Age | Commit message (Collapse) | Author |
|
The impact here isn't too bad. First, the only affected certs that
expire after 32-bit signed time overflows in Y2038. Second, it could
only make it seem that a non-expired cert is expired: it could never
make it seem that an expired cert was still live.
Fixes bug 20027; bugfix on 0.2.7.2-alpha.
|
|
The batch-verification helper didn't expose the expiration time,
which made it pretty error-prone.
This closes ticket 15087.
|
|
This makes the code a bit cleaner by having more of the functions be
pure functions that don't depend on the current time.
|
|
Also, adjust signing approach to more closely match the signing
scheme in the proposal.
(The format doesn't quite match the format in the proposal, since
RSA signatures aren't fixed-length.)
Closes 19020.
|
|
|
|
Fixes bug 17779; bugfix on 0.2.7.2-alpha.
|
|
This will help us do cert-checking in the background in the future,
perhaps.
|
|
This means we don't need to precompute the length.
Helps simplify the implementation of 19156.
|
|
Implements the major part of 19156, except doesn't actually send the
new cell type yet.
|
|
See proposal 244. This feature lets us stop looking at the internals
of SSL objects, *and* should let us port better to more SSL libraries,
if they have RFC5705 support.
Preparatory for #19156
|
|
Implements 19155 (send CERTS cells correctly for Ed25519)
Also send RSA->Ed crosscert
|
|
We no longer generate certs cells by pasting the certs together one
by one. Instead we use trunnel to generate them.
Preliminary work for 19155 (send CERTS cell with ed certs)
|
|
Implements the parsing part of #19157
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The functions it warns about are:
assert, memcmp, strcat, strcpy, sprintf, malloc, free, realloc,
strdup, strndup, calloc.
Also, fix a few lingering instances of these in the code. Use other
conventions to indicate _intended_ use of assert and
malloc/realloc/etc.
|
|
|
|
|
|
|
|
When allowing private addresses, mark Exits that only exit to private
locations as such. Fixes bug 20064; bugfix on 0.2.2.9-alpha.
|
|
|
|
Patch from pastly; fixes bug 19964.
|
|
Found by coverity scan; this is CID 1372329.
Also, reindent some oddly indented code.
|
|
Also stop logging the intro point details on error by default.
Fixes #20012, introduced with ntor in tor 0.2.4.8-alpha.
|
|
|
|
|
|
Implements ticket 20002, and part of proposal 272.
|
|
|
|
Furthermore, fix a test that could returned an uninitialized value.
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
Check NoOnionTraffic before attaching a stream.
NoOnionTraffic refuses connections to all onion hostnames,
but permits non-onion hostnames and IP addresses.
|
|
Check NoDNSRequest, NoIPv4Traffic, and NoIPv6Traffic before
attaching a stream.
NoDNSRequest refuses connections to all non-onion hostnames,
but permits IP addresses.
NoIPv4Traffic refuses connections to IPv4 addresses, but resolves
hostnames.
NoIPv6Traffic refuses connections to IPv6 addresses, but resolves
hostnames.
Combined, they refuse all non-onion hostnames and IP addresses.
|
|
Tor2Web refuses non-onion hostnames and IP addresses.
|
|
|
|
OnionTrafficOnly is equivalent to NoDNSRequest, NoIPv4Traffic,
and NoIPv6Traffic.
Add unit tests for parsing and checking option validity.
Add documentation for each flag to the man page.
Add changes file for all of #18693.
Parsing only: the flags do not change client behaviour (yet!)
|
|
|
|
|
|
Signed-off-by: teor <teor2345@gmail.com>
|
|
|
|
|
|
* FIXES #19728: https://bugs.torproject.org/19728
* CLOSES #19690: https://bugs.torproject.org/19690
|
|
It always returns 0. It should be replaced with the Single
Onion version from #17178 when both are merged.
|
|
Rely on onion_populate_cpath to check that we're only using
TAP for the rare hidden service cases.
Check and log if handshakes only support TAP when they should support
ntor.
|
|
|
|
When a client connects to an intro point not in the client's consensus,
or a hidden service connects to a rend point not in the hidden service's
consensus, we are stuck with using TAP, because there is no ntor link
specifier.
|
|
|