Age | Commit message (Collapse) | Author |
|
Move NT services code into its own C file. Probably will not build happily on win32 yet; more hacking needed.
svn:r11388
|
|
svn:r11382
|
|
There is no good reason to make hashedcontrolpassword and cookieauthentication mutually exclusive. So let's not.
svn:r11377
|
|
Teach tor about more libevent versions. Be more clear that "Known bugs" means "it will crash or something." Most significantly, stop issuing dire warnings every time we run with kqueue on os x: it seems to have worked for a while now.
svn:r11314
|
|
Add a line to the state file for each guard to let us know which version added the guard. If the line is absent, assume the guard was added by whatever version of Tor last wrote the state file. Remove guards if the version that added them was using a bad guard selection algorithm. (Previously, we removed guards if the version that wrote the file was using a bad guard selection algorithm, even if the guards themselves were chosen by a good version.)
svn:r11298
|
|
Most configuration options have the same names in or.h and in torrc. Make the macros reflect this, so that it is easier to fit them onto a line, and so that mismatched options stand out more
svn:r11290
|
|
Add a new ClientDNSRejectInternalAddresses option (default: on) to refuse to believe that any address can map to or from an internal address. This blocks some kinds of potential browser-based attacks, especially on hosts using DNSPort. Also clarify behavior in some comments. Backport candiate?
svn:r11287
|
|
svn:r11276
|
|
svn:r11273
|
|
want, which is to expire old guards *every* time somebody moves
from an old version to the new one.
also, refine which version numbers count as 'new enough'.
svn:r11272
|
|
since we want the default guardversion to be 0 (which is what it is
if there's no guardversion line), yet when we're validating a freshly
configed and defaulted state, we don't want to complain.
svn:r11264
|
|
svn:r11263
|
|
b) raise the max-believable-bandwidth to 10MB/s.
svn:r11258
|
|
in your working directory if you don't specify anything for the
new CookieAuthFile option. Reported by Matt Edman.
svn:r11237
|
|
Only load MTBF data if we are running tor
svn:r11226
|
|
Clean up MTBF storage code. Do not count times that we have been down toward the current run. Handle backward timewarps correctly. Store MTBF data on exit in addition to periodically.
svn:r11225
|
|
Trigger load and save of MTBF data.
svn:r11219
|
|
Refuse to start with certain directory authority keys, and
encourage people using them to stop.
svn:r11171
|
|
svn:r11146
|
|
Implement CookieAuthFile and CookieAuthFileGroupReadable. Backport candidate.
svn:r11141
|
|
Add unit tests for median functions; enforce sensible ranges for intervals and delays.
svn:r11121
|
|
- If we require CookieAuthentication but we fail to write the
cookie file, we would warn but not exit, and end up in a state
where no controller could authenticate. Now we exit.
- If we require CookieAuthentication, stop generating a new cookie
every time we change any piece of our config.
svn:r11117
|
|
Resolve XXXX020s in config.c
svn:r11108
|
|
Enable more code for v3 voting timing information. Also, spec clarification.
svn:r11107
|
|
Resolve a pile of XXXXs in and around voting code
svn:r11099
|
|
Actually store the v3 authority id digest of a trusteddirserver
svn:r11091
|
|
Make voting interval configurable.
svn:r11083
|
|
Include fewer redundant headers; use the compiler search paths better.
svn:r11060
|
|
Warn about unsafe ControlPort configurations.
svn:r11038
|
|
svn:r10998
|
|
your instructions don't seg fault
svn:r10984
|
|
svn:r10978
|
|
Another patch from croup: drop support for address masks that do not correspond to bit prefixes. Nobody has used this for a while, and we have given warnings for a long time.
svn:r10881
|
|
svn:r10851
|
|
Tweaks on constrained socket buffers patch from coderman: Add a changelog; rename some variables; fix some long lines and whitespace; make ConstrainedSockSize a memunit; pass setsockopt a void.
svn:r10843
|
|
Initial "constrained socket buffers" patch from coderman. needs tweaking.
svn:r10842
|
|
fix copy-paste error in config message src/or/config.c . Apply
initial (but pared-down) version of launch-resolve-via-controller
patch from Robert Hogan.
svn:r10780
|
|
Sun CC likes to give warnings for the do { } while(0) construction for making statement-like macros. Define STMT_BEGIN/STMT_END macros that do the right thing, and use them everywhere.
svn:r10645
|
|
- demand options->Bridges and options->TunnelDirConns if
options->UseBridges is set.
- after directory fetches, accept descriptors that aren't referenced by
our networkstatuses, *if* they're for a configured bridge.
- delay directory fetching until we have at least one bridge descriptor.
- learn how to build a one-hop circuit when we have neither routerinfo
nor routerstatus for our destination.
- teach directory connections how to pick a bridge as the destination
directory when doing non-anonymous fetches.
- tolerate directory commands for which the dir_port is 0.
- remember descriptors when the requested_resource was "authority",
rather than just ignoring them.
- put bridges on our entry_guards list once we have a descriptor for them.
When UseBridges is set, only pick entry guards that are bridges. Else
vice versa.
svn:r10571
|
|
svn:r10548
|
|
svn:r10547
|
|
Bridge authorities no longer write bridge descriptors to their
cached-routers file -- this gets complex because of extrainfo documents.
svn:r10545
|
|
Remove another long-dead #if 0 I missed before
svn:r10511
|
|
Patch from peter palfrader: control interface via unix domain socket
svn:r10504
|
|
always was 0.
svn:r10486
|
|
Oops. Only bind ports and start libevent if we are actually running Tor.
svn:r10474
|
|
Bind ports before setuid/setgid.
svn:r10473
|
|
svn:r10453
|
|
Try to fix some mipspro compiler warnings. There will still be some left.
svn:r10444
|
|
Fix patch r10411; fix from robert hogan.
svn:r10422
|