summaryrefslogtreecommitdiff
path: root/src/or
AgeCommit message (Collapse)Author
2013-11-10Fix a wide lineNick Mathewson
2013-11-10Change documentation DirServer->DirAuthorityNick Mathewson
We renamed the option, but we didn't actually fix it in the log messages or the docs. This patch does that. For #10124. Patch by sqrt2.
2013-10-31Merge remote-tracking branch 'public/bug9645' into maint-0.2.4Nick Mathewson
2013-10-31Merge remote-tracking branch 'public/bug9731b' into maint-0.2.4Nick Mathewson
2013-10-12be willing to bootstrap from all three of our directory guardsRoger Dingledine
Also fix a bug where if the guard we choose first doesn't answer, we would try the second guard, but once we connected to the second guard we would abandon it and retry the first one, slowing down bootstrapping. The fix in both cases is to treat all our initially chosen guards as acceptable to use. Fixes bug 9946.
2013-10-10Merge branch 'bug9644_024' into maint-0.2.4Nick Mathewson
2013-10-08Merge remote-tracking branch 'public/bug9927' into maint-0.2.4Nick Mathewson
2013-10-08Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2013-10-08Merge remote-tracking branch 'public/bug9596' into maint-0.2.4Nick Mathewson
2013-10-08Generate bootstrapping status messages for microdescs tooNick Mathewson
Fix for 9927.
2013-10-02Fix a bug in our bug 9776 fix.Nick Mathewson
By calling circuit_n_chan_done() unconditionally on close, we were closing pending connections that might not have been pending quite for the connection we were closing. Fix for bug 9880. Thanks to skruffy for finding this and explaining it patiently until we understood.
2013-09-24Always call circuit_n_chan_done(chan, 0) from channel_closed()Andrea Shepard
2013-09-23Fix a compilation warning with older gccNick Mathewson
2013-09-21Relays should send timestamp in NETINFO.Nick Mathewson
This avoids skew warnings as authorities test reachability. Fix 9798; fix not on any released Tor.
2013-09-21back out most of 1d0ba9aRoger Dingledine
this was causing directory authorities to send a time of 0 on all connections they generated themselves, which means everybody reachability test caused a time skew warning in the log for that relay. (i didn't just revert, because the changes file has been modified by other later commits.)
2013-09-20Round down hidden service descriptor publication times to nearest hourNick Mathewson
Implements part of proposal 222. We can do this safely, since REND_CACHE_MAX_SKEW is 24 hours.
2013-09-20Remove the timestamp from AUTHENTICATE cells; replace with random bytesNick Mathewson
This isn't actually much of an issue, since only relays send AUTHENTICATE cells, but while we're removing timestamps, we might as well do this too. Part of proposal 222. I didn't take the approach in the proposal of using a time-based HMAC, since that was a bad-prng-mitigation hack from SSL3, and in real life, if you don't have a good RNG, you're hopeless as a Tor server.
2013-09-20Get ready to stop sending timestamps in INTRODUCE cellsNick Mathewson
For now, round down to the nearest 10 minutes. Later, eliminate entirely by setting a consensus parameter. (This rounding is safe because, in 0.2.2, where the timestamp mattered, REND_REPLAY_TIME_INTERVAL was a nice generous 60 minutes.)
2013-09-20Stop sending the current time in client NETINFO handshakes.Nick Mathewson
Implements part of proposal 222.
2013-09-19When freeing a cert_list_t, avoid memory leak.Nick Mathewson
We were freeing these on exit, but when we added the dl_status_map field to them in fddb814f, we forgot to arrange for it to be freed. I've moved the cert_list_free() code into its own function, and added an appropriate dsmap_free() call. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
2013-09-18Fix an assert when disabling ORPort with accounting disabled.Nick Mathewson
The problem was that the server_identity_key_is_set() function could return true under conditions where we don't really have an identity key -- specifically, where we used to have one, but we stopped being a server. This is a fix for 6979; bugfix on 0.2.2.18-alpha where we added that assertion to get_server_identity_key().
2013-09-13Don't apply read/write buckets to cpuworker connectionsNick Mathewson
Fixes bug 9731
2013-09-05collect and log statistics about onionskins received/processedRoger Dingledine
we skip onionskins that came from non-relays, so we're less likely to run into privacy troubles. starts to implement ticket 9658.
2013-09-05Revert e443beff and solve it a different wayRoger Dingledine
Now we explicitly check for overflow. This approach seemed smarter than a cascade of "change int to unsigned int and hope nothing breaks right before the release". Nick, feel free to fix in a better way, maybe in master.
2013-09-05don't let recently_chosen_ntors overflowRoger Dingledine
with commit c6f1668d we let it grow arbitrarily large. it can still overflow, but the damage is very small now.
2013-09-04nickm wants us to prioritize tap in a currently-rare edge caseRoger Dingledine
2013-09-04Be more general in calculating expected onion queue processing timeRoger Dingledine
Now we consider the TAP cells we'll process while draining the NTor queue, and vice versa.
2013-09-04let the NumNTorsPerTAP consensus param override our queue choiceRoger Dingledine
2013-09-04do a lopsided round-robin between the onion queuesRoger Dingledine
that way tap won't starve entirely, but we'll still handle ntor requests quicker.
2013-09-04check bounds on handshake_type more thoroughlyRoger Dingledine
2013-09-04add info-level logs to help track onion queue sizesRoger Dingledine
2013-09-04refactor and give it unit testsRoger Dingledine
2013-09-04Separate cpuworker queues by handshake typeRoger Dingledine
Now we prioritize ntor create cells over tap create cells. Starts to address ticket 9574.
2013-09-04Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/circuitbuild.c
2013-09-04use !cbt_disabled in place of LearnCBT to avoid needless circsNick Mathewson
This would make us do testing circuits "even when cbt is disabled by consensus, or when we're a directory authority, or when we've failed to write cbt history to our state file lately." (Roger's words.) This is a fix for 9671 and an improvement in our fix for 5049. The original misbehavior was in 0.2.2.14-alpha; the incomplete fix was in 0.2.3.17-beta.
2013-09-03Fix bug 9645: don't forget an md just because we can't save it.Nick Mathewson
2013-08-26Increase POLICY_BUF_LEN to 72 to accomodate IPv6 exit policy items.Nick Mathewson
Fixes bug 9596; bugfix on 0.2.4.7-alpha.
2013-08-25Merge remote-tracking branch 'public/bug9546_023_v2' into maint-0.2.3Nick Mathewson
2013-08-25Merge remote-tracking branch 'public/bug9546_v2' into maint-0.2.4Nick Mathewson
2013-08-25Merge remote-tracking branch 'public/bug9366' into maint-0.2.4Nick Mathewson
2013-08-25Merge remote-tracking branch 'public/bug9543' into maint-0.2.4Nick Mathewson
2013-08-22Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2013-08-22Replace return with continue in update_consensus_networkstatus_downloadsNick Mathewson
Fix for bug 9564; bugfix on 0.2.3.14-alpha.
2013-08-21Add a 30-day maximum on user-supplied MaxCircuitDirtinessNick Mathewson
Fix for bug 9543.
2013-08-21Make bridges send AUTH_CHALLENGE cellsNick Mathewson
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
2013-08-21Make bridges send AUTH_CHALLENGE cellsNick Mathewson
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
2013-08-21Send NETINFO on receiving a NETINFO if we have not yet sent one.Nick Mathewson
(Backport to Tor 0.2.3) Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
2013-08-20Send NETINFO on receiving a NETINFO if we have not yet sent one.Nick Mathewson
Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
2013-08-10Fix an uninitialized-read when parsing v3 introduction requests.Nick Mathewson
Fortunately, later checks mean that uninitialized data can't get sent to the network by this bug. Unfortunately, reading uninitialized heap *can* (in some cases, with some allocators) cause a crash if you get unlucky and go off the end of a page. Found by asn. Bugfix on 0.2.4.1-alpha.
2013-08-05Don't allow all ORPort values to be NoAdvertiseNick Mathewson
Fix for bug #9366