summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2010-04-19fix "Got a certificate for ?? that we already have"Roger Dingledine
what's happening here is that we're fetching certs for obsolete authorities -- probably legacy signers in this case. but try to remain general in the log message.
2010-04-19Fix a compilation warning on compat_libevent.c on some versions of windows ↵Nick Mathewson
libevent
2010-04-19Move the declaration of bandwidth_rate_rule_to_stringNick Mathewson
It's natural for the definition of bandwidth_rule_t to be with the functions that actually care about its values. Unfortunately, this means declaring bandwidth_rate_rule_to_string() out of sequence. Someday we'll just rename reasons.c to strings.c, and put it at the end of or.h, and this will all be better.
2010-04-19Fix two compile-blockers in tor_vasprintf().Nick Mathewson
1) mingw doesn't have _vscprintf(); mingw instead has a working snprintf. 2) windows compilers that _do_ have a working _vscprintf spell it so; they do not spell it _vcsprintf().
2010-04-19bump to 0.2.2.11-alpha-devRoger Dingledine
2010-04-19parameterize update_consensus_router_descriptor_downloadsRoger Dingledine
2010-04-15bump to 0.2.2.11-alphator-0.2.2.11-alphaRoger Dingledine
2010-04-15Merge commit 'origin/maint-0.2.1'Nick Mathewson
2010-04-15simplify a path in networkstatusRoger Dingledine
2010-04-14Add --enable-static-zlib optionSebastian Hahn
Works like the --enable-static-openssl/libevent options. Requires --with-zlib-dir to be set. Note that other dependencies might still pull in a dynamicly linked zlib, if you don't link them in statically too.
2010-04-13Fix renegotiation on OpenSSL versions that backport RFC5746.Nick Mathewson
Our code assumed that any version of OpenSSL before 0.9.8l could not possibly require SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION. This is so... except that many vendors have backported the flag from later versions of openssl when they backported the RFC5476 renegotiation feature. The new behavior is particularly annoying to detect. Previously, leaving SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION unset meant that clients would fail to renegotiate. People noticed that one fast! Now, OpenSSL's RFC5476 support means that clients will happily talk to any servers there are, but servers won't accept renegotiation requests from unpatched clients unless SSL_OP_ALLOW_etc is set. More fun: servers send back a "no renegotiation for you!" error, which unpatched clients respond to by stalling, and generally producing no useful error message. This might not be _the_ cause of bug 1346, but it is quite likely _a_ cause for bug 1346.
2010-04-13Merge branch 'correct_halflife'Nick Mathewson
2010-04-13Rename CircPriorityHalflifeMsec to CircuitPriorityHalflifeMsecNick Mathewson
Everything that accepted the 'Circ' name handled it wrong, so even now that we fixed the handling of the parameter, we wouldn't be able to set it without making all the 0.2.2.7..0.2.2.10 relays act wonky. This patch makes Tors accept the 'Circuit' name instead, so we can turn on circuit priorities without confusing the versions that treated the 'Circ' name as occasion to act weird.
2010-04-12Merge commit 'origin/maint-0.2.1'Nick Mathewson
Conflicts: src/or/test.c
2010-04-12testsuite: Prevent the main thread from starving the worker threadsPeter Palfrader
2010-04-12testsuite: Only free the main mutex when and if all the worker threads are donePeter Palfrader
2010-04-12Log bandwidth_weight_rule_t as a string, not an integer.Nick Mathewson
I'm adding this because I can never remember what stuff like 'rule 3' means. That's the one where if somebody goes limp or taps out, the fight is over, right?
2010-04-12Fix a bug in reading CircPriorityHalflife from consensusNick Mathewson
When you mean (a=b(c,d)) >= 0, you had better not say (a=b(c,d)>=0). We did the latter, and so whenever CircPriorityHalflife was in the consensus, it was treated as having a value of 1 msec (that is, boolean true).
2010-04-03Merge branch 'maint-0.2.1'Roger Dingledine
Conflicts: ChangeLog configure.in contrib/tor-mingw.nsi.in src/win32/orconfig.h
2010-04-03fetch relay descriptors from v3 authoritiesRoger Dingledine
2010-04-03Fix a segfault when a client is hup'd.Sebastian Hahn
We need to make sure we have an event_base in dns.c before we call anything that wants one. Make sure we always have one in dns_reset() when we're a client. Fixes bug 1341.
2010-04-02Merge branch 'asprintf'Nick Mathewson
2010-03-29Segfault less during consensus generation without paramsSebastian Hahn
If no authority votes on any params, Tor authorities segfault when trying to make a new consensus from the votes. Let's change that.
2010-03-16In the glorious future, all relays cache dir info.Roger Dingledine
Now if you're a published relay and you set RefuseUnknownExits, even if your dirport is off, you'll fetch dir info from the authorities, fetch it early, and cache it. In the future, RefuseUnknownExits (or something like it) will be on by default.
2010-03-15bump to 0.2.1.25Roger Dingledine
it's perfect, let's ship it
2010-03-10let people test the RefuseUnknownExits ideaRoger Dingledine
2010-03-08bump to 0.2.2.10-alpha-devRoger Dingledine
now's your chance to destabilize it
2010-03-07prepare 0.2.2.10-alpha for releasetor-0.2.2.10-alphaRoger Dingledine
2010-03-06clean up the 0.2.1.25 changelogRoger Dingledine
2010-03-05commit my annotations while i was hunting down the host order bugRoger Dingledine
2010-03-04Merge commit 'origin/maint-0.2.1'Nick Mathewson
Conflicts: src/or/config.c src/or/test.c
2010-03-04Apply Roger's bug 1269 fix.Nick Mathewson
From http://archives.seul.org/tor/relays/Mar-2010/msg00006.html : As I understand it, the bug should show up on relays that don't set Address to an IP address (so they need to resolve their Address line or their hostname to guess their IP address), and their hostname or Address line fails to resolve -- at that point they'll pick a random 4 bytes out of memory and call that their address. At the same time, relays that *do* successfully resolve their address will ignore the result, and only come up with a useful address if their interface address happens to be a public IP address.
2010-03-04Merge remote branch 'mikeperry/bwweight-smartlistfix'Nick Mathewson
2010-03-03Woops, forgot the second warn.Mike Perry
Also, differentiate the two log messages.
2010-03-03Demote warn to info, since it can happen.Mike Perry
I still feel like we should investigate this case. It seems odd.
2010-03-02Backport fix for time-goes-forward test. Fix bug 1267Nick Mathewson
2010-02-28Tweak users of snprintf to use asprintf where appropriateNick Mathewson
2010-02-28better handle the case where *strp is in asprintf argsNick Mathewson
2010-02-28Merge branch 'fix_routerparse_bug'Nick Mathewson
2010-02-27Update copyright dates for files not in maint-0.2.1Nick Mathewson
2010-02-27Merge remote branch 'origin/maint-0.2.1'Nick Mathewson
Conflicts: src/common/test.h src/or/test.c
2010-02-27Update Tor Project copyright yearsNick Mathewson
2010-02-27Fix a consensus-extension bug found by outofwordsNick Mathewson
When the bandwidth-weights branch added the "directory-footer" token, and began parsing the directory footer at the first occurrence of "directory-footer", it made it possible to fool the parsing algorithm into accepting unsigned data at the end of a consensus or vote. This patch fixes that bug by treating the footer as starting with the first "directory-footer" or the first "directory-signature", whichever comes first.
2010-02-27fix some wide lines in routerparse.cNick Mathewson
2010-02-27Merge remote branch 'origin/maint-0.2.1'Nick Mathewson
Conflicts: ChangeLog src/or/routerparse.c
2010-02-27Properly handle non-terminated stringsSebastian Hahn
Treat strings returned from signed_descriptor_get_body_impl() as not NUL-terminated. Since the length of the strings is available, this is not a big problem. Discovered by rieo.
2010-02-26Check for empty smartlists and no bandwidth during node selection.Mike Perry
2010-02-26Don't segfault when checking the consensusSebastian Hahn
2010-02-26Don't believe unauthenticated info in a consensus.Nick Mathewson
Don't allow anything but directory-signature tokens in a consensus after the first directory-signature token. Fixes bug in bandwidth-weights branch. Found by "outofwords."
2010-02-26Proper NULL checking in circuit_list_path_impl()Sebastian Hahn
Another dereference-then-NULL-check sequence. No reports of this bug triggered in the wild. Fixes bugreport 1256. Thanks to ekir for discovering and reporting this bug.