aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2014-11-09Fixing typo in manpage.rl1987
2014-11-07Wrong format in log statementDavid Goulet
Fixes bug 13701.
2014-11-06Throw identify-node-by-nickname down the memory holeNick Mathewson
Authorities are no longer voting on Named, so specifying nodes by nickname isn't a clever thing to do. (Not that it ever was!) So remove the documentation that suggests that you should do it. Additionally, add proper cross-references to our __node__ lists, and explain about the optional $ before identity digests. Also, the oxford comma: endorsed by Steven Pinker, my spouse, and my 11th grade English teacher. Closes 13381.
2014-11-05chgrp the testing tempdir to ourself to clear the sticky bitNick Mathewson
Closes 13678. Doesn't actually matter for older tors.
2014-11-0511291: Fix warnings, add changes file, rename 'mask'.Nick Mathewson
2014-11-04Changes file for Andrea's work on 6456Nick Mathewson
2014-11-04Merge branch 'bug13315_squashed'Nick Mathewson
Conflicts: src/or/buffers.c
2014-11-04Adding changes file for 13315.rl1987
2014-11-04Merge remote-tracking branch 'public/bug13214_025_squashed'Nick Mathewson
2014-11-04Check descriptor ID in addition to HS ID when saving a v2 hs descriptorNick Mathewson
Fixes bug 13214; reported by 'special'.
2014-10-31Use digest256_len in networkstatus_copy_old_consensus_info()Nick Mathewson
Now, if a router ever changes its microdescriptor, but the new microdescriptor SHA256 hash has the same 160-bit prefix as the old one, we treat it as a new microdescriptor when deciding whether to copy status information. (This function also is used to compare SHA1 digests of router descriptors, but don't worry: the descriptor_digest field either holds a SHA256 hash, or a SHA1 hash padded with 0 bytes.)
2014-10-31Use digest256map for computing microdescriptor downloadsNick Mathewson
2014-10-31Refactor {str,digest}map into a common implementation; add digest256mapNick Mathewson
Needed for #13399.
2014-10-30Silence spurious clang warningsteor
Silence clang warnings under --enable-expensive-hardening, including: + implicit truncation of 64 bit values to 32 bit; + const char assignment to self; + tautological compare; and + additional parentheses around equality tests. (gcc uses these to silence assignment, so clang warns when they're present in an equality test. But we need to use extra parentheses in macros to isolate them from other code).
2014-10-29Add in a few more changes entries for 0.2.6.1-alphaNick Mathewson
(Also resort and rewrap)
2014-10-28Adding changes file for 9708.rl1987
2014-10-28Fix smartlist_choose_node_by_bandwidth() so that it rejects ORs with BadExit ↵rl1987
flag.
2014-10-28Merge remote-tracking branch 'rl1987/feature10427'Nick Mathewson
2014-10-27Merge remote-tracking branch 'sebastian/bug13286'Nick Mathewson
2014-10-27Start on an 0.2.6.1-alpha changelogNick Mathewson
I concatenated the remaining changes/* files, removed them, made the headings more uniform, then told format_changelog.py to sort, collate, and wrap them.
2014-10-27Remove changes files that have already been merged in release-0.2.5Nick Mathewson
(This means that changes/* is now "everything that changed since 0.2.5.10".)
2014-10-27Remove configure option to disable curve25519Sebastian Hahn
By now, support in the network is widespread and it's time to require more modern crypto on all Tor instances, whether they're clients or servers. By doing this early in 0.2.6, we can be sure that at some point all clients will have reasonable support.
2014-10-26Congratulate relay operator when OR is first startedrl1987
When Tor first generates identity keypair, emit a log message that thanks for their participation and points to new Tor relay lifecycle document.
2014-10-22Fix a changes typo spotted by wfnNick Mathewson
2014-10-22Merge remote-tracking branch 'public/bug11824_v2'Nick Mathewson
2014-10-22Merge remote-tracking branch 'public/ticket6938'Nick Mathewson
Conflicts: src/tools/tor-resolve.c
2014-10-21Merge remote-tracking branch 'teor/bug13476-improve-time-handling'Nick Mathewson
2014-10-20Merge remote-tracking branch 'teor/memwipe-more-keys'Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-19Note that our #13426 fix is also a #13471 fix.Nick Mathewson
See also http://marc.info/?l=openssl-dev&m=141357408522028&w=2
2014-10-20Memwipe more keys after tor has finished with themteor
Ensure we securely wipe keys from memory after crypto_digest_get_digest and init_curve25519_keypair_from_file have finished using them. Fixes bug 13477.
2014-10-20Further unit test tor_timegm and parse_rfc1123_timeteor
Add unit tests for tor_timegm signed overflow, tor_timegm and parse_rfc1123_time validity checks, and correct_tm year clamping. Unit tests (visible) fixes in bug 13476.
2014-10-20Clamp (some) years supplied by the system to 1 CEteor
Clamp year values returned by system localtime(_r) and gmtime(_r) to year 1. This ensures tor can read any values it might write out. Fixes bug 13476.
2014-10-20Improve date validation in HTTP headersteor
Check all date/time values passed to tor_timegm and parse_rfc1123_time for validity, taking leap years into account. Improves HTTP header validation. Avoid unlikely signed integer overflow in tor_timegm on systems with 32-bit time_t. Fixes bug 13476.
2014-10-20Use correct day of year in correct_tm()teor
Set the correct day of year value in correct_tm() when the system's localtime(_r) or gmtime(_r) functions fail to set struct tm. Fixes bug 13476.
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-10-16Downgrade 'unexpected sendme cell from client' to PROTOCOL_WARNNick Mathewson
Closes 8093.
2014-10-16Merge remote-tracking branch 'yawning/bug13314'Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-16Merge branch 'no_sslv3_023' into maint-0.2.3Nick Mathewson
2014-10-15Disable SSLv3 unconditionally. Closes ticket 13426.Nick Mathewson
The POODLE attack doesn't affect Tor, but there's no reason to tempt fate: SSLv3 isn't going to get any better.
2014-10-13Merge remote-tracking branch 'public/bug11243_squashed'Nick Mathewson
2014-10-13Treat unparseable (micro)descriptors and extrainfos as undownloadableNick Mathewson
One pain point in evolving the Tor design and implementing has been adding code that makes clients reject directory documents that they previously would have accepted, if those descriptors actually exist. When this happened, the clients would get the document, reject it, and then decide to try downloading it again, ad infinitum. This problem becomes particularly obnoxious with authorities, since if some authorities accept a descriptor that others don't, the ones that don't accept it would go crazy trying to re-fetch it over and over. (See for example ticket #9286.) This patch tries to solve this problem by tracking, if a descriptor isn't parseable, what its digest was, and whether it is invalid because of some flaw that applies to the portion containing the digest. (This excludes RSA signature problems: RSA signatures aren't included in the digest. This means that a directory authority can still put another directory authority into a loop by mentioning a descriptor, and then serving that descriptor with an invalid RSA signatures. But that would also make the misbehaving directory authority get DoSed by the server it's attacking, so it's not much of an issue.) We already have a mechanism to mark something undownloadable with downloadstatus_mark_impossible(); we use that here for microdescriptors, extrainfos, and router descriptors. Unit tests to follow in another patch. Closes ticket #11243.
2014-10-12Avoid overflow in format_time_interval, create unit teststeor
Fix an instance of integer overflow in format_time_interval() when taking the absolute value of the supplied signed interval value. Fixes bug 13393. Create unit tests for format_time_interval().
2014-10-09Remove is_router_version_good_for_possible_guard()Nick Mathewson
The versions which this function would keep from getting the guard flag are already blocked by the minimum version check. Closes 13152.
2014-10-09Merge remote-tracking branch 'public/bug10816'Nick Mathewson