aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2016-07-13changes file for bug18397Nick Mathewson
2016-07-06When checking if a routerstatus is reachable, don't check the nodeteor (Tim Wilson-Brown)
This fixes #19608, allowing IPv6-only clients to use microdescriptors, while preserving the ability of bridge clients to have some IPv4 bridges and some IPv6 bridges. Fix on c281c036 in 0.2.8.2-alpha.
2016-07-05Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2016-07-05Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2016-07-05Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2016-07-05Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2016-07-05whoops. changelog file for 19271.Nick Mathewson
2016-07-05Appease lint-changes script.Nick Mathewson
2016-07-05Merge remote-tracking branch 'weasel/bug19557' into maint-0.2.8Nick Mathewson
2016-07-05Merge remote-tracking branch 'weasel/bug19556' into maint-0.2.8Nick Mathewson
2016-07-05Run asciidoc in UTC timezone for build reproducibility.intrigeri
asciidoc adds a timestamp at the end of a generated HTML file. This timestamp is based on the date of the file but it can change depending on the TZ environment variable.
2016-07-03sandboxing: allow writing to stats/hidserv-statsPeter Palfrader
Our sandboxing code would not allow us to write to stats/hidserv-stats, causing tor to abort while trying to write stats. This was previously masked by bug#19556.
2016-07-03Note which bug this fixes in the changes entryPeter Palfrader
2016-07-03sandboxing: allow open() of stats dirPeter Palfrader
When sandboxing is enabled, we could not write any stats to disk. check_or_create_data_subdir("stats"), which prepares the private stats directory, calls check_private_dir(), which also opens and not just stats() the directory. Therefore, we need to also allow open() for the stats dir in our sandboxing setup.
2016-07-01When tor can't find a directory, log lessteor (Tim Wilson-Brown)
2016-06-28Merge branch 'bug19071-extra-squashed' into maint-0.2.8Nick Mathewson
2016-06-28Comment-out fallbacks in a way the stem fallback parser understandsteor (Tim Wilson-Brown)
If we manually remove fallbacks in C by adding '/*' and '*/' on separate lines, stem still parses them as being present, because it only looks at the start of a line. Add a comment to this effect in the generated source code.
2016-06-28Merge remote-tracking branch 'teor/bug18812' into maint-0.2.8Nick Mathewson
2016-06-28Resolve bug18812 by logging fallback key changes at info levelteor (Tim Wilson-Brown)
2016-06-24Bug19499: Fix GCC warnings when building against bleeding edge OpenSSL.Yawning Angel
The previous version of the new accessors didn't specify const but it was changed in master.
2016-06-22Changes file for 19071 and 19480teor (Tim Wilson-Brown)
2016-06-21Remove useless message about nonexistent onion services after uploading a ↵Ivan Markin
descriptor
2016-06-21Fix bug when disabling heartbeats.George Kadianakis
Callbacks can't return 0.
2016-06-14Bug 19406: Add a changes file.Yawning Angel
2016-06-13lintChanges fixesNick Mathewson
2016-06-13Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2016-06-13Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2016-06-13Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2016-06-13Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2016-06-12Update geoip and geoip6 to the June 7 2016 database.Karsten Loesing
2016-06-11Merge remote-tracking branch 'public/bug19203_027' into maint-0.2.8Nick Mathewson
2016-06-02Use directory_must_use_begindir to predict we'll surely use begindirNick Mathewson
Previously, we used !directory_fetches_from_authorities() to predict that we would tunnel connections. But the rules have changed somewhat over the course of 0.2.8
2016-06-02Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2016-06-02Use tor_sscanf, not sscanf, in test_util.c.Nick Mathewson
Fixes the 0.2.7 case of bug #19213, which prevented mingw64 from working.
2016-05-30Fix a warning on unnamed nodes in node_get_by_nickname().Nick Mathewson
There was a > that should have been an ==, and a missing !. These together prevented us from issuing a warning in the case that a nickname matched an Unnamed node only. Fixes bug 19203; bugfix on 0.2.3.1-alpha.
2016-05-25Merge branch 'bug18668_028' into maint-0.2.8Nick Mathewson
2016-05-25Merge branch 'bug19161_028_v2' into maint-0.2.8Nick Mathewson
2016-05-25Merge branch 'bug19152_024_v2' into maint-0.2.8Nick Mathewson
2016-05-25Fix a dangling pointer issue in our RSA keygen codeNick Mathewson
If OpenSSL fails to generate an RSA key, do not retain a dangling pointer to the previous (uninitialized) key value. The impact here should be limited to a difficult-to-trigger crash, if OpenSSL is running an engine that makes key generation failures possible, or if OpenSSL runs out of memory. Fixes bug 19152; bugfix on 0.2.1.10-alpha. Found by Yuan Jochen Kang, Suman Jana, and Baishakhi Ray. This is potentially scary stuff, so let me walk through my analysis. I think this is a bug, and a backport candidate, but not remotely triggerable in any useful way. Observation 1a: Looking over the OpenSSL code here, the only way we can really fail in the non-engine case is if malloc() fails. But if malloc() is failing, then tor_malloc() calls should be tor_asserting -- the only way that an attacker could do an exploit here would be to figure out some way to make malloc() fail when openssl does it, but work whenever Tor does it. (Also ordinary malloc() doesn't fail on platforms like Linux that overcommit.) Observation 1b: Although engines are _allowed_ to fail in extra ways, I can't find much evidence online that they actually _do_ fail in practice. More evidence would be nice, though. Observation 2: We don't call crypto_pk_generate*() all that often, and we don't do it in response to external inputs. The only way to get it to happen remotely would be by causing a hidden service to build new introduction points. Observation 3a: So, let's assume that both of the above observations are wrong, and the attacker can make us generate a crypto_pk_env_t with a dangling pointer in its 'key' field, and not immediately crash. This dangling pointer will point to what used to be an RSA structure, with the fields all set to NULL. Actually using this RSA structure, before the memory is reused for anything else, will cause a crash. In nearly every function where we call crypto_pk_generate*(), we quickly use the RSA key pointer -- either to sign something, or to encode the key, or to free the key. The only exception is when we generate an intro key in rend_consider_services_intro_points(). In that case, we don't actually use the key until the intro circuit is opened -- at which point we encode it, and use it to sign an introduction request. So in order to exploit this bug to do anything besides crash Tor, the attacker needs to make sure that by the time the introduction circuit completes, either: * the e, d, and n BNs look valid, and at least one of the other BNs is still NULL. OR * all 8 of the BNs must look valid. To look like a valid BN, *they* all need to have their 'top' index plus their 'd' pointer indicate an addressable region in memory. So actually getting useful data of of this, rather than a crash, is going to be pretty damn hard. You'd have to force an introduction point to be created (or wait for one to be created), and force that particular crypto_pk_generate*() to fail, and then arrange for the memory that the RSA points to to in turn point to 3...8 valid BNs, all by the time the introduction circuit completes. Naturally, the signature won't check as valid [*], so the intro point will reject the ESTABLISH_INTRO cell. So you need to _be_ the introduction point, or you don't actually see this information. [*] Okay, so if you could somehow make the 'rsa' pointer point to a different valid RSA key, then you'd get a valid signature of an ESTABLISH_INTRO cell using a key that was supposed to be used for something else ... but nothing else looks like that, so you can't use that signature elsewhere. Observation 3b: Your best bet as an attacker would be to make the dangling RSA pointer actually contain a fake method, with a fake RSA_private_encrypt function that actually pointed to code you wanted to execute. You'd still need to transit 3 or 4 pointers deep though in order to make that work. Conclusion: By 1, you probably can't trigger this without Tor crashing from OOM. By 2, you probably can't trigger this reliably. By 3, even if I'm wrong about 1 and 2, you have to jump through a pretty big array of hoops in order to get any kind of data leak or code execution. So I'm calling it a bug, but not a security hole. Still worth patching.
2016-05-25Merge branch 'memarea_overflow_027_squashed' into maint-0.2.8Nick Mathewson
2016-05-25Fix a pointer arithmetic bug in memarea_alloc()Nick Mathewson
Fortunately, the arithmetic cannot actually overflow, so long as we *always* check for the size of potentially hostile input before copying it. I think we do, though. We do check each line against MAX_LINE_LENGTH, and each object name or object against MAX_UNPARSED_OBJECT_SIZE, both of which are 128k. So to get this overflow, we need to have our memarea allocated way way too high up in RAM, which most allocators won't actually do. Bugfix on 0.2.1.1-alpha, where memarea was introduced. Found by Guido Vranken.
2016-05-24Make sure that libscrypt_scrypt actually exists before using it.Nick Mathewson
Previously, if the header was present, we'd proceed even if the function wasn't there. Easy fix for bug 19161. A better fix would involve trying harder to find libscrypt_scrypt.
2016-05-19lintchanges on 18809, and fix the bug numberNick Mathewson
2016-05-19changelog typo fixNick Mathewson
2016-05-19Merge branch 'bug18809_028_squashed' into maint-0.2.8Nick Mathewson
2016-05-19Changes file for bug 18809teor (Tim Wilson-Brown)
2016-05-17Merge branch 'bug17150_027_extra' into maint-0.2.8Nick Mathewson
2016-05-17Fix another, more subtle, case of bug 17150.Nick Mathewson
We need to make sure that the corresponding sd and ei match in their certificates.
2016-05-17When making sure digest256 matches in ei, look at sd, not ri.Nick Mathewson
The routerinfo we pass to routerinfo_incompatible_with_extrainfo is the latest routerinfo for the relay. The signed_descriptor_t, on the other hand, is the signed_descriptor_t that corresponds to the extrainfo. That means we should be checking the digest256 match with that signed_descriptor_t, not with the routerinfo. Fixes bug 17150 (and 19017); bugfix on 0.2.7.2-alpha.
2016-05-17Merge branch 'bug18616-v4-merged_028' into maint-0.2.8Nick Mathewson