summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2014-07-28bump to 0.2.4.23Roger Dingledine
2014-07-28Warn and drop the circuit if we receive an inbound 'relay early' cellRoger Dingledine
Those used to be normal to receive on hidden service circuits due to bug 1038, but the buggy Tor versions are long gone from the network so we can afford to resume watching for them. Resolves the rest of bug 1038; bugfix on 0.2.1.19.
2014-07-27Confusing log message when circuit can't be extendedArlo Breault
2014-07-25circuit_build_failed: distinguish "first hop chan failed", "CREATE failed"Nick Mathewson
Roger spotted this on tor-dev in his comments on proposal 221. (Actually, detect DESTROY vs everything else, since arma likes network timeout indicating failure but not overload indicating failure.)
2014-07-25Implement proposal 221: Stop sending CREATE_FASTNick Mathewson
This makes FastFirstHopPK an AUTOBOOL; makes the default "auto"; and makes the behavior of "auto" be "look at the consensus."
2014-07-24Avoid illegal read off end of an array in prune_v2_cipher_listNick Mathewson
This function is supposed to construct a list of all the ciphers in the "v2 link protocol cipher list" that are supported by Tor's openssl. It does this by invoking ssl23_get_cipher_by_char on each two-byte ciphersuite ID to see which ones give a match. But when ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS ciphersuite ID, it checks to see whether it has a match for a three-byte SSL2 ciphersuite ID. This was causing a read off the end of the 'cipherid' array. This was probably harmless in practice, but we shouldn't be having any uninitialized reads. (Using ssl23_get_cipher_by_char in this way is a kludge, but then again the entire existence of the v2 link protocol is kind of a kludge. Once Tor 0.2.2 clients are all gone, we can drop this code entirely.) Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.
2014-07-24add a NumDirectoryGuards consensus param tooRoger Dingledine
2014-07-24Add and use a new NumEntryGuards consensus parameter.Roger Dingledine
When specified, it overrides our default of 3 entry guards. (By default, it overrides the number of directory guards too.) Implements ticket 12688.
2014-07-23Merge branch 'curve25519-donna32' into maint-0.2.4Nick Mathewson
2014-07-21Merge remote-tracking branch 'karsten/geoip6-jul2014' into maint-0.2.4Nick Mathewson
2014-07-21Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-07-18Update geoip6 to the July 10 2014 database.Karsten Loesing
2014-07-18Update geoip to the July 10 2014 database.Karsten Loesing
2014-07-15Small tweaks to make curve25519-donna32 compile with our warningsNick Mathewson
2014-07-15Update to latest curve25519-donna32Nick Mathewson
2014-06-10Merge remote-tracking branch 'karsten/geoip6-jun2014' into maint-0.2.4Nick Mathewson
2014-06-10Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-06-10Update geoip to the June 4 2014 database.Karsten Loesing
2014-06-10Update geoip6 to the June 4 2014 database.Karsten Loesing
2014-05-16Bump maint-0.2.4 version to 0.2.4.22-devNick Mathewson
(See discussion on #9553)
2014-05-07Merge commit 'bb9b4c37f8e7f5cf78918f382e90d8b11ff42551' into maint-0.2.4Nick Mathewson
2014-05-07Merge remote-tracking branch 'public/ticket11528_024' into maint-0.2.4Nick Mathewson
2014-05-07Merge remote-tracking branch 'public/bug11513_024' into maint-0.2.4Nick Mathewson
2014-05-07Merge remote-tracking branch 'public/update_ciphers_ff28' into maint-0.2.4Nick Mathewson
2014-05-01Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/microdesc.c
2014-05-01Downgrade bug 7164 warning to INFONick Mathewson
The 0.2.5.x warning is the one that might help us track this down; the warnings in stable are just annoying users over and over and over.
2014-04-30Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-04-30Merge remote-tracking branch 'public/bug10849_023_bruteforce' into maint-0.2.3Nick Mathewson
2014-04-29Drop the MaxMemInCellQueues lower limit down to 256 MB.Nick Mathewson
on #9686, gmorehose reports that the 500 MB lower limit is too high for raspberry pi users. This is a backport of 647248729fa65f0e51d062e2af8f4e8b38592bf5 to 0.2.4. Note that in 0.2.4, the option is called MaxMemInCellQueues.
2014-04-29Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-04-29Stop leaking memory in error cases of md parsingNick Mathewson
When clearing a list of tokens, it's important to do token_clear() on them first, or else any keys they contain will leak. This didn't leak memory on any of the successful microdescriptor parsing paths, but it does leak on some failing paths when the failure happens during tokenization. Fixes bug 11618; bugfix on 0.2.2.6-alpha.
2014-04-25Forbid TunneledDirConns 0 and PreferTunneledDirConns 0 if being a HSNick Mathewson
Fixes bug 10849; bugfix on 0.2.1.1-alpha (I believe)
2014-04-23Merge remote-tracking branch 'public/bug9229_024' into maint-0.2.4Nick Mathewson
2014-04-18Supply better and less frequent warnings on circID exhaustionNick Mathewson
Fixes the surface behavior of #11553
2014-04-17Elevate server TLS cipher preferences over clientNick Mathewson
The server cipher list is (thanks to #11513) chosen systematically to put the best choices for Tor first. The client cipher list is chosen to resemble a browser. So let's set SSL_OP_CIPHER_SERVER_PREFERENCE to have the servers pick according to their own preference order.
2014-04-16Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-04-16remove note about dannenberg; it has upgraded.Nick Mathewson
2014-04-16Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-04-16Update the authority signing key blacklistNick Mathewson
Now it only has dannenberg
2014-04-15Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/circuituse.c
2014-04-14Don't send uninitialized stack to the controller and say it's a date.Nick Mathewson
Fixes bug 11519, apparently bugfix on 0.2.3.11-alpha.
2014-04-14Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/routerlist.h
2014-04-14Tweak changes file and comment dates.Nick Mathewson
2014-04-14Fill in the list of blacklisted signing keys.Nick Mathewson
I used a list of certificate files from arma, and a little script, both at 11464.
2014-04-14Code to blacklist authority signing keysNick Mathewson
(I need a list of actual signing keys to blacklist.)
2014-04-14New sort order for server choice of ciphersuites.Nick Mathewson
Back in 175b2678, we allowed servers to recognize clients who are telling them the truth about their ciphersuites, and select the best cipher from on that list. This implemented the server side of proposal 198. In bugs 11492, 11498, and 11499, cypherpunks found a bunch of mistakes and omissions and typos in the UNRESTRICTED_SERVER_CIPHER_LIST we had. In #11513, I found a couple more. Rather than try to hand-edit this list, I wrote a short python script to generate our ciphersuite preferences from the openssl headers. The new rules are: * Require forward secrecy. * Require RSA (since our servers only configure RSA keys) * Require AES or 3DES. (This means, reject RC4, DES, SEED, CAMELLIA, and NULL.) * No export ciphersuites. Then: * Prefer AES to 3DES. * If both suites have the same cipher, prefer ECDHE to DHE. * If both suites have the same DHE group type, prefer GCM to CBC. * If both suites have the same cipher mode, prefer SHA384 to SHA256 to SHA1. * If both suites have the same digest, prefer AES256 to AES128.
2014-04-08Update ciphers.inc to match ff28Nick Mathewson
The major changes are to re-order some ciphers, to drop the ECDH suites (note: *not* ECDHE: ECDHE is still there), to kill off some made-up stuff (like the SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA suite), to drop some of the DSS suites... *and* to enable the ECDHE+GCM ciphersuites. This change is autogenerated by get_mozilla_ciphers.py from Firefox 28 and OpenSSL 1.0.1g. Resolves ticket 11438.
2014-04-08Teach the get_mozilla_ciphers.py script to parse recent firefoxenNick Mathewson
2014-04-07Fix a small memory leak when resolving PTR addressesNick Mathewson
Fixes bug 11437; bugfix on 0.2.4.7-alpha. Found by coverity; this is CID 1198198.
2014-03-27whitespace fixNick Mathewson