aboutsummaryrefslogtreecommitdiff
path: root/src/or/router.c
AgeCommit message (Collapse)Author
2011-04-26If we're excluded, and StrictNodes is set, do not do self-tests.Nick Mathewson
2011-04-26three more cases where maybe we want to excludeRoger Dingledine
2011-03-14Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
2011-03-13we're not reachable if we don't have a routerinfo yetRoger Dingledine
2011-02-22Don't let bad DNS make exit policy and declared exit policy get out of syncNick Mathewson
Patch from "postman" on trac. Fixes bg 2366. Bug on 0.1.2.5-alpha.
2011-02-16Don't crash a bridge authority on SIGHUP if it's not in the consensusRobert Ransom
Fixes bug 2572.
2011-01-15Sanity-check consensus param valuesSebastian Hahn
We need to make sure that the worst thing that a weird consensus param can do to us is to break our Tor (and only if the other Tors are reliably broken in the same way) so that the majority of directory authorities can't pull any attacks that are worse than the DoS that they can trigger by simply shutting down. One of these worse things was the cbtnummodes parameter, which could lead to heap corruption on some systems if the value was sufficiently large. This commit fixes this particular issue and also introduces sanity checking for all consensus parameters.
2011-01-03Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
Conflicts: src/common/test.h src/or/test.c
2011-01-03Bump copyright statements to 2011Nick Mathewson
2010-11-24Avoid dereferencing NULL if a bridge fails to build an ei descriptor.Robert Ransom
Reported by an anonymous commenter on Trac.
2010-11-19Merge branch 'fix2183', remote branch 'rransom/fix2195-v2' into maint-0.2.2Nick Mathewson
2010-11-19Fix logic error in router_dump_router_to_string.Robert Ransom
Spotted by Nick Mathewson.
2010-11-19Add comments to some of the bug2183 fix codeNick Mathewson
2010-11-17Generate a router descriptor even if generating an extra-info descriptor fails.Robert Ransom
Fixes bug #2195.
2010-11-17Do not emit an extra-info-digest descriptor line if the digest is zero.Robert Ransom
2010-11-17Tweak the bugfix for 2183 a bit more.Karsten Loesing
2010-11-15Don't use log_err for non-criticial warnings.Karsten Loesing
2010-11-15Try harder not to exceed the 50 KB extra-info descriptor limit.Karsten Loesing
Our checks that we don't exceed the 50 KB size limit of extra-info descriptors apparently failed. This patch fixes these checks and reserves another 250 bytes for appending the signature. Fixes bug 2183.
2010-11-10Change Natd into NATD in our options.Sebastian Hahn
Breaking this out of the last commit because this might be more controversial.
2010-10-26Properly refcount client_identity_keySebastian Hahn
In a2bb0bf we started using a separate client identity key. When we are in "public server mode" (that means not a bridge) we will use the same key. Reusing the key without doing the proper refcounting leads to a segfault on cleanup during shutdown. Fix that. Also introduce an assert that triggers if our refcount falls below 0. That should never happen.
2010-10-21Fix a whitespace errorNick Mathewson
2010-10-21Add some asserts to get_{tlsclient|server}_identity_keyNick Mathewson
We now require that: - Only actual servers should ever call get_server_identity_key - If you're being a client or bridge, the client and server keys should differ. - If you're being a public relay, the client and server keys should be the same.
2010-10-21Rename get_client_identity_key to get_tlsclient_identity_keyNick Mathewson
2010-10-04Maintain separate server and client identity keys when appropriate.Robert Ransom
Fixes a bug described in ticket #988.
2010-10-04Maintain separate server and client TLS contexts.Robert Ransom
Fixes bug #988.
2010-10-04Refactor tor_tls_context_new:Robert Ransom
* Make tor_tls_context_new internal to tortls.c, and return the new tor_tls_context_t from it. * Add a public tor_tls_context_init wrapper function to replace it.
2010-10-04Add public_server_mode function.Robert Ransom
2010-10-01fix commentRoger Dingledine
2010-10-01log when we guess our ip address, not just when we failRoger Dingledine
2010-09-27changelog entry for bug1751Roger Dingledine
2010-09-27Change bug1751 enabling code based on comments from armaNick Mathewson
2010-09-21First cut of code to enable RefuseUnknownExitsNick Mathewson
The RefuseUnknownExits config option is now a tristate, with "1" meaning "enable it no matter what the consensus says", "0" meaning "disable it no matter what the consensus says", and "auto" meaning "do what the consensus says". If the consensus is silent, we enable RefuseUnknownExits. This patch also changes the dirserv logic so that refuseunknownexits won't make us cache unless we're an exit.
2010-07-27Create routerparse.hSebastian Hahn
2010-07-27Create rephist.hSebastian Hahn
2010-07-27Create relay.hSebastian Hahn
2010-07-27Create policies.hSebastian Hahn
2010-07-27Create main.hSebastian Hahn
2010-07-27Create hibernate.hSebastian Hahn
2010-07-27Create dns.hSebastian Hahn
2010-07-27Create dirserv.hSebastian Hahn
2010-07-27Create directory.hSebastian Hahn
2010-07-27Create control.hSebastian Hahn
2010-07-27Create connection.hSebastian Hahn
2010-07-27Create config.hSebastian Hahn
2010-07-27Create circuituse.hSebastian Hahn
2010-07-27Create circuitlist.hSebastian Hahn
2010-07-27Create routerlist.hSebastian Hahn
2010-07-27Create router.hSebastian Hahn
2010-07-27Create geoip.hSebastian Hahn
2010-04-23finally get rid of "clique mode"Roger Dingledine