy Changelog | Nick Mathewson | |
2014-05-14 | changelog edits for 0.2.4.22 | Nick Mathewson | |
2014-05-07 | mark backported changelog entries and ensure that they match the changelog. | Nick Mathewson | |
2014-05-07 | Begin work on a changelog for 0.2.4.22 by copying in the changes files unedited | Nick Mathewson | |
2014-05-07 | Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 | Nick Mathewson | |
2014-05-07 | Merge commit 'bb9b4c37f8e7f5cf78918f382e90d8b11ff42551' into maint-0.2.4 | Nick Mathewson | |
2014-05-07 | Merge remote-tracking branch 'public/ticket11528_024' into maint-0.2.4 | Nick Mathewson | |
2014-05-07 | Merge remote-tracking branch 'public/bug11513_024' into maint-0.2.4 | Nick Mathewson | |
2014-05-07 | Merge remote-tracking branch 'public/update_ciphers_ff28' into maint-0.2.4 | Nick Mathewson | |
2014-05-01 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
Conflicts: src/or/microdesc.c | |||
2014-05-01 | Downgrade bug 7164 warning to INFO | Nick Mathewson | |
The 0.2.5.x warning is the one that might help us track this down; the warnings in stable are just annoying users over and over and over. | |||
2014-04-30 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-04-30 | Merge remote-tracking branch 'public/bug10849_023_bruteforce' into maint-0.2.3 | Nick Mathewson | |
2014-04-29 | Drop the MaxMemInCellQueues lower limit down to 256 MB. | Nick Mathewson | |
on #9686, gmorehose reports that the 500 MB lower limit is too high for raspberry pi users. This is a backport of 647248729fa65f0e51d062e2af8f4e8b38592bf5 to 0.2.4. Note that in 0.2.4, the option is called MaxMemInCellQueues. | |||
2014-04-29 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-04-29 | Stop leaking memory in error cases of md parsing | Nick Mathewson | |
When clearing a list of tokens, it's important to do token_clear() on them first, or else any keys they contain will leak. This didn't leak memory on any of the successful microdescriptor parsing paths, but it does leak on some failing paths when the failure happens during tokenization. Fixes bug 11618; bugfix on 0.2.2.6-alpha. | |||
2014-04-25 | Forbid TunneledDirConns 0 and PreferTunneledDirConns 0 if being a HS | Nick Mathewson | |
Fixes bug 10849; bugfix on 0.2.1.1-alpha (I believe) | |||
2014-04-24 | Add a missing changelog entry back from 0.2.4.11-alpha | Nick Mathewson | |
When I merged the fix for #7351, and implemented proposal 214 (4-byte circuit IDs), I forgot to add a changes file. Later, we never noticed that it didn't have one. Resolves ticket #11555. Thanks to cypherpunks for noticing this was missing. | |||
2014-04-23 | Merge branch 'maint-0.2.4' into release-0.2.4 | Roger Dingledine | |
2014-04-23 | Merge remote-tracking branch 'public/bug9229_024' into maint-0.2.4 | Nick Mathewson | |
2014-04-18 | Supply better and less frequent warnings on circID exhaustion | Nick Mathewson | |
Fixes the surface behavior of #11553 | |||
2014-04-17 | Elevate server TLS cipher preferences over client | Nick Mathewson | |
The server cipher list is (thanks to #11513) chosen systematically to put the best choices for Tor first. The client cipher list is chosen to resemble a browser. So let's set SSL_OP_CIPHER_SERVER_PREFERENCE to have the servers pick according to their own preference order. | |||
2014-04-16 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-04-16 | remove note about dannenberg; it has upgraded. | Nick Mathewson | |
2014-04-16 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-04-16 | Update the authority signing key blacklist | Nick Mathewson | |
Now it only has dannenberg | |||
2014-04-15 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
Conflicts: src/or/circuituse.c | |||
2014-04-15 | Merge remote-tracking branch 'public/bug11519_023' into maint-0.2.3 | Nick Mathewson | |
2014-04-14 | Don't send uninitialized stack to the controller and say it's a date. | Nick Mathewson | |
Fixes bug 11519, apparently bugfix on 0.2.3.11-alpha. | |||
2014-04-14 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
Conflicts: src/or/routerlist.h | |||
2014-04-14 | Merge branch 'bug11464_023_squashed' into maint-0.2.3 | Nick Mathewson | |
2014-04-14 | Tweak changes file and comment dates. | Nick Mathewson | |
2014-04-14 | Fill in the list of blacklisted signing keys. | Nick Mathewson | |
I used a list of certificate files from arma, and a little script, both at 11464. | |||
2014-04-14 | Code to blacklist authority signing keys | Nick Mathewson | |
(I need a list of actual signing keys to blacklist.) | |||
2014-04-14 | New sort order for server choice of ciphersuites. | Nick Mathewson | |
Back in 175b2678, we allowed servers to recognize clients who are telling them the truth about their ciphersuites, and select the best cipher from on that list. This implemented the server side of proposal 198. In bugs 11492, 11498, and 11499, cypherpunks found a bunch of mistakes and omissions and typos in the UNRESTRICTED_SERVER_CIPHER_LIST we had. In #11513, I found a couple more. Rather than try to hand-edit this list, I wrote a short python script to generate our ciphersuite preferences from the openssl headers. The new rules are: * Require forward secrecy. * Require RSA (since our servers only configure RSA keys) * Require AES or 3DES. (This means, reject RC4, DES, SEED, CAMELLIA, and NULL.) * No export ciphersuites. Then: * Prefer AES to 3DES. * If both suites have the same cipher, prefer ECDHE to DHE. * If both suites have the same DHE group type, prefer GCM to CBC. * If both suites have the same cipher mode, prefer SHA384 to SHA256 to SHA1. * If both suites have the same digest, prefer AES256 to AES128. | |||
2014-04-08 | Merge remote-tracking branch 'public/bug11437_024' into maint-0.2.4 | Nick Mathewson | |
2014-04-08 | Update ciphers.inc to match ff28 | Nick Mathewson | |
The major changes are to re-order some ciphers, to drop the ECDH suites (note: *not* ECDHE: ECDHE is still there), to kill off some made-up stuff (like the SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA suite), to drop some of the DSS suites... *and* to enable the ECDHE+GCM ciphersuites. This change is autogenerated by get_mozilla_ciphers.py from Firefox 28 and OpenSSL 1.0.1g. Resolves ticket 11438. | |||
2014-04-08 | Teach the get_mozilla_ciphers.py script to parse recent firefoxen | Nick Mathewson | |
2014-04-07 | Fix a small memory leak when resolving PTR addresses | Nick Mathewson | |
Fixes bug 11437; bugfix on 0.2.4.7-alpha. Found by coverity; this is CID 1198198. | |||
2014-04-01 | Merge branch 'bug9213_doc_024' into maint-0.2.4 | Nick Mathewson | |
2014-04-01 | Fix documentation of torrc search order | Nick Mathewson | |
We are searching @CONFDIR@ before $HOME, but the documentation implied otherwise. I screwed this up in f5e86bcd6c06d43ff3af5acd8135bd8b577bc3, when I first documented the $HOME/.torrc possibility. Fix for bug 9213; bugfix on 0.2.3.18-rc. | |||
2014-03-27 | whitespace fix | Nick Mathewson | |
2014-03-20 | Fix unittest compilation with --disable-curve25519 | Nick Mathewson | |
This is a fix for 9700, which we already fixed in 0.2.5.x, but which got left in 0.2.4.x. This is a partial backport of a0a855d586d99540277014ccd3 | |||
2014-03-11 | Remove the unused router_hex_digest_matches | Nick Mathewson | |
When I removed some unused functions in 5bfa373eeeb, this became unused as well. |