summaryrefslogtreecommitdiff
path: root/src/or/config.c
AgeCommit message (Collapse)Author
2012-10-03Free some more still-in-use memory at exitRoger Dingledine
2012-09-28Add missing declaration so 6876 compilesNick Mathewson
2012-09-28Merge remote-tracking branch 'linus/enh6876_2'Nick Mathewson
2012-09-25Merge remote-tracking branch 'rransom/warn-about-hses-without-guards'Nick Mathewson
2012-09-22Merge branch 'maint-0.2.3'Roger Dingledine
2012-09-22add faravahar as our ninth v3 dir authRoger Dingledine
2012-09-21add changes file and whitespace fixes for bug 4020Nick Mathewson
2012-09-21Reinstate address in warning message when binding non-locallyTom Fitzhenry
bug4020 Signed-off-by: Tom Fitzhenry <tom@tom-fitzhenry.me.uk>
2012-09-20Don't leak msg when parse_virtual_addr_network() fails.Linus Nordberg
2012-09-20Make option OutboundBindAddress accept IPv6 addresses too.Linus Nordberg
Implements ticket 6786.
2012-09-18Warn if HSes are configured on a client with UseEntryGuards disabledRobert Ransom
2012-09-18Correct comment explaining why tor2web mode should disable entry guardsRobert Ransom
2012-09-18Disable Guard usage for Tor2webMode.Mike Perry
Tor2webMode is fingerprintable by hidden services through repeated usage of the same three guard nodes for its rend and intro points.
2012-09-14Move functions for seeing if we know enough nodes into nodelistNick Mathewson
2012-09-14Split the routerset code out of routerlist.cNick Mathewson
2012-09-13Split the or_state_t portions of config.c into their own fileNick Mathewson
2012-09-13Split the generic config_fmt_t code into a new confparse.c fileNick Mathewson
This helps us split up one of our larger files, and sets the stage for refactoring the configuration backend a little
2012-09-10Fix tab introduced in f43946829ce037Nick Mathewson
2012-09-10Rename _UseFilteringSSLBufferevents to lose its _. Bug 3155Nick Mathewson
2012-09-10Hide options beginning with "___" from GETINFO config/namesmeejah
2012-09-10rename _UsingTestNetworkDefaults to start with triple-underscoremeejah
2012-09-10raise bandwidthrate/bandwidthburst to a new "infinite"Roger Dingledine
addresses bug 6605.
2012-09-07a debugging log line that just helped meRoger Dingledine
2012-09-06Rename config_alloc() --> _new().Linus Nordberg
2012-09-06Merge remote-tracking branch 'asn/bug4567_rebased'Nick Mathewson
2012-09-05make AuthDirHasIPv6Connectivity match the man pageRoger Dingledine
we can turn it into an autobool later if we have some way for it to make a decision. (patch possibly got lost when nickm merged #6770; or maybe nickm meant for it to be this way. i'm not sure.)
2012-09-05Figure out ORPort and DirPort even when 'auto' is used.George Kadianakis
Use router_get_advertised_{dir,or}_port() functions instead of get_primary_{dir,or}_port().
2012-09-05Merge remote-tracking branch 'linus/bug6770_3'Nick Mathewson
Conflicts: doc/tor.1.txt src/or/config.c
2012-09-05General tweaks and fixes for Nick's comments.George Kadianakis
* Add changes/ files. * Edit the tor-fw-helper manpage. * Fix check-spaces. * Add prototype for get_list_of_ports_to_forward(). * Fix tor_parse_long() TCP port range. * Improve doc. of tor_check_port_forwarding(). * Check for overflows in tor_check_port_forwarding(). * Demote successful port forwarding to LOG_INFO. Conflicts: src/common/address.c src/or/circuitbuild.c
2012-09-05Start passing ports to tor_check_port_forwarding().George Kadianakis
Conflicts: src/or/transports.c
2012-09-05Remove AuthDirPublishIPv6 and let AuthDirHasIPv6Connectivity fill its function.Linus Nordberg
See #4771 for rationale. Note that this patch does not take suggested changes in #4470 into account and keeps treating AuthDirHasIPv6Connectivity as an AUTOBOOL. Thus, bug fixes for that are included here as well. This is a fix on master, unreleased as of now.
2012-09-05Make AuthDirHasIPv6Connectivity a BOOL.Linus Nordberg
This is a fix of unreleased tor. It solves ticket #6770.
2012-09-04Clients connect to public relays over IPv6.Linus Nordberg
Add ClientUseIPv6 and ClientPreferIPv6ORPort configuration options. Use "preferred OR port" for all entry nodes, not only for bridges. Mark bridges with "prefer IPv6 OR port" if an IPv6 address is configured in Bridge line and ClientPreferIPv6ORPort is set. Mark relays with "prefer IPv6 OR port" if an IPv6 address is found in descriptor and ClientPreferIPv6ORPort is set. Filter "preferred OR port" through the ClientUseIPv6 config option. We might want to move this test to where actual connection is being set up once we have a fall back mechanism in place. Have only non-servers pick an IPv6 address for the first hop: We don't want relays to connect over IPv6 yet. (IPv6 has never been used for second or third hops.) Implements ticket 5535.
2012-09-04Merge remote-tracking branch 'arma/bug6759'Nick Mathewson
2012-09-03fix whitespace and trivial typoRoger Dingledine
2012-08-27Merge remote-tracking branch 'origin/maint-0.2.3'Nick Mathewson
2012-08-27Disable extending to private/internal addresses by defaultNick Mathewson
This is important, since otherwise an attacker can use timing info to probe the internal network. Also, add an option (ExtendAllowPrivateAddresses) so that TestingTorNetwork won't break. Fix for bug 6710; bugfix on all released versions of Tor.
2012-08-17Merge remote-tracking branch 'origin/maint-0.2.3'Nick Mathewson
2012-08-17Merge remote-tracking branch 'public/bug6244_part_c' into maint-0.2.3Nick Mathewson
2012-08-17Merge remote-tracking branch 'origin/maint-0.2.3'Nick Mathewson
2012-08-15Raise the part of torrc mapaddress handling that knows wildcardsNick Mathewson
This patch extracts the inner part of config_register_addressmaps -- the part that knows about detecting wildcard addresses addresses -- and makes it into a new function. The new function is deliberately not moved or reindented, so that the diff is smaller. I need this to fix bug 6244.
2012-08-09Reject attempts to say FooPort and FooPort 0 in the same cfg domainNick Mathewson
2012-08-09Fix spaces from last patchNick Mathewson
2012-08-09Don't infer we have a FooPort from the presence of a FooPort lineNick Mathewson
Thanks to the changes we started making with SocksPort and friends in 0.2.3.3-alpha, any of our code that did "if (options->Sockport)" became wrong, since "SocksPort 0" would make that test true whereas using the default SocksPort value would make it false. (We didn't actually do "if (options->SockPort)" but we did have tests for TransPort. When we moved DirPort, ORPort, and ControlPort over to the same system in 0.2.3.9-alpha, the problem got worse, since our code is littered with checks for DirPort and ORPort as booleans. This code renames the current linelist-based FooPort options to FooPort_lines, and adds new FooPort_set options which get set at parse-and-validate time on the or_options_t. FooPort_set is true iff we will actually try to open a listener of the given type. (I renamed the FooPort options rather than leave them alone so that every previous user of a FooPort would need to get inspected, and so that any new code that forgetfully uses FooPort will need fail to compile.) Fix for bug 6507.
2012-07-31Merge remote-tracking branch 'origin/maint-0.2.3'Nick Mathewson
2012-07-31Warn when accounting is used in a way likely to link hidden servicesNick Mathewson
Fix for 6490.
2012-07-24Fix small memleak introduced in recent patch; fixe 6455.Nick Mathewson
2012-07-23Merge remote-tracking branch 'origin/maint-0.2.3'Nick Mathewson
2012-07-23Merge remote-tracking branch 'asn/bug6274_take3' into maint-0.2.3Nick Mathewson
2012-07-19Add config option AuthDirPublishIPv6.Linus Nordberg
Test for config option AuthDirPublishIPv6 == 1 rather than for running as a bridge authority when deciding whether to care or not about IPv6 OR ports in descriptors. Implements enhancement #6406.