summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2017-05-08Merge branch 'maint-0.3.0'Nick Mathewson
2017-05-08Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-05-08Merge branch 'bug21943_029' into maint-0.2.9Nick Mathewson
2017-05-08Add a changes file for 21943.Nick Mathewson
2017-05-08Merge branch 'maint-0.3.0'Nick Mathewson
2017-05-08Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-05-08Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-05-08Merge branch 'maint-0.2.7-redux' into maint-0.2.8Nick Mathewson
2017-05-08Merge branch 'maint-0.2.6' into maint-0.2.7-reduxNick Mathewson
2017-05-08Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2017-05-08Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-05-08Update geoip and geoip6 to the May 2 2017 database.Karsten Loesing
2017-05-04Changes file for prop140Nick Mathewson
2017-05-02Merge branch 'refactor_dir_client_handler'Nick Mathewson
2017-05-02Merge branch 'teor_connection-with-client-v2_squashed'Nick Mathewson
2017-05-02Accurately identify client connections by their lack of peer authenticationteor
This means that we bail out earlier if asked to extend to a client. Follow-up to 21407. Fixes bug 21406; bugfix on 0.2.4.23.
2017-05-02Break connection_dir_client_reached_eof() into smaller functionsNick Mathewson
This was a >630-line function, which doesn't make anybody happy. It was also mostly composed of a bunch of if-statements that handled different directory responses differently depending on the original purpose of the directory connection. The logical refactoring here is to move the body of each switch statement into a separate handler function, and to invoke those functions from a separate switch statement. This commit leaves whitespace mostly untouched, for ease of review. I'll reindent in the next commit.
2017-05-01Merge branch 'dgoulet_bug22042_031_01_squashed'Nick Mathewson
2017-05-01hs: Trigger control event when client can't pick HSDirDavid Goulet
Inform the control port with an HS_DESC failed event when the client is unable to pick an HSDir. It's followed by an empty HS_DESC_CONTENT event. In order to achieve that, some control port code had to be modified to accept a NULL HSDir identity digest. This commit also adds a trigger of a failed event when we are unable to base64-decode the descriptor cookie. Fixes #22042 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-28Increase MALLOC_MP_LIM to 16MBNick Mathewson
Increase the maximum allowed size passed to mprotect(PROT_WRITE) from 1MB to 16MB. This was necessary with the glibc allocator in order to allow worker threads to allocate more memory -- which in turn is necessary because of our new use of worker threads for compression. Closes ticket #22096. Found while working on #21648.
2017-04-27Merge branch 'dirreq'Nick Mathewson
2017-04-26Document Bridge line transport argumentsTaylor Yu
Bridge lines in torrc can contain key=value settings as per-connection arguments to a pluggable transport. tor.1.txt hadn't been updated to reflect this.
2017-04-25Merge branch 'bug21715_031_01_squashed'Nick Mathewson
2017-04-25man: Update Num{Directory,Entry}Guards default valueDavid Goulet
Fixes #21715 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-25Merge remote-tracking branch 'dgoulet/bug21293_031_01'Nick Mathewson
2017-04-25More clarification on 13802Nick Mathewson
2017-04-25trace: Add a basic event-tracing infrastructure.David Goulet
This commit adds the src/trace directory containing the basics for our tracing subsystem. It is not used in the code base. The "src/trace/debug.h" file contains an example on how we can map our tor trace events to log_debug(). The tracing subsystem can only be enabled by tracing framework at compile time. This commit introduces the "--enable-tracing-debug" option that will make all "tor_trace()" function be maped to "log_debug()". Closes #13802 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-25relay: Change LD_BUG log to LD_PROTOCOL_WARNDavid Goulet
That log statement can be triggered if somebody on the Internet behaves badly which is possible with buggy implementation for instance. Fixes #21293 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-25changes file for 21662/21663/21664Nick Mathewson
2017-04-24Remove changes files that are already merged into 0.3.0.Nick Mathewson
2017-04-24Changes file for dirreq refactoring branchNick Mathewson
2017-04-24Merge branch 'maint-0.3.0'Nick Mathewson
2017-04-24Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-04-24control: Wrong check on base16_decode return valueDavid Goulet
The GETINFO extra-info/digest/<digest> broke in commit 568dc27a19 that refactored the base16_decode() API to return the decoded length. Unfortunately, that if() condition should have checked for the correct length instead of an error which broke the command in tor-0.2.9.1-alpha. Fixes #22034 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-10config: Warn if EntryNodes and HiddenService are used togetherDavid Goulet
Pinning EntryNodes along with hidden services can be possibly harmful (for instance #14917 and #21155) so at the very least warn the operator if this is the case. Fixes #21155 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-10Merge remote-tracking branch 'dgoulet/bug16706_031_01'Nick Mathewson
2017-04-10changes file for 17868Nick Mathewson
2017-04-07Merge branch 'maint-0.3.0'Nick Mathewson
2017-04-07Merge remote-tracking branch 'public/bug21894_029' into maint-0.3.0Nick Mathewson
2017-04-07Merge branch 'ticket21842_squashed'Nick Mathewson
2017-04-07Remove tor-checkkey as obsoleteNick Mathewson
CVE-2008-0166 is long gone, and we no longer need a helper tool to dump out public key moduli so folks can detect it. Closes ticket 21842.
2017-04-07Never read off the end of a buffer in base32_encode()Nick Mathewson
When we "fixed" #18280 in 4e4a7d2b0c199227252a742541461ec4cc35d358 in 0291 it appears that we introduced a bug: The base32_encode function can read off the end of the input buffer, if the input buffer size modulo 5 is not equal to 0 or 3. This is not completely horrible, for two reasons: * The extra bits that are read are never actually used: so this is only a crash when asan is enabled, in the worst case. Not a data leak. * The input sizes passed to base32_encode are only ever multiples of 5. They are all either DIGEST_LEN (20), REND_SERVICE_ID_LEN (10), sizeof(rand_bytes) in addressmap.c (10), or an input in crypto.c that is forced to a multiple of 5. So this bug can't actually trigger in today's Tor. Closes bug 21894; bugfix on 0.2.9.1-alpha.
2017-04-07Merge branch 'isolate_openssl'Nick Mathewson
2017-04-06changes file for 21873Nick Mathewson
2017-04-06Merge branch 'maint-0.3.0'Nick Mathewson
2017-04-06Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-04-06Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-04-06Merge branch 'maint-0.2.7-redux' into maint-0.2.8Nick Mathewson
2017-04-06Merge branch 'maint-0.2.6' into maint-0.2.7-reduxNick Mathewson
2017-04-06Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson