Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-03-09 | Don't use checked strl{cat,cpy} on OSX. | Nick Mathewson | |
There is a bug in the overlap-checking in strlcat that can crash Tor servers. Fixes bug 15205; this is an OSX bug, not a Tor bug. | |||
2015-03-04 | Make TransProxyType ipfw work correctly | Nick Mathewson | |
Fixes bug 15064; bugfix on 0.2.5.4-alpha. | |||
2015-02-24 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2015-02-24 | Merge remote-tracking branch 'public/bug14129_024' into maint-0.2.4 | Nick Mathewson | |
2015-02-20 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2015-02-16 | Faravahar's New IP Address as of 2/20/2015 | Sina Rabbani | |
2015-01-23 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2015-01-23 | Merge remote-tracking branch 'karsten/geoip6-jan2015' into maint-0.2.4 | Nick Mathewson | |
2015-01-23 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2015-01-22 | Update geoip6 to the January 7 2015 database. | Karsten Loesing | |
2015-01-22 | Update geoip to the January 7 2015 database. | Karsten Loesing | |
2015-01-16 | fix another mingw64 unit test warnin | Nick Mathewson | |
2015-01-15 | Fix a compilation warning in the unit tests | Nick Mathewson | |
2015-01-15 | Ignore warning for redundant decl in openssl/srtp.h | Nick Mathewson | |
Backports some commits from tor master. | |||
2015-01-13 | Remove needless strdup in addressmap_register_virtual_address() | Nick Mathewson | |
Fixes bug 14195. Bugfix on 0.1.0.1-rc. | |||
2015-01-12 | Merge remote-tracking branch 'public/bug14129_024' into maint-0.2.5 | Nick Mathewson | |
2015-01-11 | Don't crash on torrc Vi[rtualAddrNetworkIPv[4|6]] with no option value | teor | |
Check for a missing option value in parse_virtual_addr_network before asserting on the NULL in tor_addr_parse_mask_ports. This avoids crashing on torrc lines like Vi[rtualAddrNetworkIPv[4|6]] when no value follows the option. Bugfix on 0.2.3 (de4cc126cbb5 on 24 November 2012), fixes #14142. | |||
2015-01-08 | Avoid attempts to double-remove edge connections from the DNS resolver. | Nick Mathewson | |
Also, avoid crashing when we attempt to double-remove an edge connection from the DNS resolver: just log a bug warning instead. Fixes bug 14129. Bugfix on 0d20fee2fbd48978, which was in 0.0.7rc1. jowr found the bug. cypherpunks wrote the fix. I added the log message and removed the assert. | |||
2015-01-07 | Enlarge the buffer for a line in a bw file | Sebastian Hahn | |
2014-12-23 | whoops; missing changes file for 14013 | Nick Mathewson | |
2014-12-22 | Merge remote-tracking branch 'public/bug14013_024' into maint-0.2.5 | Nick Mathewson | |
2014-12-22 | When decoding a base-{16,32,64} value, clear the target buffer first | Nick Mathewson | |
This is a good idea in case the caller stupidly doesn't check the return value from baseX_decode(), and as a workaround for the current inconsistent API of base16_decode. Prevents any fallout from bug 14013. | |||
2014-11-24 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2014-11-24 | Merge remote-tracking branch 'karsten/geoip6-nov2014' into maint-0.2.4 | Nick Mathewson | |
2014-11-24 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-11-24 | Update geoip6 to the November 15 2014 database. | Karsten Loesing | |
2014-11-24 | Update geoip to the November 15 2014 database. | Karsten Loesing | |
2014-11-19 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2014-11-19 | Update longclaw dirauth IP to be a more stable location | Micah Anderson | |
2014-11-12 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
Conflicts: src/or/config.c | |||
2014-11-12 | Add changes file for #13926 | Sebastian Hahn | |
2014-11-12 | Remove turtles as a directory authority (#13296) | Micah Anderson | |
2014-11-12 | Add longclaw as a directory authority (#13296) | Micah Anderson | |
2014-10-24 | bump version to 0.2.5.10-dev | Nick Mathewson | |
2014-10-20 | bump maint-0.2.5 to 0.2.5.9-rc-dev | Nick Mathewson | |
2014-10-20 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2014-10-20 | Whoops, bump the version properly. | Nick Mathewson | |
2014-10-20 | bump maint-0.2.4 to 0.2.4.25-dev | Nick Mathewson | |
2014-10-19 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2014-10-19 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-10-19 | Note that our #13426 fix is also a #13471 fix. | Nick Mathewson | |
See also http://marc.info/?l=openssl-dev&m=141357408522028&w=2 | |||
2014-10-16 | Downgrade 'unexpected sendme cell from client' to PROTOCOL_WARN | Nick Mathewson | |
Closes 8093. | |||
2014-10-16 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2014-10-16 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-10-16 | Merge branch 'no_sslv3_023' into maint-0.2.3 | Nick Mathewson | |
2014-10-15 | Disable SSLv3 unconditionally. Closes ticket 13426. | Nick Mathewson | |
The POODLE attack doesn't affect Tor, but there's no reason to tempt fate: SSLv3 isn't going to get any better. | |||
2014-10-03 | Merge remote-tracking branch 'public/bug13325_024' into maint-0.2.5 | Nick Mathewson | |
2014-10-03 | Run correctly on OpenBSD systems without SSL_METHOD.get_cipher_by_char | Nick Mathewson | |
Also, make sure we will compile correctly on systems where they finally rip it out. Fixes issue #13325. Caused by this openbsd commit: ​http://marc.info/?l=openbsd-cvs&m=140768179627976&w=2 Reported by Fredzupy. | |||
2014-09-29 | Merge branch 'bug13295_v2_025' into maint-0.2.5 | Nick Mathewson | |
2014-09-29 | Don't use the getaddrinfo sandbox cache from tor-resolve | Nick Mathewson | |
Fixes bug 13295; bugfix on 0.2.5.3-alpha. The alternative here is to call crypto_global_init() from tor-resolve, but let's avoid linking openssl into tor-resolve for as long as we can. |