aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2014-09-21Stop silently skipping invalid args to seteventsRoger Dingledine
Return an error when the second or later arguments of the "setevents" controller command are invalid events. Previously we would return success while silently skipping invalid events. Fixes bug 13205; bugfix on 0.2.3.2-alpha. Reported by "fpxnns".
2014-09-20Merge branch 'maint-0.2.5'Roger Dingledine
2014-09-20Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
Conflicts: src/or/config.c
2014-09-20Merge branch 'maint-0.2.3' into maint-0.2.4Roger Dingledine
2014-09-20gabelmoo's IPv4 address changedSebastian Hahn
2014-09-18Merge branch 'bug4244b_squashed'Nick Mathewson
2014-09-18Clients no longer write "DirReqStatistics 0" in their saveconf outputRoger Dingledine
Stop modifying the value of our DirReqStatistics torrc option just because we're not a bridge or relay. This bug was causing Tor Browser users to write "DirReqStatistics 0" in their torrc files as if they had chosen to change the config. Fixes bug 4244; bugfix on 0.2.3.1-alpha.
2014-09-18Use the DL_SCHED_CONSENSUS schedule for consensuses.Nick Mathewson
Fixes bug 11679; bugfix on 0.2.2.6-alpha
2014-09-17Merge remote-tracking branch 'public/ticket_13119_v3'Nick Mathewson
2014-09-16Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-16Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-09-16clients now send correct address for rendezvous pointRoger Dingledine
Clients now send the correct address for their chosen rendezvous point when trying to access a hidden service. They used to send the wrong address, which would still work some of the time because they also sent the identity digest of the rendezvous point, and if the hidden service happened to try connecting to the rendezvous point from a relay that already had a connection open to it, the relay would reuse that connection. Now connections to hidden services should be more robust and faster. Also, this bug meant that clients were leaking to the hidden service whether they were on a little-endian (common) or big-endian (rare) system, which for some users might have reduced their anonymity. Fixes bug 13151; bugfix on 0.2.1.5-alpha.
2014-09-15Add a changes file for 13119Nick Mathewson
2014-09-11Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-11Reduce log severity for unused ClientTransportPlugin linesRoger Dingledine
Tor Browser includes several ClientTransportPlugin lines in its torrc-defaults file, leading every Tor Browser user who looks at her logs to see these notices and wonder if they're dangerous. Resolves bug 13124; bugfix on 0.2.5.3-alpha.
2014-09-11Merge remote-tracking branch 'public/bug13104_025'Nick Mathewson
2014-09-11Add a changes file for bug 13104Nick Mathewson
2014-09-10Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-10In routerlist_assert_ok(), check r2 before taking &(r2->cache_info)Nick Mathewson
Technically, we're not allowed to take the address of a member can't exist relative to the null pointer. That makes me wonder how any sane compliant system implements the offsetof macro, but let's let sleeping balrogs lie. Fixes 13096; patch on 0.1.1.9-alpha; patch from "teor", who was using clang -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error -ftrapv
2014-09-10Merge remote-tracking branch 'yawning/bug_8402'Nick Mathewson
2014-09-10Merge remote-tracking branch 'public/torrc_minimal'Nick Mathewson
2014-09-10Merge remote-tracking branch 'public/bug12908_025' into maint-0.2.5Nick Mathewson
2014-09-10Mark StrictE{ntry,xit}Nodes as obsolete.Nick Mathewson
2014-09-09Fix issues brought up in nickm's review.Yawning Angel
* Update pt_get_proxy_uri() documentation. * proxy_supported is now unsigned. * Added a changes file.
2014-09-09Merge remote-tracking branch 'asn/bug13064'Nick Mathewson
2014-09-09Use S?SIZE_MAX, not S?SIZE_T_MAXNick Mathewson
This fixes bug 13102 (not on any released Tor) where using the standard SSIZE_MAX name broke mingw64, and we didn't realize. I did this with perl -i -pe 's/SIZE_T_MAX/SIZE_MAX/' src/*/*.[ch] src/*/*/*.[ch]
2014-09-09Remove client-side bad directory logicSebastian Hahn
Implements the second half of #13060.
2014-09-09Remove dirauth support for the BadDirectory flagSebastian Hahn
Implements the first half of #13060. The second half will be to remove client support, too.
2014-09-09Merge branch 'bug12899_squashed'Nick Mathewson
2014-09-09Remove support for naming directory authoritiesSebastian Hahn
This implements the meat of #12899. This commit should simply remove the parts of Tor dirauths used to check whether a relay was supposed to be named or not, it doesn't yet convert to a new mechanism for reject/invalid/baddir/badexiting relays.
2014-09-09Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-09Merge remote-tracking branch 'andrea/bug12160_025' into maint-0.2.5Nick Mathewson
2014-09-09Merge remote-tracking branch 'public/bug12700_024' into maint-0.2.5Nick Mathewson
2014-09-09Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-09Clean up the MVSC nmake files so they work again.Nick Mathewson
Fixes bug 13081; bugfix on 0.2.5.1-alpha. Patch from "NewEraCracker."
2014-09-09Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-09Add more escaped() calls in directory.cNick Mathewson
Patch from teor to fix 13071.
2014-09-08Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-08Expand the event_mask field in controller conns to 64 bitsNick Mathewson
Back in 078d6bcd, we added an event number 0x20, but we didn't make the event_mask field big enough to compensate. Patch by "teor". Fixes 13085; bugfix on 0.2.5.1-alpha.
2014-09-06Evaluate TestingDirAuthVoteGuard only after filling all rs elements.George Kadianakis
2014-09-05Correctly update channel local mark when address of incoming connection ↵Andrea Shepard
changes after handshake; fixes bug #12160
2014-09-04Remove the AuthDirRejectUnlisted config optionSebastian Hahn
This is in preparation for a big patch series removing the entire Naming system from Tor. In its wake, the approved-routers file is being deprecated, and a replacement option to allow only pre-approved routers is not being implemented.
2014-09-03Merge remote-tracking branch 'intrigeri/bug12939-systemd-no-new-privileges'Nick Mathewson
Conflicts: contrib/dist/tor.service.in
2014-09-03Merge remote-tracking branch 'intrigeri/bug12751-systemd-filesystem-sandbox'Nick Mathewson
2014-09-02Divide torrc.sample into torrc.sample and torrc.minimalNick Mathewson
torrc.minimal is now the one that should change as infrequently as possible. To schedule an change to go into it eventually, make your change to torrc.minimal.in-sample. torrc.sample is now the volatile one: we can change it to our hearts' content. Closes ticket #11144
2014-09-02Don't list relays w/ bw estimate of 0 in the consensusSebastian Hahn
This implements a feature from bug 13000. Instead of starting a bwauth run with this wrong idea about their bw, relays should do the self-test and then get measured.
2014-09-02Don't delay uploading a new desc if bw estimate was 0Sebastian Hahn
When a tor relay starts up and has no historical information about its bandwidth capability, it uploads a descriptor with a bw estimate of 0. It then starts its bw selftest, but has to wait 20 minutes to upload the next descriptor due to the MAX_BANDWIDTH_CHANGE_FREQ delay. This change should mean that on average, relays start seeing meaningful traffic a little quicker, since they will have a higher chance to appear in the consensus with a nonzero bw. Patch by Roger, changes file and comment by Sebastian.
2014-09-02Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-09-02Fix a number of clang analyzer false-positivesNick Mathewson
Most of these are in somewhat non-obvious code where it is probably a good idea to initialize variables and add extra assertions anyway. Closes 13036. Patches from "teor".
2014-09-01Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson