Age | Commit message (Collapse) | Author | |
---|---|---|---|
2016-09-26 | Update authority votes to match updated proposal. | Nick Mathewson | |
2016-09-26 | Clean whitespace, add missing documentation | Nick Mathewson | |
2016-09-26 | Remove DoS vector in protover.c voting code | Nick Mathewson | |
2016-09-26 | Use protocols to see when EXTEND2 support exists. | Nick Mathewson | |
(Technically, we could just remove extend2 cell checking entirely, since all Tor versions on our network are required to have it, but let's keep this around as an example of How To Do It.) | |||
2016-09-26 | Vote on 'proto' lines and include them after 'v' lines. | Nick Mathewson | |
(Despite the increased size of the consensus, this should have approximately zero effect on the compressed consensus size, since the "proto" line should be completely implied by the "v" line.) | |||
2016-09-26 | Include protocol versions in votes. | Nick Mathewson | |
2016-09-26 | Workaround a test bug | Nick Mathewson | |
2016-09-26 | Implement voting on the protocol-version options | Nick Mathewson | |
2016-09-26 | Include protocol version lines in votes. | Nick Mathewson | |
2016-09-26 | Remove a little duplicated code before it becomes a lot | Nick Mathewson | |
2016-09-26 | Add code to infer protocol versions for old Tor versions. | Nick Mathewson | |
2016-09-26 | Cover the error cases of parsing protocol versions | Nick Mathewson | |
Also, detect an additional failure type. Thanks, tests! (How distinctly I recall thee) | |||
2016-09-26 | Basic backend for the protocol-versions voting algorithm. | Nick Mathewson | |
[This is a brute-force method that potentially uses way too much RAM. Need to rethink this a little. Right now you can DOS an authority by saying "Foo=1-4294967295".] | |||
2016-09-26 | Actually check for missing protocols and exit as appropriate. | Nick Mathewson | |
2016-09-26 | Add necessary code to parse and handle required/recommended protocols | Nick Mathewson | |
2016-09-26 | Emit and parse protocol lists in router descriptors | Nick Mathewson | |
2016-09-26 | checkpoint basic protover backend | Nick Mathewson | |
2016-08-29 | We no longer need to tag UseNTorHandshake as deprecated, since it is obsolete | Nick Mathewson | |
2016-08-29 | Merge remote-tracking branch 'teor/reject-tap-v6' | Nick Mathewson | |
2016-08-26 | Fix OOS comparator fix | Andrea Shepard | |
2016-08-25 | Fix duplicated if condition in connection.c | David Goulet | |
Furthermore, fix a test that could returned an uninitialized value. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2016-08-25 | Merge remote-tracking branch 'andrea/ticket18640_v3' | Nick Mathewson | |
2016-08-24 | make check-spaces fixes | Nick Mathewson | |
2016-08-24 | Merge branch 'maint-0.2.8' | Nick Mathewson | |
2016-08-24 | Fix path selection on firewalled clients | teor | |
Signed-off-by: teor <teor2345@gmail.com> | |||
2016-08-24 | Merge branch 'maint-0.2.8' | Nick Mathewson | |
2016-08-24 | Merge branch 'maint-0.2.7' into maint-0.2.8 | Nick Mathewson | |
2016-08-24 | Replace Tonga with Bifroest. | Isis Lovecruft | |
* FIXES #19728: https://bugs.torproject.org/19728 * CLOSES #19690: https://bugs.torproject.org/19690 | |||
2016-08-24 | Add a stub for rend_service_allow_direct_connection | teor | |
It always returns 0. It should be replaced with the Single Onion version from #17178 when both are merged. | |||
2016-08-24 | Client & HS ignore UseNTorHandshake, all non-HS handshakes use ntor | teor (Tim Wilson-Brown) | |
Rely on onion_populate_cpath to check that we're only using TAP for the rare hidden service cases. Check and log if handshakes only support TAP when they should support ntor. | |||
2016-08-24 | Improve comments in circuit_get_cpath_* | teor (Tim Wilson-Brown) | |
2016-08-24 | Client & HS make sure every hop in every non-HS path supports ntor | teor (Tim Wilson-Brown) | |
When a client connects to an intro point not in the client's consensus, or a hidden service connects to a rend point not in the hidden service's consensus, we are stuck with using TAP, because there is no ntor link specifier. | |||
2016-08-23 | Merge remote-tracking branch 'jigsaw/fix-17758' | Nick Mathewson | |
2016-08-23 | Merge remote-tracking branch 'jigsaw/fix-15381' | Nick Mathewson | |
2016-08-23 | Use tor_assert, not assert. | Nick Mathewson | |
2016-08-23 | Merge branch 'bug13953_squashed' | Nick Mathewson | |
2016-08-23 | Reword the router_check_descriptor_address_port_consistency log message | teor | |
The new message covers static and dynamic public IPv4 addresses, and external / internal addresses in NAT setups. | |||
2016-08-22 | Merge branch 'maint-0.2.8' | Nick Mathewson | |
2016-08-22 | Do not pass NULL to log(%s) in dir_server_new. | Nick Mathewson | |
This bug had existed since 0.2.4.7-alpha, but now that we have FallbackDirs by default, it actually matters. Fixes bug 19947; bugfix on 0.2.4.7-alpha or maybe 0.2.8.1-alpha. Rubiate wrote the patch; teor wrote the changes file. | |||
2016-08-20 | Use connection_mark_for_close() rather than connection_mark_on_flush() on OOS | Andrea Shepard | |
2016-08-20 | Add DisableOOSCheck option, on by default until we have better heuristics | Andrea Shepard | |
2016-08-20 | Consider the case that a connection doesn't have a valid socket during OOS | Andrea Shepard | |
2016-08-20 | Add connection_is_moribund() inline | Andrea Shepard | |
2016-08-20 | Use SMARTLIST_FOREACH in connection_count_moribund() per code review | Andrea Shepard | |
2016-08-20 | s/connection_handle_oos/connection_check_oos/g per code review | Andrea Shepard | |
2016-08-20 | Unit test for pick_oos_victims() | Andrea Shepard | |
2016-08-20 | Unit test for kill_conn_list_for_oos() | Andrea Shepard | |
2016-08-20 | Unit test for connection_handle_oos() | Andrea Shepard | |
2016-08-20 | Implement OOS comparator | Andrea Shepard | |
2016-08-20 | Implement pick_oos_victims() except for sort step | Andrea Shepard | |