]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
12 years agoBump to 0.2.4.9-alpha-dev
Nick Mathewson [Tue, 15 Jan 2013 21:01:02 +0000 (16:01 -0500)] 
Bump to 0.2.4.9-alpha-dev

12 years agobump to 0.2.4.9-alpha tor-0.2.4.9-alpha
Roger Dingledine [Tue, 15 Jan 2013 16:57:34 +0000 (11:57 -0500)] 
bump to 0.2.4.9-alpha

12 years agofold in new change stanza
Roger Dingledine [Tue, 15 Jan 2013 16:54:52 +0000 (11:54 -0500)] 
fold in new change stanza

12 years agoFix handling of ntor handshakes received via CREATE cells
Nick Mathewson [Tue, 15 Jan 2013 05:41:09 +0000 (00:41 -0500)] 
Fix handling of ntor handshakes received via CREATE cells

Fixes bug 7959; bugfix on 0.2.4.8-alpha.

12 years agoBetter log message to diagnose #7959
Nick Mathewson [Tue, 15 Jan 2013 05:25:07 +0000 (00:25 -0500)] 
Better log message to diagnose #7959

12 years agoBump version to 0.2.4.8-alpha-dev
Nick Mathewson [Tue, 15 Jan 2013 05:24:19 +0000 (00:24 -0500)] 
Bump version to 0.2.4.8-alpha-dev

12 years agobump to 0.2.4.8-alpha tor-0.2.4.8-alpha
Roger Dingledine [Mon, 14 Jan 2013 23:52:42 +0000 (18:52 -0500)] 
bump to 0.2.4.8-alpha

12 years agofinish poking at the changelog
Roger Dingledine [Mon, 14 Jan 2013 23:46:32 +0000 (18:46 -0500)] 
finish poking at the changelog

12 years agoRevert junk accidentally included with "start folding in the changes entries"
Nick Mathewson [Mon, 14 Jan 2013 19:41:59 +0000 (14:41 -0500)] 
Revert junk accidentally included with "start folding in the changes entries"

Looks like Roger's debugging code wanted to take a tour of the world
outside his sandbox.

This reverts part of commit 19d37202362c0298ae2f3954b0065ccfcef0dbda.

12 years agoMerge remote-tracking branch 'origin/maint-0.2.3'
Nick Mathewson [Mon, 14 Jan 2013 19:24:53 +0000 (14:24 -0500)] 
Merge remote-tracking branch 'origin/maint-0.2.3'

12 years agoMerge remote-tracking branch 'origin/maint-0.2.2' into maint-0.2.3
Nick Mathewson [Mon, 14 Jan 2013 19:24:19 +0000 (14:24 -0500)] 
Merge remote-tracking branch 'origin/maint-0.2.2' into maint-0.2.3

12 years agostart folding in the changes entries
Roger Dingledine [Mon, 14 Jan 2013 18:34:59 +0000 (13:34 -0500)] 
start folding in the changes entries

12 years agoMerge branch 'bug7869'
Nick Mathewson [Mon, 14 Jan 2013 17:32:00 +0000 (12:32 -0500)] 
Merge branch 'bug7869'

12 years agoMerge remote-tracking branch 'mikeperry/bug7691-rebased'
Nick Mathewson [Mon, 14 Jan 2013 02:48:33 +0000 (21:48 -0500)] 
Merge remote-tracking branch 'mikeperry/bug7691-rebased'

12 years agoMerge branch 'bug7935'
Nick Mathewson [Mon, 14 Jan 2013 02:43:53 +0000 (21:43 -0500)] 
Merge branch 'bug7935'

12 years agoHandle EWOULDBLOCK as EAGAIN if they happen to be different.
Nick Mathewson [Sat, 12 Jan 2013 00:27:45 +0000 (16:27 -0800)] 
Handle EWOULDBLOCK as EAGAIN if they happen to be different.

Fixes bug 7935.  Reported by 'oftc_must_be_destroyed'.

12 years agoBug 7691 review fixes.
Mike Perry [Wed, 9 Jan 2013 02:07:34 +0000 (18:07 -0800)] 
Bug 7691 review fixes.

Also add in the random nonce generation.

12 years agoBug 7341 code review fixes.
Mike Perry [Wed, 9 Jan 2013 01:19:15 +0000 (17:19 -0800)] 
Bug 7341 code review fixes.

12 years agoBug 7691: Send a probe cell down certain types of circs.
Mike Perry [Wed, 12 Dec 2012 19:53:18 +0000 (11:53 -0800)] 
Bug 7691: Send a probe cell down certain types of circs.

In general, if we tried to use a circ for a stream, but then decided to place
that stream on a different circuit, we need to probe the original circuit
before deciding it was a "success".

We also need to do the same for cannibalized circuits that go unused.

12 years agoFix bug 7341.
Mike Perry [Sat, 8 Dec 2012 02:57:51 +0000 (18:57 -0800)] 
Fix bug 7341.

Fix cannibalize, rend circ and intro circ timeout handling.

12 years agoMake the = at the end of ntor-onion-key optional.
Nick Mathewson [Sun, 6 Jan 2013 03:53:32 +0000 (22:53 -0500)] 
Make the = at the end of ntor-onion-key optional.

Makes bug 7869 more easily fixable if we ever choose to do so.

12 years agoUpdate to the January 2013 GeoIP database.
Karsten Loesing [Sat, 5 Jan 2013 07:18:26 +0000 (08:18 +0100)] 
Update to the January 2013 GeoIP database.

12 years agoWhoops; make that unit test actually pass :/
Nick Mathewson [Thu, 3 Jan 2013 17:45:50 +0000 (12:45 -0500)] 
Whoops; make that unit test actually pass :/

12 years agoAdd a unit test for the curve25519 keypair persistence functions
Nick Mathewson [Thu, 3 Jan 2013 17:38:44 +0000 (12:38 -0500)] 
Add a unit test for the curve25519 keypair persistence functions

12 years agoMerge branch 'ntor-resquashed'
Nick Mathewson [Thu, 3 Jan 2013 16:52:41 +0000 (11:52 -0500)] 
Merge branch 'ntor-resquashed'

Conflicts:
src/or/cpuworker.c
src/or/or.h
src/test/bench.c

12 years agoCheck all crypto_rand return values for ntor.
Nick Mathewson [Wed, 26 Dec 2012 03:43:01 +0000 (22:43 -0500)] 
Check all crypto_rand return values for ntor.

12 years agoComplete all DOCDOC entries from the ntor branch
Nick Mathewson [Wed, 26 Dec 2012 03:38:20 +0000 (22:38 -0500)] 
Complete all DOCDOC entries from the ntor branch

12 years agoUse safe_mem_is_zero for checking curve25519 output for 0-ness
Nick Mathewson [Wed, 26 Dec 2012 03:25:09 +0000 (22:25 -0500)] 
Use safe_mem_is_zero for checking curve25519 output for 0-ness

This should make the intent more explicit.  Probably needless, though.

12 years agoImplement a constant-time safe_mem_is_zero.
Nick Mathewson [Wed, 26 Dec 2012 03:22:07 +0000 (22:22 -0500)] 
Implement a constant-time safe_mem_is_zero.

12 years agochanges file for the ntor branch
Nick Mathewson [Mon, 17 Dec 2012 04:21:27 +0000 (23:21 -0500)] 
changes file for the ntor branch

12 years agoDocument UseNTorHandshake
Nick Mathewson [Sat, 8 Dec 2012 06:19:15 +0000 (01:19 -0500)] 
Document UseNTorHandshake

12 years agoAdd new ntor bits to gitignore
Nick Mathewson [Sat, 8 Dec 2012 05:57:19 +0000 (00:57 -0500)] 
Add new ntor bits to gitignore

12 years agoAdd reference implementation for ntor, plus compatibility test
Nick Mathewson [Sat, 8 Dec 2012 05:52:44 +0000 (00:52 -0500)] 
Add reference implementation for ntor, plus compatibility test

Before I started coding ntor in C, I did another one in Python.
Turns out, they interoperate just fine.

12 years agontor: Don't fail fast server-side on an unrecognized KEYID(B)
Nick Mathewson [Fri, 7 Dec 2012 18:40:21 +0000 (13:40 -0500)] 
ntor: Don't fail fast server-side on an unrecognized KEYID(B)

12 years agoUpdate our copy of curve25519-donna-c64.
Nick Mathewson [Fri, 7 Dec 2012 17:45:46 +0000 (12:45 -0500)] 
Update our copy of curve25519-donna-c64.

This now matches upstream at version 59a896970a1ad0a6cd7d0.
(Adam took my patches.)

12 years agoUse always_inline only with inline; otherwise GCC gripes
Nick Mathewson [Thu, 6 Dec 2012 17:08:04 +0000 (12:08 -0500)] 
Use always_inline only with inline; otherwise GCC gripes

12 years agoMake libcurve25519_donna get built as a .a
Nick Mathewson [Thu, 6 Dec 2012 17:07:58 +0000 (12:07 -0500)] 
Make libcurve25519_donna get built as a .a

This lets us give it compiler flags differing from the rest of
libor-crypto.a

12 years agoFix an unused-variable warning
Nick Mathewson [Thu, 6 Dec 2012 16:49:39 +0000 (11:49 -0500)] 
Fix an unused-variable warning

12 years agoEnable the ntor handshake on the client side.
Nick Mathewson [Thu, 6 Dec 2012 06:53:29 +0000 (01:53 -0500)] 
Enable the ntor handshake on the client side.

"works for me"

12 years agoEnable handling of create2/extend2/created2/extended2
Nick Mathewson [Thu, 6 Dec 2012 05:28:01 +0000 (00:28 -0500)] 
Enable handling of create2/extend2/created2/extended2

12 years agoDon't check create cells too much when we're relaying them
Nick Mathewson [Thu, 6 Dec 2012 05:21:24 +0000 (00:21 -0500)] 
Don't check create cells too much when we're relaying them

We want to sanity-check our own create cells carefully, and other
people's loosely.

12 years agoImplement scheme to allow ntor requests/responses via older servers
Nick Mathewson [Thu, 6 Dec 2012 04:59:12 +0000 (23:59 -0500)] 
Implement scheme to allow ntor requests/responses via older servers

12 years agoUse created_cell_format where appropriate
Nick Mathewson [Thu, 6 Dec 2012 04:44:27 +0000 (23:44 -0500)] 
Use created_cell_format where appropriate

12 years agoUse new wrappers for making,sending,processing create/extend cells
Nick Mathewson [Thu, 6 Dec 2012 04:07:49 +0000 (23:07 -0500)] 
Use new wrappers for making,sending,processing create/extend cells

12 years agoTeach cpuworker and others about create_cell_t and friends
Nick Mathewson [Thu, 6 Dec 2012 03:34:49 +0000 (22:34 -0500)] 
Teach cpuworker and others about create_cell_t and friends

The unit of work sent to a cpuworker is now a create_cell_t; its
response is now a created_cell_t.  Several of the things that call or
get called by this chain of logic now take create_cell_t or
created_cell_t too.

Since all cpuworkers are forked or spawned by Tor, they don't need a
stable wire protocol, so we can just send structs.  This saves us some
insanity, and helps p

12 years agoCode to parse and format CREATE{,2,_FAST} cells and their allies
Nick Mathewson [Wed, 5 Dec 2012 21:47:22 +0000 (16:47 -0500)] 
Code to parse and format CREATE{,2,_FAST} cells and their allies

As elsewhere, it makes sense when adding or extending a cell type to
actually make the code to parse it into a separate tested function.

This commit doesn't actually make anything use these new functions;
that's for a later commit.

12 years agoRename handshake_digest to rend_circ_nonce
Nick Mathewson [Wed, 5 Dec 2012 02:39:54 +0000 (21:39 -0500)] 
Rename handshake_digest to rend_circ_nonce

The handshake_digest field was never meaningfully a digest *of* the
handshake, but rather is a digest *from* the handshake that we exapted
to prevent replays of ESTABLISH_INTRO cells.  The ntor handshake will
generate it as more key material rather than taking it from any part
of the circuit handshake reply..

12 years agoMassive refactoring of the various handshake types
Nick Mathewson [Wed, 5 Dec 2012 02:27:07 +0000 (21:27 -0500)] 
Massive refactoring of the various handshake types

The three handshake types are now accessed from a unified interface;
their state is abstracted from the rest of the cpath state, and so on.

12 years agoRefactor the CREATE_FAST handshake code to match the others.
Nick Mathewson [Tue, 4 Dec 2012 21:51:31 +0000 (16:51 -0500)] 
Refactor the CREATE_FAST handshake code to match the others.

12 years agoSplit onion.[ch] into onion{,_fast,_tap}.[ch]
Nick Mathewson [Tue, 4 Dec 2012 21:09:52 +0000 (16:09 -0500)] 
Split onion.[ch] into onion{,_fast,_tap}.[ch]

I'm going to want a generic "onionskin" type and set of wrappers, and
for that, it will be helpful to isolate the different circuit creation
handshakes.  Now the original handshake is in onion_tap.[ch], the
CREATE_FAST handshake is in onion_fast.[ch], and onion.[ch] now
handles the onion queue.

This commit does nothing but move code and adjust header files.

12 years agoWrangle curve25519 onion keys: generate, store, load, publish, republish
Nick Mathewson [Tue, 4 Dec 2012 20:58:18 +0000 (15:58 -0500)] 
Wrangle curve25519 onion keys: generate, store, load, publish, republish

Here we try to handle curve25519 onion keys from generating them,
loading and storing them, publishing them in our descriptors, putting
them in microdescriptors, and so on.

This commit is untested and probably buggy like whoa

12 years agoMove curve25519 keypair type to src/common; give it functions
Nick Mathewson [Tue, 4 Dec 2012 20:57:16 +0000 (15:57 -0500)] 
Move curve25519 keypair type to src/common; give it functions

This patch moves curve25519_keypair_t from src/or/onion_ntor.h to
src/common/crypto_curve25519.h, and adds new functions to generate,
load, and store keypairs.

12 years agoRefactor strong os-RNG into its own function
Nick Mathewson [Tue, 4 Dec 2012 04:31:07 +0000 (23:31 -0500)] 
Refactor strong os-RNG into its own function

Previously, we only used the strong OS entropy source as part of
seeding OpenSSL's RNG.  But with curve25519, we'll have occasion to
want to generate some keys using extremely-good entopy, as well as the
means to do so.  So let's!

This patch refactors the OS-entropy wrapper into its own
crypto_strongest_rand() function, and makes our new
curve25519_secret_key_generate function try it as appropriate.

12 years agocurve25519-donna-c64: make endian-neutralness fns static
Nick Mathewson [Tue, 4 Dec 2012 03:59:33 +0000 (22:59 -0500)] 
curve25519-donna-c64: make endian-neutralness fns static

12 years agoImplementat the ntor handshake
Nick Mathewson [Tue, 4 Dec 2012 02:24:21 +0000 (21:24 -0500)] 
Implementat the ntor handshake

The ntor handshake--described in proposal 216 and in a paper by
Goldberg, Stebila, and Ustaoglu--gets us much better performance than
our current approach.

12 years agoAdd a wrapper around, and test and build support for, curve25519.
Nick Mathewson [Mon, 3 Dec 2012 20:44:21 +0000 (15:44 -0500)] 
Add a wrapper around, and test and build support for, curve25519.

We want to use donna-c64 when we have a GCC with support for
64x64->uint128_t multiplying.  If not, we want to use libnacl if we
can, unless it's giving us the unsafe "ref" implementation.  And if
that isn't going to work, we'd like to use the
portable-and-safe-but-slow 32-bit "donna" implementation.

We might need more library searching for the correct libnacl,
especially once the next libnacl release is out -- it's likely to have
bunches of better curve25519 implementations.

I also define a set of curve25519 wrapper functions, though it really
shouldn't be necessary.

We should eventually make the -donna*.c files get build with
-fomit-frame-pointer, since that can make a difference.

12 years agocurve25519-donna-c64: work on bigendian and alignment-happy systems
Nick Mathewson [Tue, 4 Dec 2012 03:17:12 +0000 (22:17 -0500)] 
curve25519-donna-c64: work on bigendian and alignment-happy systems

There was one place in curve25519-donna-c64 that was relying on
unaligned access and relying on little-endian values.  This patch
fixes that.

I've sent Adam a pull request.

12 years agoMake curve25519-donna work with our compiler warnings.
Nick Mathewson [Mon, 3 Dec 2012 19:57:35 +0000 (14:57 -0500)] 
Make curve25519-donna work with our compiler warnings.

12 years agoAdd fallback implementations for curve25519: curve25519_donna
Nick Mathewson [Mon, 3 Dec 2012 19:50:48 +0000 (14:50 -0500)] 
Add fallback implementations for curve25519: curve25519_donna

This is copied from Adam Langley's curve25519-donna package, as
of commit 09427c9cab32075c06c3487aa01628030e1c5ae7.

12 years agoAdd a data-invariant linear-search map structure
Nick Mathewson [Mon, 3 Dec 2012 18:10:33 +0000 (13:10 -0500)] 
Add a data-invariant linear-search map structure

I'm going to use this for looking op keys server-side for ntor.

12 years agoAvoid spurious local-port warnings
Nick Mathewson [Wed, 2 Jan 2013 15:37:03 +0000 (10:37 -0500)] 
Avoid spurious local-port warnings

Our old warn_nonlocal_client_ports() would give a bogus warning for
every nonlocal port every time it parsed any ports at all.  So if it
parsed a nonlocal socksport, it would complain that it had a nonlocal
socksport...and then turn around and complain about the nonlocal
socksport again, calling it a nonlocal transport or nonlocal dnsport,
if it had any of those.

Fixes bug 7836; bugfix on 0.2.3.3-alpha.

12 years agoFix a couple of harmless clang3.2 warnings
Sebastian Hahn [Mon, 31 Dec 2012 17:23:28 +0000 (18:23 +0100)] 
Fix a couple of harmless clang3.2 warnings

12 years agoMerge branch 'bug7814_squash'
Nick Mathewson [Sat, 29 Dec 2012 06:23:14 +0000 (01:23 -0500)] 
Merge branch 'bug7814_squash'

12 years agoFix a crash bug when running an node without IPv6-exit support.
Nick Mathewson [Sat, 29 Dec 2012 01:52:24 +0000 (20:52 -0500)] 
Fix a crash bug when running an node without IPv6-exit support.

Fixes bug 7814; bugfix on 0.2.4.7-alpha.

12 years agoRate-limit "No circuits are opened" message to once-per-hour
Nick Mathewson [Wed, 26 Dec 2012 15:05:45 +0000 (10:05 -0500)] 
Rate-limit "No circuits are opened" message to once-per-hour

mr-4 reports on #7799 that he was seeing it several times per second,
which suggests that things had gone very wrong.

This isn't a real fix, but it should make Tor usable till we can
figure out the real issue.

12 years agoFix a possibly-unused-var warning. Thank you, GCC.
Nick Mathewson [Wed, 26 Dec 2012 04:37:41 +0000 (23:37 -0500)] 
Fix a possibly-unused-var warning.  Thank you, GCC.

12 years agoFix compilation warning: must not format u64 as long.
Nick Mathewson [Wed, 26 Dec 2012 04:34:38 +0000 (23:34 -0500)] 
Fix compilation warning: must not format u64 as long.

12 years agoFix whitespace
Nick Mathewson [Wed, 26 Dec 2012 04:34:16 +0000 (23:34 -0500)] 
Fix whitespace

12 years agoMerge remote-tracking branch 'mikeperry/209-path-bias-changes'
Nick Mathewson [Wed, 26 Dec 2012 04:30:28 +0000 (23:30 -0500)] 
Merge remote-tracking branch 'mikeperry/209-path-bias-changes'

12 years agoMerge branch 'directory_guards_rebased'
Nick Mathewson [Wed, 26 Dec 2012 04:22:54 +0000 (23:22 -0500)] 
Merge branch 'directory_guards_rebased'

12 years agoAdd documentation for directory guard options
Nick Mathewson [Wed, 26 Dec 2012 04:19:10 +0000 (23:19 -0500)] 
Add documentation for directory guard options

12 years agoAdd configuration options for directory guards
Nick Mathewson [Tue, 11 Dec 2012 18:05:35 +0000 (13:05 -0500)] 
Add configuration options for directory guards

In addition to all the other ways to make directory gurads not go,
you can now set UseEntryGuardsAsDirGuards to 0.

12 years agoDirectory guard implementation.
Nick Mathewson [Tue, 11 Dec 2012 17:44:18 +0000 (12:44 -0500)] 
Directory guard implementation.

Implements proposal 207; ticket 6526.

12 years agoRemember which of our guards are directory caches
Nick Mathewson [Tue, 11 Dec 2012 16:43:27 +0000 (11:43 -0500)] 
Remember which of our guards are directory caches

12 years agoSplit choosing a regular directory into its own fn
Nick Mathewson [Tue, 11 Dec 2012 16:25:36 +0000 (11:25 -0500)] 
Split choosing a regular directory into its own fn

12 years agoOne last fix for a warning on non-EC systems
Nick Mathewson [Wed, 26 Dec 2012 03:12:18 +0000 (22:12 -0500)] 
One last fix for a warning on non-EC systems

12 years agoMerge branch 'tls_ecdhe_rebased_v2'
Nick Mathewson [Wed, 26 Dec 2012 03:10:57 +0000 (22:10 -0500)] 
Merge branch 'tls_ecdhe_rebased_v2'

12 years agoBe more noncomittal about performance improvement of uint128 backend.
Nick Mathewson [Wed, 26 Dec 2012 02:08:42 +0000 (21:08 -0500)] 
Be more noncomittal about performance improvement of uint128 backend.

12 years agoMake ECDHE group configurable: 224 for public, 256 for bridges (default)
Nick Mathewson [Wed, 26 Dec 2012 01:04:54 +0000 (20:04 -0500)] 
Make ECDHE group configurable: 224 for public, 256 for bridges (default)

12 years agoInform the user if they're passing up a 10x ECDH speedup.
Nick Mathewson [Tue, 25 Dec 2012 22:39:09 +0000 (17:39 -0500)] 
Inform the user if they're passing up a 10x ECDH speedup.

12 years agoAdd benchmark for DH handshake and ECDH-P-224/56 handshake
Nick Mathewson [Wed, 28 Nov 2012 19:14:35 +0000 (14:14 -0500)] 
Add benchmark for DH handshake and ECDH-P-224/56 handshake

12 years agoLet servers choose better ciphersuites when clients support them
Nick Mathewson [Wed, 28 Nov 2012 18:31:17 +0000 (13:31 -0500)] 
Let servers choose better ciphersuites when clients support them

This implements the server-side of proposal 198 by detecting when
clients lack the magic list of ciphersuites that indicates that
they're lying faking some ciphers they don't really have.  When
clients lack this list, we can choose any cipher that we'd actually
like.  The newly allowed ciphersuites are, currently, "All ECDHE-RSA
ciphers that openssl supports, except for ECDHE-RSA-RC4".

The code to detect the cipher list relies on on (ab)use of
SSL_set_session_secret_cb.

12 years agoRemove the address argument from client cipher classification fns
Nick Mathewson [Wed, 28 Nov 2012 17:35:02 +0000 (12:35 -0500)] 
Remove the address argument from client cipher classification fns

12 years agoCache the type of client cipher list we have in the tor_tls_t
Nick Mathewson [Wed, 28 Nov 2012 17:06:57 +0000 (12:06 -0500)] 
Cache the type of client cipher list we have in the tor_tls_t

We already use this classification for deciding whether (as a server)
to do a v2/v3 handshake, and we're about to start using it for
deciding whether we can use good ciphersuites too.

12 years agoprop198: Detect the list of ciphersuites we used to lie about having
Nick Mathewson [Tue, 27 Nov 2012 04:19:32 +0000 (23:19 -0500)] 
prop198: Detect the list of ciphersuites we used to lie about having

This is less easy than you might think; we can't just look at the
client ciphers list, since openssl doesn't remember client ciphers if
it doesn't know about them.  So we have to keep a list of the "v2"
ciphers, with the ones we don't know about removed.

12 years agoConfigure SSL context to know about using P-256 for ECDHE.
Nick Mathewson [Tue, 27 Nov 2012 04:19:02 +0000 (23:19 -0500)] 
Configure SSL context to know about using P-256 for ECDHE.

12 years agobump to 0.2.4.7-alpha-dev
Roger Dingledine [Tue, 25 Dec 2012 07:52:53 +0000 (02:52 -0500)] 
bump to 0.2.4.7-alpha-dev

12 years agoadd a blurb for 0.2.4.7-alpha too tor-0.2.4.7-alpha
Roger Dingledine [Mon, 24 Dec 2012 09:19:18 +0000 (04:19 -0500)] 
add a blurb for 0.2.4.7-alpha too

12 years agobump to 0.2.4.7-alpha
Roger Dingledine [Mon, 24 Dec 2012 09:04:04 +0000 (04:04 -0500)] 
bump to 0.2.4.7-alpha

12 years agofold in changes files so far
Roger Dingledine [Mon, 24 Dec 2012 09:01:44 +0000 (04:01 -0500)] 
fold in changes files so far

12 years agoWhen there are no dir_server_ts to choose, don't crash
Nick Mathewson [Wed, 19 Dec 2012 02:32:53 +0000 (21:32 -0500)] 
When there are no dir_server_ts to choose, don't crash

It's important not to call choose_array_element_by_weight and then
pass its return value unchecked to smartlist_get : it is allowed to
return -1.

Fixes bug 7756; bugfix on 4e3d07a6 (not in any released Tor)

12 years agoNick's Code review #3 part 2.
Mike Perry [Tue, 18 Dec 2012 22:16:01 +0000 (14:16 -0800)] 
Nick's Code review #3 part 2.

12 years agoChanges from Nick's code review 'part 1'
Mike Perry [Tue, 18 Dec 2012 20:39:03 +0000 (12:39 -0800)] 
Changes from Nick's code review 'part 1'

I think this is actually his third code review of this branch so far.

12 years agoAdd packaged cell fullness to the heartbeat message.
Nick Mathewson [Tue, 18 Dec 2012 20:16:35 +0000 (15:16 -0500)] 
Add packaged cell fullness to the heartbeat message.

This is an attempt to diagnose the severity of bug 7743.

12 years agoRemove the obsolete doc/TODO.* files
Nick Mathewson [Tue, 18 Dec 2012 03:26:05 +0000 (22:26 -0500)] 
Remove the obsolete doc/TODO.* files

Closes bug #7730.

12 years agoMerge branch 'ticket7570_7571'
Nick Mathewson [Mon, 17 Dec 2012 20:49:09 +0000 (15:49 -0500)] 
Merge branch 'ticket7570_7571'

Conflicts:
src/or/routerlist.c

12 years agoDrop the maximum attempts to get a virtual address to 1000.
Nick Mathewson [Sun, 25 Nov 2012 22:19:25 +0000 (17:19 -0500)] 
Drop the maximum attempts to get a virtual address to 1000.

This is good enough to give P_success >= 999,999,999/1,000,000,000 so
long as the address space is less than 97.95 full.  It'd be ridiculous
for that to happen for IPv6, and usome reasonable assumptions, it
would also be pretty silly for IPv4.

12 years agoDescribe IPv6 automap changes
Nick Mathewson [Sun, 25 Nov 2012 21:43:32 +0000 (16:43 -0500)] 
Describe IPv6 automap changes

12 years agoDocument PreferIPv6Automap in the manpage
Nick Mathewson [Sun, 25 Nov 2012 20:33:07 +0000 (15:33 -0500)] 
Document PreferIPv6Automap in the manpage

12 years agoAdd missing doxygen for DNS and automap code
Nick Mathewson [Sun, 25 Nov 2012 20:12:44 +0000 (15:12 -0500)] 
Add missing doxygen for DNS and automap code