summaryrefslogtreecommitdiff
path: root/src/or/config.c
AgeCommit message (Collapse)Author
2016-10-17Add a logic-consistency test when parsing unix socket configsNick Mathewson
Coverity couldn't tell that 'addrport' was always non-NULL at this point in the function, so I'm adding an explicit check. This closes CID 1374060.
2016-10-14Merge remote-tracking branch 'public/spaces_in_unix_addrs'Nick Mathewson
2016-10-13Tweak patch for 18529.Nick Mathewson
- function doesn't need to be inline. - rename function - Make documentation more pedantically correct - Remove needless "? 1 : 0."
2016-10-13Remove duplicate code that checks for default authoritiesNick Mathewson
Patch from ericho. Fixes 18529. Simple refactoring.
2016-10-04Allow a unix: address to contain a C-style quoted string.Nick Mathewson
Feature 18753 -- all this to allow spaces.
2016-09-30Bug 20261: Disable IsolateClientAddr on AF_LOCAL SocksPorts.Yawning Angel
The client addr is essentially meaningless in this context (yes, it is possible to explicitly `bind()` AF_LOCAL client side sockets to a path, but no one does it, and there are better ways to grant that sort of feature if people want it like using `SO_PASSCRED`).
2016-09-21Merge remote-tracking branch 'isis/bug20201'Nick Mathewson
2016-09-21Update documentation for parse_bridge_line() in src/or/config.c.Isis Lovecruft
* FIXES #20201: https://bugs.torproject.org/20201
2016-09-13Merge branch 'feature-17178-v7-squashed-v2'Nick Mathewson
2016-09-13Replace OnionService* with HiddenService* in option namesteor
And make consequential line-length adjustments.
2016-09-13Refactor Single Onion code to improve consistencyteor
* Check consistency between the two single onion torrc options * Use the more relevant option each time we check for single onion mode * Clarify log messages * Clarify comments * Otherwise, no behaviour change
2016-09-13Refactor UseEntryNodes so the original configured value is preservedteor
Parse the value to UseEntryNodes_option, then set UseEntryNodes before validating options. This way, Authorities, Tor2web, and Single Onion Services don't write spurious "UseEntryNodes 0" lines to their configs. Document the fact that these tor configurations ignore UseEntryNodes in the manual page. Also reorder options validation so we modify UseEntryNodes first, then check its value against EntryNodes. And silence a warning about disabled UseEntryNodes for hidden services when we're actually in non-anonymous single onion service mode.
2016-09-13Fix a typo in the LearnCircuitBuildTimeout disabled log messageteor
2016-09-13When LearnCircuitBuildTimeout is disabled by other options, be quieterteor
2016-09-13Implement Prop #260: Single Onion Servicesteor (Tim Wilson-Brown)
Add experimental OnionServiceSingleHopMode and OnionServiceNonAnonymousMode options. When both are set to 1, every hidden service on a tor instance becomes a non-anonymous Single Onion Service. Single Onions make one-hop (direct) connections to their introduction and renzedvous points. One-hop circuits make Single Onion servers easily locatable, but clients remain location-anonymous. This is compatible with the existing hidden service implementation, and works on the current tor network without any changes to older relays or clients. Implements proposal #260, completes ticket #17178. Patch by teor & asn. squash! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! fixup! Implement Prop #260: Single Onion Services Redesign single onion service poisoning. When in OnionServiceSingleHopMode, each hidden service key is poisoned (marked as non-anonymous) on creation by creating a poison file in the hidden service directory. Existing keys are considered non-anonymous if this file exists, and anonymous if it does not. Tor refuses to launch in OnionServiceSingleHopMode if any existing keys are anonymous. Similarly, it refuses to launch in anonymous client mode if any existing keys are non-anonymous. Rewrite the unit tests to match and be more comprehensive. Adds a bonus unit test for rend_service_load_all_keys().
2016-09-07Merge remote-tracking branch 'dgoulet/ticket18693_029_01'Nick Mathewson
2016-08-31Count unix sockets when counting client listenersteor (Tim Wilson-Brown)
Users can't run an anonymous client and non-anonymous single onion service at the same time. We need to know whether we have any client ports or sockets open to do this check. When determining whether a client port (SOCKS, Trans, NATD, DNS) is set, count unix sockets when counting client listeners. This has no user-visible behaviour change, because these options are set once and never read in the current tor codebase. Don't count sockets when setting ControlPort_set, that's what ControlSocket is for. (This will be reviewed in #19665.) Don't count sockets when counting server listeners, because the code that uses these options expects to count externally-visible ports. (And it would change the behaviour of Tor.)
2016-08-29We no longer need to tag UseNTorHandshake as deprecated, since it is obsoleteNick Mathewson
2016-08-29Merge remote-tracking branch 'teor/reject-tap-v6'Nick Mathewson
2016-08-25Merge remote-tracking branch 'andrea/ticket18640_v3'Nick Mathewson
2016-08-24Parse *Port flags NoDNSRequest, NoOnionTraffic & OnionTrafficOnlyteor (Tim Wilson-Brown)
OnionTrafficOnly is equivalent to NoDNSRequest, NoIPv4Traffic, and NoIPv6Traffic. Add unit tests for parsing and checking option validity. Add documentation for each flag to the man page. Add changes file for all of #18693. Parsing only: the flags do not change client behaviour (yet!)
2016-08-24make check-spaces fixesNick Mathewson
2016-08-24Merge branch 'maint-0.2.8'Nick Mathewson
2016-08-24Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2016-08-24Replace Tonga with Bifroest.Isis Lovecruft
* FIXES #19728: https://bugs.torproject.org/19728 * CLOSES #19690: https://bugs.torproject.org/19690
2016-08-24Client & HS ignore UseNTorHandshake, all non-HS handshakes use ntorteor (Tim Wilson-Brown)
Rely on onion_populate_cpath to check that we're only using TAP for the rare hidden service cases. Check and log if handshakes only support TAP when they should support ntor.
2016-08-23Merge branch 'bug13953_squashed'Nick Mathewson
2016-08-20Add DisableOOSCheck option, on by default until we have better heuristicsAndrea Shepard
2016-08-20s/connection_handle_oos/connection_check_oos/g per code reviewAndrea Shepard
2016-08-20Stub out connection_handle_oos() and call it from places we can change the ↵Andrea Shepard
socket count or thresholds
2016-08-20Compute thresholds for OOS from ConnLimit_ when setting optionsAndrea Shepard
2016-08-19Log a warning when Testing options are deprecated.Nick Mathewson
2016-08-19Add comments to explain when things were deprecatedNick Mathewson
2016-08-19Merge remote-tracking branch 'public/deprecation_v2'Nick Mathewson
2016-08-12Fix quite a few slow memory leaks in config.cNick Mathewson
This bug was introduced in 8bbbbaf87b5ab3c when we added a separate or_options_free() function but didn't start using it everywhere. Fixes bug 19466.
2016-08-12Merge remote-tracking branch 'public/Fix_19450'Nick Mathewson
2016-08-03Add new warn_deprecated option to config_assign*().Nick Mathewson
Also, collapse all the config_assign*() options into a flags argument, since having two boolean arguments was already confusing.
2016-08-03Deprecate some SocksPort sub-options.Nick Mathewson
2016-08-03Teach checkOptionDocs about deprecation.Nick Mathewson
In particular, teach it that deprecated options must exist.
2016-08-03Mark a big pile of options as deprecated.Nick Mathewson
2016-08-03Add deprecation for configuration options that need to go away.Nick Mathewson
2016-08-02Bufferevent removal: remove more bufferevent-only optionsNick Mathewson
(All this IOCP stuff was bufferevent-only.)
2016-07-28Fix a huge pile of -Wshadow warnings.Nick Mathewson
These appeared on some of the Jenkins platforms. Apparently some GCCs care when you shadow globals, and some don't.
2016-07-28Merge branch 'bug18902_squashed'Nick Mathewson
2016-07-28Fix all -Wshadow warnings on LinuxNick Mathewson
This is a partial fix for 18902.
2016-07-14Remove bufferevents dead codeU+039b
Signed-off-by: U+039b <*@0x39b.fr>
2016-07-08Merge remote-tracking branch 'sebastian/libevent2'Nick Mathewson
2016-07-05Merge remote-tracking branch 'teor/bug18456'Nick Mathewson
2016-07-05Merge branch 'maint-0.2.8'Nick Mathewson
2016-07-05Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson