Age | Commit message (Collapse) | Author | |
---|---|---|---|
2018-08-24 | Update the protocol versions recommendations to remove LinkAuth=1 | Nick Mathewson | |
LinkAuth method 1 is the one where we pull the TLS master secrets out of the OpenSSL data structures and authenticate them with RSA. Right now we list method 1 as required for clients and relays. That's a problem, since we can't reasonably support it with NSS. So let's remove it as a requirement and a recommendation. As for method 3: I'd like to recommend it it, but that would make 0.2.9 start warning. Let's not do that till at least some time after 0.3.5 (the next LTS) is stable. Closes ticket 27286 | |||
2018-08-22 | Merge branch 'maint-0.2.9' into maint-0.3.2 | Nick Mathewson | |
2018-08-22 | Mark cert_matches_key as not-intrusive; fix stretch compilation. | Nick Mathewson | |
2018-08-16 | Keep descriptor rotation time after HUP occurs. | George Kadianakis | |
2018-07-25 | Improve connection auth logging | teor | |
Improve the log message when connection initiators fail to authenticate direct connections to relays. Fixes bug 26927; bugfix on 0.3.0.1-alpha. | |||
2018-07-25 | Merge branch 'bug26924_029' into bug26924_032 | teor | |
2018-07-25 | Stop logging link auth warnings on Single Onion Services and Tor2web | teor | |
Instead, log a protocol warning when single onion services or Tor2web clients fail to authenticate direct connections to relays. Fixes bug 26924; bugfix on 0.2.9.1-alpha. | |||
2018-07-20 | Merge branch 'ticket26647_032' into maint-0.3.2 | Nick Mathewson | |
2018-07-18 | Merge branch 'maint-0.2.9' into maint-0.3.2 | Nick Mathewson | |
2018-07-18 | Merge branch 'bug26485_029_squashed' into maint-0.2.9 | Nick Mathewson | |
2018-07-18 | Warn when an authority has voted for a version with a space in it. | Nick Mathewson | |
Another way to try to prevent a recurrence of 26485. | |||
2018-07-18 | Warn the directory authority operator if their versions list is bogus | Nick Mathewson | |
Prevents bug 26485; bugfix on 0.1.1.6-alpha. | |||
2018-07-12 | Merge branch 'maint-0.2.9' into maint-0.3.2 | Nick Mathewson | |
2018-07-12 | put new bridge auth Serge into place | Roger Dingledine | |
The "Bifroest" bridge authority has been retired; the new bridge authority is "Serge", and it is operated by George from the TorBSD project. Closes ticket 26771. | |||
2018-07-10 | Add controller support for listing ExtORPort and HTTPTunnelPorts | Nick Mathewson | |
Closes ticket 26647. | |||
2018-07-09 | Merge branch 'maint-0.2.9' into maint-0.3.2 | Nick Mathewson | |
2018-07-09 | Merge branch 'bug26269_029' into maint-0.2.9 | Nick Mathewson | |
2018-06-29 | Merge remote-tracking branch 'ahf-github/maint-0.3.2' into maint-0.3.2 | Nick Mathewson | |
2018-06-29 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-06-29 | Merge remote-tracking branch 'ahf-github/maint-0.3.0' into maint-0.3.1 | Nick Mathewson | |
2018-06-29 | Merge remote-tracking branch 'ahf-github/maint-0.3.1' into maint-0.3.1 | Nick Mathewson | |
2018-06-29 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-06-29 | Merge branch 'maint-0.2.9' into maint-0.3.1 | Nick Mathewson | |
2018-06-23 | Fix memory leak in disk_state_parse_commits(). | Alexander Færøy | |
This patch fixes a memory leak in disk_state_parse_commits() where if commit is NULL, we continue the internal loop, but without ever freeing the args variable. See: Coverity CID 1437441. | |||
2018-06-23 | Fix memory leak in frac_nodes_with_descriptors(). | Alexander Færøy | |
This patch fixes a memory leak in frac_nodes_with_descriptors() where we might return without free'ing the bandwidths variable. See: Coverity CID 1437451. | |||
2018-06-23 | Fix memory leak in decode_link_specifiers(). | Alexander Færøy | |
This patch fixes a memory leak in decode_link_specifiers() where the hs_spec variable might leak if the default label is taken in the switch/case expression. See: Coverity CID 1437437. | |||
2018-06-23 | Fix memory leak in client_likes_consensus(). | Alexander Færøy | |
This patches fixes a memory leak in client_likes_consensus() where if consensus_cache_entry_get_voter_id_digests() would fail we would return without having free'd the voters list. See: Coverity CID 1437447 | |||
2018-06-23 | Fix memory leak in pick_hsdir_v3(). | Alexander Færøy | |
This patch fixes a memory leak in pick_hsdir_v3() where we might return early, but forgot to free the responsible_hsdirs variable. We solve this by not allocating storage for responsible_hsdirs until it's actually needed. See: Coverity CID 1437449 | |||
2018-06-13 | Fix a GCC "potential null dereference" warning. | Nick Mathewson | |
Fixes bug 26269; bugfix on c30be5a82d47328 in 0.2.8.2-alpha | |||
2018-06-13 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-06-13 | Merge branch 'bug26158_031' into maint-0.3.1 | Nick Mathewson | |
2018-06-13 | Merge branch 'bug25686_diagnostic_032' into maint-0.3.2 | Nick Mathewson | |
2018-06-12 | Merge branch 'maint-0.2.9' into maint-0.3.1 | Nick Mathewson | |
2018-06-12 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-06-12 | Add IPv6 orport address for dannenberg. | Linus Nordberg | |
2018-06-11 | Several attempts to diagnose ticket 25686 | Nick Mathewson | |
There are a few reasons that relays might be uploading desciptors without saying X-Desc-Gen-Reason: 1. They are running an old version of our software, before 0.3.2.stable. 2. They are not running our software, but they are claiming they are. 3. They are uploading through a proxy that strips X-Desc-Gen-Reason. 4. They somehow had a bug in their software. According to the 25686 data, 1 is the most common reason. This ticket is an attempt to diagnose case 4, or prove that case 4 doesn't actually happen. | |||
2018-06-08 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-06-08 | Merge branch 'maint-0.2.9' into maint-0.3.1 | Nick Mathewson | |
2018-06-08 | Avoid out-of-bounds smartlist access in protover_compute_vote() | rl1987 | |
and contract_protocol_list() | |||
2018-05-22 | Add a missing "return -1" when checking for Ed25519 ID loops | Nick Mathewson | |
Fixes bug 26158; bugfix on 0.3.0.1-alpha. | |||
2018-05-16 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-05-16 | Merge branch 'maint-0.2.9' into maint-0.3.1 | Nick Mathewson | |
2018-05-14 | Add a missing return after marking a stream for bad connected cell | Nick Mathewson | |
Fixes bug 26072; bugfix on 0.2.4.7-alpha. | |||
2018-05-10 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-05-10 | hs-v3: Add an extra white-space when parsing descriptor | David Goulet | |
The specification describes the signature token to be right after a newline (\n) then the token "signature" and then a white-space followed by the encoded signature. This commit makes sure that when we parse the signature from the descriptor, we are always looking for that extra white-space at the end of the token. It will allow us also to support future fields that might start with "signature". Fixes #26069 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2018-05-10 | Merge branch 'maint-0.3.1' into maint-0.3.2 | Nick Mathewson | |
2018-05-10 | Merge branch 'maint-0.2.9' into maint-0.3.1 | Nick Mathewson | |
2018-05-09 | Having a ControlPort open doesn't mean we are a client | David Goulet | |
The any_client_port_set() returns true if the ControlPort is set which is wrong because we can have that port open but still not behave as a tor client (like many relays for instance). Fixes #26062 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2018-05-09 | Merge remote-tracking branch 'asn-github/bug25761_032' into maint-0.3.2 | Nick Mathewson | |
2018-05-09 | Detect when v3 services get disabled after HUP. | George Kadianakis | |
Remove v3 optimization which made Tor not detect disabling services. This optimization is not so needed because we only call that function after HUP anyway. Fixes bug #25761. |