Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-11-26 | test: Fix a python double-space | teor | |
2019-11-25 | Merge branch 'stream-socks-auth' into bug19859_merged | Nick Mathewson | |
2019-11-22 | Fix a low-impact memory leak in options_act_reversible() | Nick Mathewson | |
Found by Coverity as CID 1455953 Fixes bug 32575; bug not in any released Tor. | |||
2019-11-21 | ht.h: improve documentation for HT_NEXT_RMV. | Nick Mathewson | |
2019-11-21 | Merge branch 'ticket32209' | Nick Mathewson | |
2019-11-21 | config.md: suggestions from teor | Nick Mathewson | |
2019-11-21 | Merge branch 'reversible_3' | Nick Mathewson | |
2019-11-21 | Merge branch 'tor-github/pr/1555' | George Kadianakis | |
2019-11-21 | hs-v3: Return bad address SOCKS5 extended error | David Goulet | |
If ExtendedErrors is set for the SocksPort, an invalid .onion address now returns the 0xF6 error code per prop304. Closes #30022 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-20 | options_act_reversible: add more comments to explain ordering | Nick Mathewson | |
2019-11-20 | Typo/grammar fixes. | Nick Mathewson | |
2019-11-20 | log config: Set safelogging_changed even if we aren't running Tor. | Nick Mathewson | |
2019-11-20 | Some tests for log changes, commit, and rollback | Nick Mathewson | |
2019-11-20 | Make KeyDirectory's GroupReadable behave the same as CacheDirectory's. | Nick Mathewson | |
In #26913 we solved a bug where CacheDirectoryGroupReadable would override DataDirectoryGroupReadable when the two directories are the same. We never did the same for KeyDirectory, though, because that's a rare setting. Now that I'm testing this code, though, fixing this issue seems fine. Fixes bug #27992; bugfix on 0.3.3.1-alpha. | |||
2019-11-20 | New unit tests for options_create_directories(). | Nick Mathewson | |
2019-11-20 | parseconf test: ControlSocketsGroupWriteable without ControlSocket. | Nick Mathewson | |
2019-11-20 | Typo fix in warning message about ControlSocket | Nick Mathewson | |
2019-11-20 | Free options objects for which validation fails. | Nick Mathewson | |
Also free options objects when we discard them due to TestingTorOptions. Fixes bug 32555; bug not in any released Tor. | |||
2019-11-19 | Split listener configuration out of options_act_reversible() | Nick Mathewson | |
2019-11-19 | Split log configuration out of options_act_reversible(). | Nick Mathewson | |
2019-11-19 | options_act_reversible(): Extract more startup-only pieces. | Nick Mathewson | |
These have to happen after opening listeners and before opening logs :/ | |||
2019-11-19 | Extract a function for one-time-only pre-reversible options. | Nick Mathewson | |
These changes _only_ happen at startup, and happen before _any_ reversible option change is set. | |||
2019-11-19 | Move some ControlSocket checks to options_validate_cb() | Nick Mathewson | |
There is no reason for them be in options_act_reversible(). | |||
2019-11-18 | Rename REGISTER_SUCCESS_ALSO_DECRYPTED to REGISTER_SUCCESS_AND_DECRYPTED. | George Kadianakis | |
2019-11-18 | Various minor improvements after David's review. | George Kadianakis | |
- Fix a wrong log message - Introduce a cap for the nickname size - Change some 'if' statements to 'switch'. | |||
2019-11-18 | hs-v3: Decrypt pending descriptors when we get new client auth creds. | George Kadianakis | |
2019-11-18 | control-port: Tests for ONION_CLIENT_AUTH_VIEW. | George Kadianakis | |
2019-11-18 | control-port: Implement ONION_CLIENT_AUTH_VIEW. | George Kadianakis | |
2019-11-18 | control-port: Tests for ONION_CLIENT_AUTH_REMOVE. | George Kadianakis | |
2019-11-18 | control-port: Implement ONION_CLIENT_AUTH_REMOVE. | George Kadianakis | |
2019-11-18 | control-port: Tests for ONION_CLIENT_AUTH_ADD. | George Kadianakis | |
2019-11-18 | control-port: Implement ONION_CLIENT_AUTH_ADD. | George Kadianakis | |
2019-11-18 | Merge branch 'tor-github/pr/1423' | George Kadianakis | |
2019-11-18 | test: Unit test for the hs cache decrypt on new auth | David Goulet | |
Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | test: Unit test for the SOCKS5 HS client auth errors | David Goulet | |
Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Improve documentation of hs_cache_client_descriptor_t | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Function to re-parse unencrypted descriptor | David Goulet | |
We now keep descriptor that we can't decode due to missing client authorization in the cache. This new function is used when new client authorization are added and to tell the client cache to retry decoding. Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Refactor descriptor dir fetch done code | David Goulet | |
This commit extract most of the code that dirclient.c had to handle the end of a descriptor directory requests (fetch). It is moved into hs_client.c in order to have one single point of entry and the rest is fully handled by the HS subsystem. As part of #30382, depending on how the descriptor ended up stored (decoded or not), different SOCKS error code can be returned. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Set extended error if .onion is invalid | David Goulet | |
In order to achieve this, the parse_extended_hostname() had to be refactored to return either success or failure and setting the hostname type in the given parameter. The reason for that is so it can detect invalid onion addresses that is having a ".onion", the right length but just not passing validation. That way, we can send back the prop304 ExtendedError "X'F1' Onion Service Descriptor Is Invalid" to notify the SOCKS connection of the invalid onion address. Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Set extended error when missing/bad client auth | David Goulet | |
Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Set extended error when descriptor is not found | David Goulet | |
Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Return descriptor decoding status when storing as client | David Goulet | |
This will allow us to callback into the HS subsytem depending on the decoding status and return an extended SOCKS5 error code depending on the decoding issue. This is how we'll be able to tell the SocksPort connection if we are missing or have bad client authorization for a service. Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | hs-v3: Keep descriptor in cache if client auth is missing or bad | David Goulet | |
We now keep the descriptor in the cache, obviously not decoded, if it can't be decrypted for which we believe client authorization is missing or unusable (bad). This way, it can be used later once the client authorization are added or updated. Part of #30382 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-11-18 | Merge remote-tracking branch 'tor-github/pr/1517' | teor | |
2019-11-16 | Merge remote-tracking branch 'tor-github/pr/1545' | Nick Mathewson | |
2019-11-16 | Merge remote-tracking branch 'tor-github/pr/1544' | Nick Mathewson | |
2019-11-16 | Make structs declared by tor_queues.h macros also follow naming rules | Nick Mathewson | |
2019-11-16 | map.h: replace maptype with mapname_t | Nick Mathewson | |
This change makes our macro bodies consistent with our naming expectations for structs and types outside macro bodies. | |||
2019-11-16 | handles.h: replace structname with structname_t | Nick Mathewson | |
This change makes our macro bodies consistent with our naming expectations for structs and types outside macro bodies. | |||
2019-11-16 | Revise struct names in examples in comments to end with _t | Nick Mathewson | |