summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2014-11-12Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-11-12Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
Conflicts: src/or/config.c
2014-11-12Add changes file for #13926Sebastian Hahn
2014-11-12Merge remote-tracking branch 'public/bug7484'Nick Mathewson
Conflicts: src/test/test_addr.c
2014-11-12Merge branch 'ticket13172'Nick Mathewson
2014-11-12Merge remote-tracking branch 'rl1987/bug13644'Nick Mathewson
2014-11-12tweak 9812 changes fileNick Mathewson
2014-11-12Merge remote-tracking branch 'rl1987/bug9812'Nick Mathewson
2014-11-12Merge remote-tracking branch 'public/bug13698_024_v1'Nick Mathewson
2014-11-12Revise changes fileNick Mathewson
2014-11-11Adding changes file for 13644.rl1987
2014-11-10Fix: don't report timeout when closing parallel intro pointsDavid Goulet
When closing parallel introduction points, the given reason (timeout) was actually changed to "no reason" thus when the circuit purpose was CIRCUIT_PURPOSE_C_INTRODUCE_ACK_WAIT, we were reporting an introduction point failure and flagging it "unreachable". After three times, that intro point gets removed from the rend cache object. In the case of CIRCUIT_PURPOSE_C_INTRODUCING, the intro point was flagged has "timed out" and thus not used until the connection to the HS is closed where that flag gets reset. This commit adds an internal circuit reason called END_CIRC_REASON_IP_NOW_REDUNDANT which tells the closing circuit mechanism to not report any intro point failure. This has been observed while opening hundreds of connections to an HS on different circuit for each connection. This fix makes this use case to work like a charm. Fixes #13698. Signed-off-by: David Goulet <dgoulet@ev0ke.net>
2014-11-10Document networkstatus-bridgesNick Mathewson
Closes 13713; patch from 'tom'
2014-11-09Adding changes file for 9812.rl1987
2014-11-09Fixing typo in manpage.rl1987
2014-11-07Wrong format in log statementDavid Goulet
Fixes bug 13701.
2014-11-06Define macros meaning <,>,==,!=,<=,>=Nick Mathewson
This lets us avoid putting operators directly in macro arguments, and thus will help us unconfuse coccinelle. For ticket 13172.
2014-11-06Throw identify-node-by-nickname down the memory holeNick Mathewson
Authorities are no longer voting on Named, so specifying nodes by nickname isn't a clever thing to do. (Not that it ever was!) So remove the documentation that suggests that you should do it. Additionally, add proper cross-references to our __node__ lists, and explain about the optional $ before identity digests. Also, the oxford comma: endorsed by Steven Pinker, my spouse, and my 11th grade English teacher. Closes 13381.
2014-11-05chgrp the testing tempdir to ourself to clear the sticky bitNick Mathewson
Closes 13678. Doesn't actually matter for older tors.
2014-11-0511291: Fix warnings, add changes file, rename 'mask'.Nick Mathewson
2014-11-04Changes file for Andrea's work on 6456Nick Mathewson
2014-11-04Merge branch 'bug13315_squashed'Nick Mathewson
Conflicts: src/or/buffers.c
2014-11-04Adding changes file for 13315.rl1987
2014-11-04Merge remote-tracking branch 'public/bug13214_025_squashed'Nick Mathewson
2014-11-04Check descriptor ID in addition to HS ID when saving a v2 hs descriptorNick Mathewson
Fixes bug 13214; reported by 'special'.
2014-10-31Use digest256_len in networkstatus_copy_old_consensus_info()Nick Mathewson
Now, if a router ever changes its microdescriptor, but the new microdescriptor SHA256 hash has the same 160-bit prefix as the old one, we treat it as a new microdescriptor when deciding whether to copy status information. (This function also is used to compare SHA1 digests of router descriptors, but don't worry: the descriptor_digest field either holds a SHA256 hash, or a SHA1 hash padded with 0 bytes.)
2014-10-31Use digest256map for computing microdescriptor downloadsNick Mathewson
2014-10-31Refactor {str,digest}map into a common implementation; add digest256mapNick Mathewson
Needed for #13399.
2014-10-30Silence spurious clang warningsteor
Silence clang warnings under --enable-expensive-hardening, including: + implicit truncation of 64 bit values to 32 bit; + const char assignment to self; + tautological compare; and + additional parentheses around equality tests. (gcc uses these to silence assignment, so clang warns when they're present in an equality test. But we need to use extra parentheses in macros to isolate them from other code).
2014-10-29Add in a few more changes entries for 0.2.6.1-alphaNick Mathewson
(Also resort and rewrap)
2014-10-28Adding changes file for 9708.rl1987
2014-10-28Fix smartlist_choose_node_by_bandwidth() so that it rejects ORs with BadExit ↵rl1987
flag.
2014-10-28Merge remote-tracking branch 'rl1987/feature10427'Nick Mathewson
2014-10-27Merge remote-tracking branch 'sebastian/bug13286'Nick Mathewson
2014-10-27Start on an 0.2.6.1-alpha changelogNick Mathewson
I concatenated the remaining changes/* files, removed them, made the headings more uniform, then told format_changelog.py to sort, collate, and wrap them.
2014-10-27Remove changes files that have already been merged in release-0.2.5Nick Mathewson
(This means that changes/* is now "everything that changed since 0.2.5.10".)
2014-10-27Remove configure option to disable curve25519Sebastian Hahn
By now, support in the network is widespread and it's time to require more modern crypto on all Tor instances, whether they're clients or servers. By doing this early in 0.2.6, we can be sure that at some point all clients will have reasonable support.
2014-10-26Congratulate relay operator when OR is first startedrl1987
When Tor first generates identity keypair, emit a log message that thanks for their participation and points to new Tor relay lifecycle document.
2014-10-22Fix a changes typo spotted by wfnNick Mathewson
2014-10-22Merge remote-tracking branch 'public/bug11824_v2'Nick Mathewson
2014-10-22Merge remote-tracking branch 'public/ticket6938'Nick Mathewson
Conflicts: src/tools/tor-resolve.c
2014-10-21Merge remote-tracking branch 'teor/bug13476-improve-time-handling'Nick Mathewson
2014-10-20Merge remote-tracking branch 'teor/memwipe-more-keys'Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-19Note that our #13426 fix is also a #13471 fix.Nick Mathewson
See also http://marc.info/?l=openssl-dev&m=141357408522028&w=2
2014-10-20Memwipe more keys after tor has finished with themteor
Ensure we securely wipe keys from memory after crypto_digest_get_digest and init_curve25519_keypair_from_file have finished using them. Fixes bug 13477.
2014-10-20Further unit test tor_timegm and parse_rfc1123_timeteor
Add unit tests for tor_timegm signed overflow, tor_timegm and parse_rfc1123_time validity checks, and correct_tm year clamping. Unit tests (visible) fixes in bug 13476.
2014-10-20Clamp (some) years supplied by the system to 1 CEteor
Clamp year values returned by system localtime(_r) and gmtime(_r) to year 1. This ensures tor can read any values it might write out. Fixes bug 13476.