summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-07-28forward-port the 0.2.4.23 changelogtor-0.2.5.6-alphaRoger Dingledine
2014-07-28Merge branch 'maint-0.2.5' into release-0.2.5Roger Dingledine
2014-07-28bump to 0.2.5.6-alphaRoger Dingledine
2014-07-28Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
2014-07-28bump to 0.2.4.23Roger Dingledine
2014-07-28give 0.2.5.6-alpha a blurb and release dateRoger Dingledine
2014-07-28fold in a few moreRoger Dingledine
2014-07-28Merge branch 'maint-0.2.5' into release-0.2.5Roger Dingledine
2014-07-28Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
2014-07-28Warn and drop the circuit if we receive an inbound 'relay early' cellRoger Dingledine
Those used to be normal to receive on hidden service circuits due to bug 1038, but the buggy Tor versions are long gone from the network so we can afford to resume watching for them. Resolves the rest of bug 1038; bugfix on 0.2.1.19.
2014-07-27add a changes file for bug 12718Roger Dingledine
2014-07-27Confusing log message when circuit can't be extendedArlo Breault
2014-07-25get rid of already-merged prop221 changes fileRoger Dingledine
2014-07-25Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
Conflicts: src/or/or.h
2014-07-25circuit_build_failed: distinguish "first hop chan failed", "CREATE failed"Nick Mathewson
Roger spotted this on tor-dev in his comments on proposal 221. (Actually, detect DESTROY vs everything else, since arma likes network timeout indicating failure but not overload indicating failure.)
2014-07-25Implement proposal 221: Stop sending CREATE_FASTNick Mathewson
This makes FastFirstHopPK an AUTOBOOL; makes the default "auto"; and makes the behavior of "auto" be "look at the consensus."
2014-07-24get rid of already-merged bug12227 changes fileRoger Dingledine
2014-07-24Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
2014-07-24Avoid illegal read off end of an array in prune_v2_cipher_listNick Mathewson
This function is supposed to construct a list of all the ciphers in the "v2 link protocol cipher list" that are supported by Tor's openssl. It does this by invoking ssl23_get_cipher_by_char on each two-byte ciphersuite ID to see which ones give a match. But when ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS ciphersuite ID, it checks to see whether it has a match for a three-byte SSL2 ciphersuite ID. This was causing a read off the end of the 'cipherid' array. This was probably harmless in practice, but we shouldn't be having any uninitialized reads. (Using ssl23_get_cipher_by_char in this way is a kludge, but then again the entire existence of the v2 link protocol is kind of a kludge. Once Tor 0.2.2 clients are all gone, we can drop this code entirely.) Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.
2014-07-24fix typo that crept in to 0.2.4.4-alphaRoger Dingledine
2014-07-24fold in changes for 0.2.5.6-alpha so farRoger Dingledine
2014-07-24Merge branch 'maint-0.2.5' into release-0.2.5Roger Dingledine
2014-07-24Raise guard threshold to top 25% or 2000 kilounitsRoger Dingledine
Authorities now assign the Guard flag to the fastest 25% of the network (it used to be the fastest 50%). Also raise the consensus weight that guarantees the Guard flag from 250 to 2000. For the current network, this results in about 1100 guards, down from 2500. This step paves the way for moving the number of entry guards down to 1 (proposal 236) while still providing reasonable expected performance for most users. Implements ticket 12690.
2014-07-24Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
2014-07-24update manpage for numentryguards / numdirectoryguardsRoger Dingledine
2014-07-24add a NumDirectoryGuards consensus param tooRoger Dingledine
2014-07-24Add and use a new NumEntryGuards consensus parameter.Roger Dingledine
When specified, it overrides our default of 3 entry guards. (By default, it overrides the number of directory guards too.) Implements ticket 12688.
2014-07-23Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-07-23Merge branch 'curve25519-donna32' into maint-0.2.4Nick Mathewson
2014-07-23Put the bug number and correct credits in the changes file for the new ↵Nick Mathewson
curve25519-donna32
2014-07-21Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-07-21Merge remote-tracking branch 'karsten/geoip6-jul2014' into maint-0.2.4Nick Mathewson
2014-07-21Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-07-21update changes entry with info for 11578 patchNick Mathewson
2014-07-21Fix warning on building with buffereventsSathyanarayanan Gunasekaran
Fixes #11578
2014-07-18Use safe_str in channel_dumpstats: improve 12184 diagnosticNick Mathewson
2014-07-18Update geoip6 to the July 10 2014 database.Karsten Loesing
2014-07-18Update geoip to the July 10 2014 database.Karsten Loesing
2014-07-17Merge remote-tracking branch 'public/bug12602_024' into maint-0.2.5Nick Mathewson
2014-07-17Fix compilation with no-compression OpenSSL builds and forksNick Mathewson
Found because LibreSSL has OPENSSL_NO_COMP always-on, but this conflicts with the way that _we_ turn off compression. Patch from dhill, who attributes it to "OpenBSD". Fixes bug 12602; bugfix on 0.2.1.1-alpha, which introduced this turn-compression-off code.
2014-07-16changes file for 12474, 12438.Nick Mathewson
2014-07-16src/or/connection.c: expose bucket_millis_empty for bufferevents testAnthony G. Basile
Currently tor fails to build its test when enabled with bufferevents because an #ifndef USE_BUFFEREVENTS hides bucket_millis_empty() and friends. This is fine if we don't run tests, but if we do, we need these functions in src/or/libtor-testing.a when linking src/test/test. This patch moves the functions outside the #ifndef and exposes them. See downstream bug: https://bugs.gentoo.org/show_bug.cgi?id=510124
2014-07-16configure.ac: fix build with --enable-buffereventsAnthony G. Basile
When building with bufferevents enabled, configure.ac throws an error if "$ac_cv_header_event2_bufferevent_ssl_h" is not set to "yes". However, nowhere was AC_CHECK_HEADERS(event2/bufferevent_ssl.h) done. This commit adds the check.
2014-07-16diagnostic for 12184: Add a call to channel_dump_statisticsNick Mathewson
2014-07-16Add another 8387 diagnosticNick Mathewson
When we run into bug 8387 (if we run into it again), report when we last called circuit_expire_old_circuits_clientside(). This will let us know -- if my fix for 8387 doesn't work -- whether my diagnosis was at least correct. Suggested by Andrea.
2014-07-16Merge remote-tracking branch 'public/bug8387_024' into maint-0.2.5Nick Mathewson
2014-07-15Small tweaks to make curve25519-donna32 compile with our warningsNick Mathewson
2014-07-15Update to latest curve25519-donna32Nick Mathewson
2014-07-09Fix a bug where streams would linger forever when we had no dirinfoNick Mathewson
fixes bug 8387; fix on 0.1.1.11-alpha (code), or on 0.2.4.10-alpha (behavior).
2014-07-09Remove executable bit from control.c, router.cNick Mathewson
Fix for 12512.