Age | Commit message (Collapse) | Author |
|
|
|
|
|
This will avoid some signed/unsigned assignment-related bugs.
|
|
|
|
Big thanks to nickm and arma for helping me with this!
|
|
We were triggering a CLOCK_SKEW controller status event whenever
we connect via the v2 connection protocol to any relay that has
a wrong clock. Instead, we should only inform the controller when
it's a trusted authority that claims our clock is wrong. Bugfix
on 0.2.0.20-rc; starts to fix bug 1074. Reported by SwissTorExit.
|
|
The problem is that clients and hidden services are receiving
relay_early cells, and they tear down the circuit.
Hack #1 is for rendezvous points to rewrite relay_early cells to
relay cells. That way there are never any incoming relay_early cells.
Hack #2 is for clients and hidden services to never send a relay_early
cell on an established rendezvous circuit. That works around rendezvous
points that haven't upgraded yet.
Hack #3 is for clients and hidden services to not tear down the circuit
when they receive an inbound relay_early cell. We already refuse extend
cells at clients.
|
|
|
|
a destroy cell from our first hop.
svn:r17991
|
|
svn:r17973
|
|
The subversion $Id$ fields made every commit force a rebuild of
whatever file got committed. They were not actually useful for
telling the version of Tor files in the wild.
svn:r17867
|
|
svn:r17754
|
|
svn:r17739
|
|
svn:r17726
|
|
patch.
svn:r17686
|
|
anywhere, and remove the ones that we really want gone.
svn:r17651
|
|
Initial conversion of uint32_t addr to tor_addr_t addr in connection_t and related types. Most of the Tor wire formats using these new types are in, but the code to generate and use it is not. This is a big patch. Let me know what it breaks for you.
svn:r16435
|
|
Implement most of proposal 110.
svn:r16156
|
|
Never allow a circuit to be created with the same circid as a circuit that has been marked for close. May be a fix for bug 779. Needs testing. Backport candidate.
svn:r16136
|
|
Fix bug 663: warn less verbosely about clock skew from netinfo cells
svn:r14408
|
|
More 64-to-32 fixes.
svn:r13672
|
|
Answer one xxx020 item; move 7 other ones to a new "XXX020rc" category: they should get fixed before we cut a release candidate. arma: please review these to see whether you have fixes/answers for any. Please check out the other 14 XXX020s to see if any look critical for the release candidate.
svn:r13640
|
|
Defer, downgrade, or address more XXX020s. The remaining ones are all ones we should deal with before release.
svn:r13530
|
|
Patch from karsten: make hidden service code respect SafeLogging.
svn:r13493
|
|
Re-tune mempool parametes based on testing on peacetime: use smaller chuncks, free them a little more aggressively, and try very hard to concentrate allocations on fuller chunks. Also, lots of new documentation.
svn:r13484
|
|
Make version negotiation and handshaking messages more useful and accurate.
svn:r13477
|
|
Fix command.c compilation with gcc 4.2 warnings enabled.
svn:r13475
|
|
add some documentation
svn:r13462
|
|
Fix some XXX020s in command.c, and make it not-allowed to negotiate v1 using the v2 connection protocol: it is too hard to test, and pointless to support.
svn:r13460
|
|
Merge connection_or_act_on_netinfo into command.c; remove some fields from or_handshake_state().
svn:r13458
|
|
More protocol negotiation work. Make the negotiation actually complete and set the state to open. Fix a crash bug that occured when we forcibly stopped the connection from writing.
svn:r13434
|
|
svn:r13412
|
|
The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc.
svn:r13409
|
|
Fix/downgrade some more XXX020s.
svn:r13397
|
|
Initial attempts to track down bug 600, and refactor possibly offending code. 1) complain early if circuit state is set to OPEN when an onionskin is pending. 2) refactor onionskin field into one only used when n_conn is pending, and a separate onionskin field waiting for attention by a cpuworker. This might even fix the bug. More likely, it will make it fail with a more useful core.
svn:r13394
|
|
Remove a few #if-0d items.
svn:r13392
|
|
Basic hacks to get TLS handshakes working: remove dead code; fix post-handshake logic; keep servers from writing while the client is supposed to be renegotiating. This may work. Needs testing.
svn:r13122
|
|
svn:r12786
|
|
more fixes into rend-spec.txt.
svn:r12715
|
|
on but your ORPort is off.
Add a new config option BridgeRelay that specifies you want to
be a bridge relay. Right now the only difference is that it makes
you answer begin_dir requests, and it makes you cache dir info,
even if your DirPort isn't on.
Refactor directory_caches_dir_info() into some more functions.
svn:r12668
|
|
Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER.
svn:r12622
|
|
Initial phase of proposal 110: accept RELAY_EARLY cells, and turn them into RELAY cells when sending them on over a v1 OR connection.
svn:r12496
|
|
When we complete an OR handshake, set up all the internal fields and mark the connection as open.
svn:r12495
|
|
Parse CERT cells and act correctly when we get them.
svn:r12396
|
|
Fix warning about overflow optimization.
svn:r12395
|
|
Send and Parse CERT cells correctly. Still need to understand the certs inside.
svn:r12392
|
|
Make VERSIONS variable-length.
svn:r12391
|
|
Initial code for variable-length cells. CERT and VERSIONS need to use them.
svn:r12390
|
|
Oops; fix compile
svn:r12387
|
|
Send and parse link_auth cells properly.
svn:r12386
|