summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-03-06tinytest tt_{mem,str}_op now handle NULLs betterNick Mathewson
Now a NULL argument to either makes it fail, not crash. Fies bug 9004; bugfix on 0.2.2.4-alpha.
2014-03-06Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson
2014-03-06Merge branch 'bug11108'Nick Mathewson
2014-03-06Clarify default behavior of {SOCKS,Dir}Policy harderNick Mathewson
Improvement on 11108 fix; suggested by cypherpunks.
2014-03-06Give the HTTPS url for jenkins in doc/HACKINGNick Mathewson
2014-03-06Correct the URL in the "a relay on win95???" messageNick Mathewson
This is a fix for 9393; it's not a bugfix on any Tor version per se, but rather on whatever Tor version was current when we reorganized the wiki.
2014-03-05Fix whitespace errors, all of them mine.Nick Mathewson
2014-03-05Rename PredictedCircsRelevanceTime->PredictedPortsRelevanceTimeNick Mathewson
All circuits are predictive; it's the ports that are expiring here.
2014-03-05Merge branch 'ticket9176_squashed'Nick Mathewson
Conflicts: doc/tor.1.txt
2014-03-05Fix wide lines.Nick Mathewson
2014-03-05Lower the maximum for PrecictedCircsRelevanceTime to one hourNick Mathewson
2014-03-05Fixed spacing.unixninja92
2014-03-05More correctly documented PredictedCircsRelevanceTime in tor.1.txtunixninja92
2014-03-05Added max value to PredictedCircsRelevanceTime.unixninja92
2014-03-05Added Documentation for PredictedCircsRelevanceTime config file argument.unixninja92
2014-03-05PredictedCircsRelevanceTime: limit how long we predict a port will be usedunixninja92
By default, after you've made a connection to port XYZ, we assume you might still want to have an exit ready to connect to XYZ for one hour. This patch lets you lower that interval. Implements ticket 91
2014-03-05Merge remote-tracking branch 'arma/ticket5528'Nick Mathewson
Conflicts: src/or/router.c src/test/test_dir.c
2014-03-05Merge remote-tracking branch 'public/bug8788'Nick Mathewson
2014-03-04Document alternate bandwidth/memory unit spellingsNick Mathewson
2014-03-04Include v3 in documented 'protocols' in rend_service_descriptor_tNick Mathewson
Also make it unsigned and document that it's for INTRODUCE cell versions. Fixes 9099; bugfix on 0.2.1.5-alpha, which introduced the v3 protocol.
2014-03-04Merge branch 'bug10169_025_v2'Nick Mathewson
Conflicts: src/test/test.c
2014-03-04Merge remote-tracking branch 'public/bug10169_024' into bug10169_025_v2Nick Mathewson
Conflicts: src/common/compat_libevent.h src/or/relay.c
2014-03-04Merge remote-tracking branch 'public/bug10169_023' into bug10169_024Nick Mathewson
Conflicts: src/or/relay.c
2014-03-04Mention doc/HACKING in the readmeNick Mathewson
2014-03-03ATTR_NORETURN is needed on lost_owning_controller nowNick Mathewson
This should fixes some "hey, that function could have __attribute__((noreturn))" warnings introduced by f96400d9. Bug not in any released version of Tor.
2014-03-03Warn if ports are specified in {Socks,Dir}PolicyNick Mathewson
We have ignored any ports listed here since 80365b989 (0.0.7rc1), but we didn't warn the user that we were ignoring them. This patch adds a warning if you put explicit ports in any of the options {Socks,Dir}Policy or AuthDir{Reject,Invalid,BadDir,BadExit}. It also adjusts the manpage to say that ports are ignored. Fixes ticket 11108.
2014-03-03Fix compilation warnings in tor_addr_make_null patchNick Mathewson
There was one "missing prototype" warning because the test function wasn't static, and one "unused parameter" warning about the "data" parameter. Also, I added a couple of tests to make sure that the "make_null" addresses really were the addresses we expected, by formatting them as strings.
2014-03-03add test for tor_addr_make_nullKevin Murray
Signed-off-by: Kevin Murray <spam@kdmurray.id.au>
2014-03-03tweak changes file.Nick Mathewson
2014-03-03Fix max client name length in HiddenServiceAuthorizeClient descriptionLunar
REND_CLIENTNAME_MAX_LEN is set to 16, not 19.
2014-03-03trivial whitespace fixesRoger Dingledine
2014-03-01forward-port the 0.2.4.21 release notesRoger Dingledine
2014-02-28whitespace fixNick Mathewson
2014-02-28Merge branch 'bug10884_squashed'Nick Mathewson
2014-02-28Unit tests for test_routerkeys_write_fingerprintNick Mathewson
2014-02-28Unit tests for pk fingerprint functionsNick Mathewson
2014-02-28Tighten router_write_fingerprint implNick Mathewson
2014-02-28Write hashed bridge fingerprint to logs and to disk.Karsten Loesing
Implements #10884.
2014-02-28Merge remote-tracking branch 'karsten/task-5824'Nick Mathewson
2014-02-26Monotonize the OOM-killer data timersNick Mathewson
In a couple of places, to implement the OOM-circuit-killer defense against sniper attacks, we have counters to remember the age of cells or data chunks. These timers were based on wall clock time, which can move backwards, thus giving roll-over results for our age calculation. This commit creates a low-budget monotonic time, based on ratcheting gettimeofday(), so that even in the event of a time rollback, we don't do anything _really_ stupid. A future version of Tor should update this function to do something even less stupid here, like employ clock_gettime() or its kin.
2014-02-25Merge remote-tracking branch 'public/bug10449'Nick Mathewson
2014-02-25Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson
2014-02-25Merge remote-tracking branch 'public/no_itime_queue' into maint-0.2.4Nick Mathewson
2014-02-25Trivial comment fix.Nick Mathewson
2014-02-25Merge remote-tracking branch 'public/bug11048'Nick Mathewson
2014-02-25Merge remote-tracking branch 'karsten/geoip2regcountry'Nick Mathewson
2014-02-25Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson
2014-02-25Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-02-25Fix geoip by falling back to registered countries.Karsten Loesing
See 1d2179bc900f1646a5491b65294e78b175e70056 in master for details. """ Fall back to registered country if necessary. When extracting geoip and geoip6 files from MaxMind's GeoLite2 Country database, we only look at country->iso_code which is the two-character ISO 3166-1 country code of the country where MaxMind believes the end user is located. But if MaxMind thinks a range belongs to anonymous proxies, they don't put anything there. Hence, we omit those ranges and resolve them all to '??'. That's not what we want. What we should do is first try country->iso_code, and if there's no such key, try registered_country->iso_code which is the country in which the ISP has registered the IP address. In short: let's fill all A1 entries with what ARIN et. al think. """
2014-02-25Fall back to registered country if necessary.Karsten Loesing
When extracting geoip and geoip6 files from MaxMind's GeoLite2 Country database, we only look at country->iso_code which is the two-character ISO 3166-1 country code of the country where MaxMind believes the end user is located. But if MaxMind thinks a range belongs to anonymous proxies, they don't put anything there. Hence, we omit those ranges and resolve them all to '??'. That's not what we want. What we should do is first try country->iso_code, and if there's no such key, try registered_country->iso_code which is the country in which the ISP has registered the IP address. In short: let's fill all A1 entries with what ARIN et. al think.