summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-05-28Fix the position-check for ed25519 certs to work with annotationsNick Mathewson
When there are annotations on a router descriptor, the ed25519-identity element won't be at position 0 or 1; it will be at router+1 or router-1. This patch also adds a missing smartlist function to search a list for an item with a particular pointer.
2015-05-28Tie key-pinning logic into directory authority operationNick Mathewson
With this patch: * Authorities load the key-pinning log at startup. * Authorities open a key-pinning log for writing at startup. * Authorities reject any router with an ed25519 key where they have previously seen that ed25519 key with a different RSA key, or vice versa. * Authorities warn about, but *do not* reject, RSA-only descriptors when the RSA key has previously gone along with an Ed25519 key. (We should make this a 'reject' too, but we can't do that until we're sure there's no legit reason to downgrade to 0.2.5.)
2015-05-28Key-pinning back-end for directory authorities.Nick Mathewson
This module implements a key-pinning mechanism to ensure that it's safe to use RSA keys as identitifers even as we migrate to Ed25519 keys. It remembers, for every Ed25519 key we've seen, what the associated Ed25519 key is. This way, if we see a different Ed25519 key with that RSA key, we'll know that there's a mismatch. We persist these entries to disk using a simple format, where each line has a base64-encoded RSA SHA1 hash, then a base64-endoded Ed25519 key. Empty lines, misformed lines, and lines beginning with a # are ignored. Lines beginning with @ are reserved for future extensions.
2015-05-28Implement proposal 228: cross-certification with onion keysNick Mathewson
Routers now use TAP and ntor onion keys to sign their identity keys, and put these signatures in their descriptors. That allows other parties to be confident that the onion keys are indeed controlled by the router that generated the descriptor.
2015-05-28Implement proposal 228: cross-certification with onion keysNick Mathewson
Routers now use TAP and ntor onion keys to sign their identity keys, and put these signatures in their descriptors. That allows other parties to be confident that the onion keys are indeed controlled by the router that generated the descriptor.
2015-05-28Implement ed25519-signed descriptorsNick Mathewson
Now that we have ed25519 keys, we can sign descriptors with them and check those signatures as documented in proposal 220.
2015-05-28prop220: Implement certificates and key storage/creationNick Mathewson
For prop220, we have a new ed25519 certificate type. This patch implements the code to create, parse, and validate those, along with code for routers to maintain their own sets of certificates and keys. (Some parts of master identity key encryption are done, but the implementation of that isn't finished)
2015-02-24Fix whitespace from tor_x509_cert renameNick Mathewson
2015-02-24Mechanical rename: tor_cert_t -> tor_x509_cert_tNick Mathewson
2015-02-24Merge remote-tracking branch 'origin/maint-0.2.6'Nick Mathewson
2015-02-24Add sections to changes files; please lintchangesNick Mathewson
2015-02-24Merge remote-tracking branch 'origin/maint-0.2.6'Nick Mathewson
2015-02-24Log less/better about systemd at startupNick Mathewson
Report errors if the notification fails; report success only if it succeeds; and if we are not notifying systemd because we aren't running with systemd, don't log at notice.
2015-02-24changes file for ticket 14950Nick Mathewson
2015-02-24Bump master to 0.2.7tor-0.2.7.0-rootNick Mathewson
2015-02-24Update test_status.c to accommodate changes in heartbeat messagesNick Mathewson
Fixes #15012; bug not in any released Tor
2015-02-23Merge branch 'bug14950_logs_squashed'Nick Mathewson
2015-02-23Avoid logging natural-language reports that are redundant with bootstrappingNick Mathewson
2015-02-23Usually downgrade middle heartbeat messages when stuff is in-rangeNick Mathewson
2015-02-23Merge branch 'bug14989'Nick Mathewson
2015-02-23Let AF_UNIX connections through the sandboxNick Mathewson
Fixes bug 15003; bugfix on 0.2.6.3-alpha.
2015-02-23Fix running with the seccomp2 sandboxNick Mathewson
We had a regression in 0.2.6.3-alpha when we stopped saying IPPROTO_TCP to socket(). Fixes bug 14989, bugfix on 0.2.6.3-alpha.
2015-02-23Merge remote-tracking branch 'public/bug14988_025'Nick Mathewson
2015-02-23add another unused-var marker in backtrace.c for 14988Nick Mathewson
2015-02-23changes file for 5246e8f99255b376ded3d90b3c7a345c4748e68cNick Mathewson
2015-02-23Remove lingering mempool codecypherpunks
2015-02-23Fix endianness issues in test_config_resolve_my_address().rl1987
Since resolve_my_address() yields IP address in host order there is no need to use byteorder functions for conversion.
2015-02-20Merge remote-tracking branch 'public/bug11454_11457'Nick Mathewson
2015-02-20Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2015-02-20Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2015-02-19bump version to 0.2.6.3-alpha-devNick Mathewson
2015-02-19Adjust changelog to combine 3 sections about the same thingtor-0.2.6.3-alphaNick Mathewson
2015-02-19Pick a date (today)Nick Mathewson
2015-02-19Quiet "caching debian-tor for debian-tor" noticeNick Mathewson
2015-02-19fold one more entry into the changelogNick Mathewson
2015-02-19Merge branch 'AUTHDIR_NEWDESC_enough_squashed'Nick Mathewson
2015-02-19Try to fix authdir_newdesc eventsNick Mathewson
We were sending values that were truncated by the length of the annotations.
2015-02-19Increment version to 0.2.6.3-alphaNick Mathewson
2015-02-19Merge changes into changelogNick Mathewson
2015-02-19appease lintchangesNick Mathewson
2015-02-19Check for # characters in lintchangesNick Mathewson
2015-02-19reflow 0.2.6.3 changelogNick Mathewson
2015-02-19answer some of roger's questionsNick Mathewson
2015-02-19Merge branch 'bug12844_macros'Nick Mathewson
2015-02-19Merge branch 'bug13762_quiet_squashed'Nick Mathewson
2015-02-19Do not try to download an EI for which we don't have a matching SD.Nick Mathewson
This quiets some log messages for #13762, and adds a better INFO message for the underlying confusion.
2015-02-19sorry britsRoger Dingledine
2015-02-19final cleanupsRoger Dingledine
2015-02-19reach into the past and fix two changelog stanzasRoger Dingledine
2015-02-19Check ENABLE_TOR2WEB_MODE before any tor2webmode codeNick Mathewson