summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-03-09Update geoip6 to the March 3 2015 database.Karsten Loesing
2015-03-09Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2015-03-09Adjust changes headerNick Mathewson
2015-03-03Make the assert related to 15083 a tiny bit more tolerantNick Mathewson
2015-03-03Do not leave empty, invalid chunks in buffers during buf_pullupNick Mathewson
This fixes an assertion failure bug in 15083; bugfix on 0.2.0.10-alpha. Patch from 'cypherpunks'
2015-02-24Merge remote-tracking branch 'public/bug14129_024' into maint-0.2.4Nick Mathewson
2015-02-16Faravahar's New IP Address as of 2/20/2015Sina Rabbani
2015-01-23Merge remote-tracking branch 'karsten/geoip6-jan2015' into maint-0.2.4Nick Mathewson
2015-01-23Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2015-01-22Update geoip6 to the January 7 2015 database.Karsten Loesing
2015-01-22Update geoip to the January 7 2015 database.Karsten Loesing
2015-01-08Avoid attempts to double-remove edge connections from the DNS resolver.Nick Mathewson
Also, avoid crashing when we attempt to double-remove an edge connection from the DNS resolver: just log a bug warning instead. Fixes bug 14129. Bugfix on 0d20fee2fbd48978, which was in 0.0.7rc1. jowr found the bug. cypherpunks wrote the fix. I added the log message and removed the assert.
2014-11-24Merge remote-tracking branch 'karsten/geoip6-nov2014' into maint-0.2.4Nick Mathewson
2014-11-24Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-11-24Update geoip6 to the November 15 2014 database.Karsten Loesing
2014-11-24Update geoip to the November 15 2014 database.Karsten Loesing
2014-11-19Update longclaw dirauth IP to be a more stable locationMicah Anderson
2014-11-12Add changes file for #13926Sebastian Hahn
2014-11-12Remove turtles as a directory authority (#13296)Micah Anderson
2014-11-12Add longclaw as a directory authority (#13296)Micah Anderson
2014-10-20Whoops, bump the version properly.Nick Mathewson
2014-10-20bump maint-0.2.4 to 0.2.4.25-devNick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-19Note that our #13426 fix is also a #13471 fix.Nick Mathewson
See also http://marc.info/?l=openssl-dev&m=141357408522028&w=2
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-16Merge branch 'no_sslv3_023' into maint-0.2.3Nick Mathewson
2014-10-15Disable SSLv3 unconditionally. Closes ticket 13426.Nick Mathewson
The POODLE attack doesn't affect Tor, but there's no reason to tempt fate: SSLv3 isn't going to get any better.
2014-09-20Merge branch 'maint-0.2.3' into maint-0.2.4Roger Dingledine
2014-09-20gabelmoo's IPv4 address changedSebastian Hahn
2014-09-16clients now send correct address for rendezvous pointRoger Dingledine
Clients now send the correct address for their chosen rendezvous point when trying to access a hidden service. They used to send the wrong address, which would still work some of the time because they also sent the identity digest of the rendezvous point, and if the hidden service happened to try connecting to the rendezvous point from a relay that already had a connection open to it, the relay would reuse that connection. Now connections to hidden services should be more robust and faster. Also, this bug meant that clients were leaking to the hidden service whether they were on a little-endian (common) or big-endian (rare) system, which for some users might have reduced their anonymity. Fixes bug 13151; bugfix on 0.2.1.5-alpha.
2014-08-13Merge remote-tracking branch 'karsten/geoip6-aug2014' into maint-0.2.4Nick Mathewson
2014-08-13Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-08-13Update geoip6 to the August 7 2014 database.Karsten Loesing
2014-08-13Update geoip to the August 7 2014 database.Karsten Loesing
2014-08-09fix extra words in man pageRoger Dingledine
2014-07-28bump to 0.2.4.23Roger Dingledine
2014-07-28Warn and drop the circuit if we receive an inbound 'relay early' cellRoger Dingledine
Those used to be normal to receive on hidden service circuits due to bug 1038, but the buggy Tor versions are long gone from the network so we can afford to resume watching for them. Resolves the rest of bug 1038; bugfix on 0.2.1.19.
2014-07-27add a changes file for bug 12718Roger Dingledine
2014-07-27Confusing log message when circuit can't be extendedArlo Breault
2014-07-25circuit_build_failed: distinguish "first hop chan failed", "CREATE failed"Nick Mathewson
Roger spotted this on tor-dev in his comments on proposal 221. (Actually, detect DESTROY vs everything else, since arma likes network timeout indicating failure but not overload indicating failure.)
2014-07-25Implement proposal 221: Stop sending CREATE_FASTNick Mathewson
This makes FastFirstHopPK an AUTOBOOL; makes the default "auto"; and makes the behavior of "auto" be "look at the consensus."
2014-07-24Avoid illegal read off end of an array in prune_v2_cipher_listNick Mathewson
This function is supposed to construct a list of all the ciphers in the "v2 link protocol cipher list" that are supported by Tor's openssl. It does this by invoking ssl23_get_cipher_by_char on each two-byte ciphersuite ID to see which ones give a match. But when ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS ciphersuite ID, it checks to see whether it has a match for a three-byte SSL2 ciphersuite ID. This was causing a read off the end of the 'cipherid' array. This was probably harmless in practice, but we shouldn't be having any uninitialized reads. (Using ssl23_get_cipher_by_char in this way is a kludge, but then again the entire existence of the v2 link protocol is kind of a kludge. Once Tor 0.2.2 clients are all gone, we can drop this code entirely.) Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.
2014-07-24update manpage for numentryguards / numdirectoryguardsRoger Dingledine
2014-07-24add a NumDirectoryGuards consensus param tooRoger Dingledine
2014-07-24Add and use a new NumEntryGuards consensus parameter.Roger Dingledine
When specified, it overrides our default of 3 entry guards. (By default, it overrides the number of directory guards too.) Implements ticket 12688.
2014-07-23Merge branch 'curve25519-donna32' into maint-0.2.4Nick Mathewson
2014-07-23Put the bug number and correct credits in the changes file for the new ↵Nick Mathewson
curve25519-donna32
2014-07-21Merge remote-tracking branch 'karsten/geoip6-jul2014' into maint-0.2.4Nick Mathewson
2014-07-21Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-07-18Update geoip6 to the July 10 2014 database.Karsten Loesing