aboutsummaryrefslogtreecommitdiff
path: root/src/or
AgeCommit message (Collapse)Author
2016-09-26Workaround a test bugNick Mathewson
2016-09-26Implement voting on the protocol-version optionsNick Mathewson
2016-09-26Include protocol version lines in votes.Nick Mathewson
2016-09-26Remove a little duplicated code before it becomes a lotNick Mathewson
2016-09-26Add code to infer protocol versions for old Tor versions.Nick Mathewson
2016-09-26Cover the error cases of parsing protocol versionsNick Mathewson
Also, detect an additional failure type. Thanks, tests! (How distinctly I recall thee)
2016-09-26Basic backend for the protocol-versions voting algorithm.Nick Mathewson
[This is a brute-force method that potentially uses way too much RAM. Need to rethink this a little. Right now you can DOS an authority by saying "Foo=1-4294967295".]
2016-09-26Actually check for missing protocols and exit as appropriate.Nick Mathewson
2016-09-26Add necessary code to parse and handle required/recommended protocolsNick Mathewson
2016-09-26Emit and parse protocol lists in router descriptorsNick Mathewson
2016-09-26checkpoint basic protover backendNick Mathewson
2016-08-29We no longer need to tag UseNTorHandshake as deprecated, since it is obsoleteNick Mathewson
2016-08-29Merge remote-tracking branch 'teor/reject-tap-v6'Nick Mathewson
2016-08-26Fix OOS comparator fixAndrea Shepard
2016-08-25Fix duplicated if condition in connection.cDavid Goulet
Furthermore, fix a test that could returned an uninitialized value. Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-08-25Merge remote-tracking branch 'andrea/ticket18640_v3'Nick Mathewson
2016-08-24make check-spaces fixesNick Mathewson
2016-08-24Merge branch 'maint-0.2.8'Nick Mathewson
2016-08-24Fix path selection on firewalled clientsteor
Signed-off-by: teor <teor2345@gmail.com>
2016-08-24Merge branch 'maint-0.2.8'Nick Mathewson
2016-08-24Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2016-08-24Replace Tonga with Bifroest.Isis Lovecruft
* FIXES #19728: https://bugs.torproject.org/19728 * CLOSES #19690: https://bugs.torproject.org/19690
2016-08-24Add a stub for rend_service_allow_direct_connectionteor
It always returns 0. It should be replaced with the Single Onion version from #17178 when both are merged.
2016-08-24Client & HS ignore UseNTorHandshake, all non-HS handshakes use ntorteor (Tim Wilson-Brown)
Rely on onion_populate_cpath to check that we're only using TAP for the rare hidden service cases. Check and log if handshakes only support TAP when they should support ntor.
2016-08-24Improve comments in circuit_get_cpath_*teor (Tim Wilson-Brown)
2016-08-24Client & HS make sure every hop in every non-HS path supports ntorteor (Tim Wilson-Brown)
When a client connects to an intro point not in the client's consensus, or a hidden service connects to a rend point not in the hidden service's consensus, we are stuck with using TAP, because there is no ntor link specifier.
2016-08-23Merge remote-tracking branch 'jigsaw/fix-17758'Nick Mathewson
2016-08-23Merge remote-tracking branch 'jigsaw/fix-15381'Nick Mathewson
2016-08-23Use tor_assert, not assert.Nick Mathewson
2016-08-23Merge branch 'bug13953_squashed'Nick Mathewson
2016-08-23Reword the router_check_descriptor_address_port_consistency log messageteor
The new message covers static and dynamic public IPv4 addresses, and external / internal addresses in NAT setups.
2016-08-22Merge branch 'maint-0.2.8'Nick Mathewson
2016-08-22Do not pass NULL to log(%s) in dir_server_new.Nick Mathewson
This bug had existed since 0.2.4.7-alpha, but now that we have FallbackDirs by default, it actually matters. Fixes bug 19947; bugfix on 0.2.4.7-alpha or maybe 0.2.8.1-alpha. Rubiate wrote the patch; teor wrote the changes file.
2016-08-20Use connection_mark_for_close() rather than connection_mark_on_flush() on OOSAndrea Shepard
2016-08-20Add DisableOOSCheck option, on by default until we have better heuristicsAndrea Shepard
2016-08-20Consider the case that a connection doesn't have a valid socket during OOSAndrea Shepard
2016-08-20Add connection_is_moribund() inlineAndrea Shepard
2016-08-20Use SMARTLIST_FOREACH in connection_count_moribund() per code reviewAndrea Shepard
2016-08-20s/connection_handle_oos/connection_check_oos/g per code reviewAndrea Shepard
2016-08-20Unit test for pick_oos_victims()Andrea Shepard
2016-08-20Unit test for kill_conn_list_for_oos()Andrea Shepard
2016-08-20Unit test for connection_handle_oos()Andrea Shepard
2016-08-20Implement OOS comparatorAndrea Shepard
2016-08-20Implement pick_oos_victims() except for sort stepAndrea Shepard
2016-08-20Implement kill_conn_list_for_oos()Andrea Shepard
2016-08-20Stub out pick_oos_victims() and kill_conn_list_for_oos()Andrea Shepard
2016-08-20Implement connection_count_moribund() for OOS handlerAndrea Shepard
2016-08-20Don't say OOS unless the ConnLimit thresholds have been setAndrea Shepard
2016-08-20Stub out connection_handle_oos() and call it from places we can change the ↵Andrea Shepard
socket count or thresholds
2016-08-20Compute thresholds for OOS from ConnLimit_ when setting optionsAndrea Shepard