]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
14 years agoMerge remote-tracking branch 'rransom-tor/bug3825c'
Nick Mathewson [Sun, 23 Oct 2011 16:55:10 +0000 (12:55 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug3825c'

14 years agoMerge branch 'ticket4200'
Nick Mathewson [Fri, 21 Oct 2011 15:25:29 +0000 (11:25 -0400)] 
Merge branch 'ticket4200'

14 years agoFix missing word in changes/ticket4200
Nick Mathewson [Fri, 21 Oct 2011 15:25:16 +0000 (11:25 -0400)] 
Fix missing word in changes/ticket4200

14 years agoCheck for jumping clock in *format_*stats functions
Sebastian Hahn [Fri, 21 Oct 2011 15:01:38 +0000 (17:01 +0200)] 
Check for jumping clock in *format_*stats functions

None of these were real bugs (yet), because the callers made sure
everything was fine. Make it more explicit. Suggested by Nick

14 years agoAdd new stats type: descriptor fetch stats
Sebastian Hahn [Fri, 7 Oct 2011 00:39:48 +0000 (02:39 +0200)] 
Add new stats type: descriptor fetch stats

This is used for the bridge authority currently, to get a better
intuition on how many descriptors are actually fetched from it and how
many fetches happen in total.

Implements ticket 4200.

14 years agoremove code related to tracking descriptor serving times
Sebastian Hahn [Fri, 7 Oct 2011 00:42:52 +0000 (02:42 +0200)] 
remove code related to tracking descriptor serving times

This had broken due to bitrot - it doesn't know about microdescriptors
at all, and afaik hasn't generally been used in ages.

14 years agoMerge remote-tracking branch 'rransom-tor/bug4091'
Nick Mathewson [Thu, 20 Oct 2011 18:26:54 +0000 (14:26 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug4091'

14 years agoCheck whether a client port is a Unix socket before using its IP addr
Robert Ransom [Thu, 20 Oct 2011 10:17:23 +0000 (03:17 -0700)] 
Check whether a client port is a Unix socket before using its IP addr

Bugfix on commit c1ac0695d5bc64b555c345e4be87b18bab3ae56b, not yet in any
release.  Fixes bug 4091; bug reported by SwissTorHelp.

14 years agoMerge remote-tracking branch 'origin/maint-0.2.2'
Nick Mathewson [Thu, 20 Oct 2011 04:03:43 +0000 (00:03 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.2'

14 years agoMerge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2
Nick Mathewson [Thu, 20 Oct 2011 04:01:58 +0000 (00:01 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2

14 years agoMerge remote-tracking branch 'origin/maint-0.2.2'
Nick Mathewson [Thu, 20 Oct 2011 03:16:08 +0000 (23:16 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.2'

14 years agoFix crash when changing node restrictions with DNS lookup in progress
Nick Mathewson [Thu, 20 Oct 2011 03:14:05 +0000 (23:14 -0400)] 
Fix crash when changing node restrictions with DNS lookup in progress

Fixes bug 4259, bugfix on 0.2.2.25-alpha.  Bugfix by "Tey'".

Original message by submitter:

  Changing nodes restrictions using a controller while Tor is doing
  DNS resolution could makes Tor crashes (on WinXP at least). The
  problem can be repeated by trying to reach a non-existent domain
  using Tor:

    curl --socks4a 127.0.0.1:9050 inexistantdomain.ext

  .. and changing the ExitNodes parameter through the control port
  before Tor returns a DNS resolution error (of course, the following
  command won't work directly if the control port is password
  protected):

    echo SETCONF ExitNodes=TinyTurtle | nc -v 127.0.0.1 9051

  Using a non-existent domain is needed to repeat the issue so that
  Tor takes a few seconds for resolving the domain (which allows us to
  change the configuration). Tor will crash while processing the
  configuration change.

  The bug is located in the addressmap_clear_excluded_trackexithosts
  method which iterates over the entries of the addresses map in order
  to check whether the changes made to the configuration will impact
  those entries. When a DNS resolving is in progress, the new_adress
  field of the associated entry will be set to NULL. The method
  doesn't expect this field to be NULL, hence the crash.

14 years agoFree rend_data and intro_key when extra intro circs become general-purpose
Robert Ransom [Tue, 18 Oct 2011 14:08:02 +0000 (07:08 -0700)] 
Free rend_data and intro_key when extra intro circs become general-purpose

14 years agoMerge branch 'maint-0.2.2'
Roger Dingledine [Thu, 13 Oct 2011 14:14:38 +0000 (10:14 -0400)] 
Merge branch 'maint-0.2.2'

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Thu, 13 Oct 2011 14:14:16 +0000 (10:14 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoUpdate to the October 2011 GeoIP database.
Karsten Loesing [Thu, 13 Oct 2011 05:43:47 +0000 (07:43 +0200)] 
Update to the October 2011 GeoIP database.

14 years agoCheck for intro circ timeouts properly
Robert Ransom [Wed, 12 Oct 2011 13:41:33 +0000 (06:41 -0700)] 
Check for intro circ timeouts properly

Previously, we would treat an intro circuit failure as a timeout iff the
circuit failed due to a mismatch in relay identity keys.  (Due to a bug
elsewhere, we only recognize relay identity-key mismatches on the first
hop, so this isn't as bad as it could have been.)

Bugfix on commit eaed37d14c6e1dc93a392f62ef2e501f75e4878a, not yet in any
release.

14 years agoMerge branch 'bug3512'
Nick Mathewson [Tue, 11 Oct 2011 19:56:51 +0000 (15:56 -0400)] 
Merge branch 'bug3512'

14 years agoStop using addr_port_lookup as an address splitting function
Nick Mathewson [Tue, 11 Oct 2011 16:02:19 +0000 (12:02 -0400)] 
Stop using addr_port_lookup as an address splitting function

It's too risky to have a function where if you leave one parameter
NULL, it splits up address:port strings, but if you set it, it does
hostname resolution.

14 years agoChange "reverse_lookup_name" functions to refer to "PTR_name"s
Nick Mathewson [Tue, 11 Oct 2011 15:47:13 +0000 (11:47 -0400)] 
Change "reverse_lookup_name" functions to refer to "PTR_name"s

Under the new convention, having a tor_addr.*lookup function that
doesn't do hostname resolution is too close for comfort.

I used this script here, and have made no other changes.

  s/tor_addr_parse_reverse_lookup_name/tor_addr_parse_PTR_name/g;
  s/tor_addr_to_reverse_lookup_name/tor_addr_to_PTR_name/g;

14 years agoFix names of functions that convert strings to addrs
Nick Mathewson [Tue, 11 Oct 2011 15:21:31 +0000 (11:21 -0400)] 
Fix names of functions that convert strings to addrs

Now let's have "lookup" indicate that there can be a hostname
resolution, and "parse" indicate that there wasn't.  Previously, we
had one "lookup" function that did resolution; four "parse" functions,
half of which did resolution; and a "from_str()" function that didn't
do resolution.  That's confusing and error-prone!

The code changes in this commit are exactly the result of this perl
script, run under "perl -p -i.bak" :

  s/tor_addr_port_parse/tor_addr_port_lookup/g;
  s/parse_addr_port(?=[^_])/addr_port_lookup/g;
  s/tor_addr_from_str/tor_addr_parse/g;

This patch leaves aton and pton alone: their naming convention and
behavior is is determined by the sockets API.

More renaming may be needed.

14 years agoFix a bunch of whitespace errors
Nick Mathewson [Tue, 11 Oct 2011 15:30:01 +0000 (11:30 -0400)] 
Fix a bunch of whitespace errors

14 years agoMerge branch 'prop176-v2'
Nick Mathewson [Tue, 11 Oct 2011 03:22:25 +0000 (23:22 -0400)] 
Merge branch 'prop176-v2'

14 years agoAdd some points to make it easy to turn off v3 support
Nick Mathewson [Tue, 11 Oct 2011 03:12:29 +0000 (23:12 -0400)] 
Add some points to make it easy to turn off v3 support

14 years agoChanges file for prop176 branch
Nick Mathewson [Tue, 11 Oct 2011 03:06:25 +0000 (23:06 -0400)] 
Changes file for prop176 branch

14 years agoQuiet two notices, and spelling mistake cleanup
Sebastian Hahn [Tue, 11 Oct 2011 02:24:33 +0000 (04:24 +0200)] 
Quiet two notices, and spelling mistake cleanup

14 years agoFix a few 64bit compiler warnings
Sebastian Hahn [Tue, 11 Oct 2011 01:06:41 +0000 (03:06 +0200)] 
Fix a few 64bit compiler warnings

14 years agoAdd more log statements for protocol/internal failures
Nick Mathewson [Thu, 6 Oct 2011 18:58:59 +0000 (14:58 -0400)] 
Add more log statements for protocol/internal failures

14 years agoRemove auth_challenge field from or_handshake_state_t
Nick Mathewson [Thu, 6 Oct 2011 18:41:02 +0000 (14:41 -0400)] 
Remove auth_challenge field from or_handshake_state_t

We didn't need to record this value; it was already recorded
implicitly while computing cell digests for later examination in the
authenticate cells.

14 years agospec conformance: allow only one cert of each type
Nick Mathewson [Wed, 5 Oct 2011 14:44:22 +0000 (10:44 -0400)] 
spec conformance: allow only one cert of each type

14 years agoGive tor_cert_get_id_digests() fail-fast behavior
Nick Mathewson [Wed, 5 Oct 2011 14:33:39 +0000 (10:33 -0400)] 
Give tor_cert_get_id_digests() fail-fast behavior

Right now we can take the digests only of an RSA key, and only expect to
take the digests of an RSA key.  The old tor_cert_get_id_digests() would
return a good set of digests for an RSA key, and an all-zero one for a
non-RSA key.  This behavior is too error-prone: it carries the risk that
we will someday check two non-RSA keys for equality and conclude that
they must be equal because they both have the same (zero) "digest".

Instead, let's have tor_cert_get_id_digests() return NULL for keys we
can't handle, and make its callers explicitly test for NULL.

14 years agoFix some more issues wrt tor_cert_new found by asn
Nick Mathewson [Wed, 5 Oct 2011 14:25:42 +0000 (10:25 -0400)] 
Fix some more issues wrt tor_cert_new found by asn

14 years agoMake more safe_str usage happen for new logs in command.c
Nick Mathewson [Wed, 28 Sep 2011 17:19:55 +0000 (13:19 -0400)] 
Make more safe_str usage happen for new logs in command.c

14 years agoSet up network parameters on non-authenticated incoming connections
Nick Mathewson [Wed, 28 Sep 2011 17:10:40 +0000 (13:10 -0400)] 
Set up network parameters on non-authenticated incoming connections

Also add some info log messages for the steps of the v3 handshake.

Now my test network bootstraps!

14 years agoMake sure we stop putting cells into our hash at the right time.
Nick Mathewson [Wed, 28 Sep 2011 14:31:56 +0000 (10:31 -0400)] 
Make sure we stop putting cells into our hash at the right time.

14 years agoBugfixes for authenticate handling and generation
Nick Mathewson [Tue, 27 Sep 2011 19:20:17 +0000 (15:20 -0400)] 
Bugfixes for authenticate handling and generation

14 years agoFix log message about what cells we are sending
Nick Mathewson [Tue, 27 Sep 2011 18:40:27 +0000 (14:40 -0400)] 
Fix log message about what cells we are sending

14 years agomore verbose log for recording an odd cell
Nick Mathewson [Tue, 27 Sep 2011 18:39:57 +0000 (14:39 -0400)] 
more verbose log for recording an odd cell

14 years agoActually accept cells in SERVER_RENEGOTIATING
Nick Mathewson [Tue, 27 Sep 2011 18:04:21 +0000 (14:04 -0400)] 
Actually accept cells in SERVER_RENEGOTIATING

14 years agoGenerate certificates that enable v3 handshake
Nick Mathewson [Wed, 28 Sep 2011 19:03:42 +0000 (15:03 -0400)] 
Generate certificates that enable v3 handshake

14 years agoAllow "finished flushing" during v3 handshake
Nick Mathewson [Tue, 27 Sep 2011 17:40:39 +0000 (13:40 -0400)] 
Allow "finished flushing" during v3 handshake

14 years agoHook up all of the prop176 code; allow v3 negotiations to actually work
Nick Mathewson [Tue, 27 Sep 2011 17:15:36 +0000 (13:15 -0400)] 
Hook up all of the prop176 code; allow v3 negotiations to actually work

14 years agoRemove a no-longer-relevant comment
Nick Mathewson [Mon, 26 Sep 2011 15:41:23 +0000 (11:41 -0400)] 
Remove a no-longer-relevant comment

14 years agoMake tor_tls_cert_is_valid check key lengths
Nick Mathewson [Thu, 22 Sep 2011 14:01:41 +0000 (10:01 -0400)] 
Make tor_tls_cert_is_valid check key lengths

14 years agoNew functions to record digests of cells during v3 handshake
Nick Mathewson [Fri, 16 Sep 2011 22:32:11 +0000 (18:32 -0400)] 
New functions to record digests of cells during v3 handshake

Also, free all of the new fields in or_handshake_state_t

14 years agoImplement cert/auth cell reading
Nick Mathewson [Tue, 13 Sep 2011 20:24:49 +0000 (16:24 -0400)] 
Implement cert/auth cell reading

14 years agoBasic function to write authenticate cells
Nick Mathewson [Wed, 14 Sep 2011 18:44:42 +0000 (14:44 -0400)] 
Basic function to write authenticate cells

Also, tweak the cert cell code to send auth certs

14 years agoFunction to return peer cert as tor_tls_cert
Nick Mathewson [Thu, 22 Sep 2011 15:01:14 +0000 (11:01 -0400)] 
Function to return peer cert as tor_tls_cert

14 years agoAdd AUTH keys as specified in proposal 176
Nick Mathewson [Fri, 16 Sep 2011 15:21:30 +0000 (11:21 -0400)] 
Add AUTH keys as specified in proposal 176

Our keys and x.509 certs are proliferating here.  Previously we had:
   An ID cert (using the main ID key), self-signed
   A link cert (using a shorter-term link key), signed by the ID key

Once proposal 176 and 179 are done, we will also have:
   Optionally, a presentation cert (using the link key),
       signed by whomever.
   An authentication cert (using a shorter-term ID key), signed by
       the ID key.

These new keys are managed as part of the tls context infrastructure,
since you want to rotate them under exactly the same circumstances,
and since they need X509 certificates.

14 years agoFunctions to get a public RSA key from a cert
Nick Mathewson [Thu, 22 Sep 2011 14:18:17 +0000 (10:18 -0400)] 
Functions to get a public RSA key from a cert

14 years agoFunction to detect certificate types that signal v3 certificates
Nick Mathewson [Fri, 16 Sep 2011 21:48:20 +0000 (17:48 -0400)] 
Function to detect certificate types that signal v3 certificates

14 years agoFunction to get digests of the certs and their keys
Nick Mathewson [Wed, 14 Sep 2011 18:43:44 +0000 (14:43 -0400)] 
Function to get digests of the certs and their keys

14 years agoMore functions to manipulate certs received in cells
Nick Mathewson [Wed, 14 Sep 2011 17:04:48 +0000 (13:04 -0400)] 
More functions to manipulate certs received in cells

14 years agoFunction to extract the TLSSECRETS field for v3 handshakes
Nick Mathewson [Tue, 13 Sep 2011 17:46:21 +0000 (13:46 -0400)] 
Function to extract the TLSSECRETS field for v3 handshakes

14 years agoFunctions to send cert and auth_challenge cells.
Nick Mathewson [Tue, 13 Sep 2011 15:38:38 +0000 (11:38 -0400)] 
Functions to send cert and auth_challenge cells.

14 years agoCell types and states for new OR handshake
Nick Mathewson [Tue, 13 Sep 2011 14:03:09 +0000 (10:03 -0400)] 
Cell types and states for new OR handshake

Also, define all commands > 128 as variable-length when using
v3 or later link protocol.  Running into a var cell with an
unrecognized type is no longer a bug.

14 years agoAdd a sha256 hmac function, with tests
Nick Mathewson [Tue, 13 Sep 2011 15:38:13 +0000 (11:38 -0400)] 
Add a sha256 hmac function, with tests

14 years agoTurn X509 certificates into a first-class type and add some functions
Nick Mathewson [Tue, 13 Sep 2011 15:37:15 +0000 (11:37 -0400)] 
Turn X509 certificates into a first-class type and add some functions

14 years agoNew function to get all digests of a public key
Nick Mathewson [Tue, 13 Sep 2011 18:32:51 +0000 (14:32 -0400)] 
New function to get all digests of a public key

14 years agoMerge remote-tracking branch 'origin/maint-0.2.2'
Nick Mathewson [Tue, 11 Oct 2011 02:50:52 +0000 (22:50 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.2'

14 years agoMerge remote-tracking branch 'sebastian/osxcompile'
Nick Mathewson [Tue, 11 Oct 2011 02:03:20 +0000 (22:03 -0400)] 
Merge remote-tracking branch 'sebastian/osxcompile'

14 years agoConsider hibernation before dropping privs
Sebastian Hahn [Tue, 11 Oct 2011 00:40:06 +0000 (02:40 +0200)] 
Consider hibernation before dropping privs

Without this patch, Tor wasn't sure whether it would be hibernating or
not, so it postponed opening listeners until after the privs had been
dropped. This doesn't work so well for low ports. Bug was introduced in
the fix for bug 2003. Fixes bug 4217, reported by Zax and katmagic.
Thanks!

14 years agoFix a compile warning on OS X 10.6 and up
Sebastian Hahn [Tue, 11 Oct 2011 00:25:00 +0000 (02:25 +0200)] 
Fix a compile warning on OS X 10.6 and up

14 years agoAdd a missing comma in tor_check_port_forwarding
Nick Mathewson [Mon, 10 Oct 2011 15:42:05 +0000 (11:42 -0400)] 
Add a missing comma in tor_check_port_forwarding

My fault; fix for bug 4213.

14 years agoUpdate documentation comment for rend_client_reextend_intro_circuit
Robert Ransom [Mon, 10 Oct 2011 12:33:53 +0000 (05:33 -0700)] 
Update documentation comment for rend_client_reextend_intro_circuit

One of its callers assumes a non-zero result indicates a permanent failure
(i.e. the current attempt to connect to this HS either has failed or is
 doomed).  The other caller only requires that this function's result
never equal -2.

Bug reported by Sebastian Hahn.

14 years agoDon't launch a useless circuit in rend_client_reextend_intro_circuit
Robert Ransom [Mon, 10 Oct 2011 03:24:27 +0000 (20:24 -0700)] 
Don't launch a useless circuit in rend_client_reextend_intro_circuit

Fixes bug 4212.  Bug reported by katmagic and found by Sebastian.

14 years agoMerge remote-tracking branch 'origin/maint-0.2.2'
Nick Mathewson [Fri, 7 Oct 2011 20:49:52 +0000 (16:49 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.2'

This merge is here to take a commit (feature 3951) that we already
have in master, so use "merge -s ours"

14 years agoNote ticket and source version for feature3951 in changes file
Nick Mathewson [Fri, 7 Oct 2011 20:47:43 +0000 (16:47 -0400)] 
Note ticket and source version for feature3951 in changes file

14 years agoMerge remote-tracking branch 'karsten/feature3951' into maint-0.2.2
Nick Mathewson [Fri, 7 Oct 2011 20:46:50 +0000 (16:46 -0400)] 
Merge remote-tracking branch 'karsten/feature3951' into maint-0.2.2

14 years agoMerge remote-tracking branch 'public/bug2003_nm'
Nick Mathewson [Fri, 7 Oct 2011 20:43:45 +0000 (16:43 -0400)] 
Merge remote-tracking branch 'public/bug2003_nm'

14 years agoreinstate a notice for the non-loopback socksport case
Nick Mathewson [Fri, 7 Oct 2011 20:34:21 +0000 (16:34 -0400)] 
reinstate a notice for the non-loopback socksport case

Thanks to prop171, it's no longer a crazy thing to do, but you should
make sure that you really meant it!

14 years agoMerge remote-tracking branch 'rransom-tor/bug4018'
Nick Mathewson [Fri, 7 Oct 2011 20:32:04 +0000 (16:32 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug4018'

14 years agoMerge remote-tracking branch 'public/bug2430'
Nick Mathewson [Fri, 7 Oct 2011 20:28:32 +0000 (16:28 -0400)] 
Merge remote-tracking branch 'public/bug2430'

14 years agoMerge remote-tracking branch 'asn2/bug3656'
Nick Mathewson [Fri, 7 Oct 2011 20:05:13 +0000 (16:05 -0400)] 
Merge remote-tracking branch 'asn2/bug3656'

Conflicts:
src/common/util.c
src/common/util.h
src/or/config.h
src/or/main.c
src/test/test_util.c

14 years agoMerge remote-tracking branch 'origin/maint-0.2.2'
Nick Mathewson [Fri, 7 Oct 2011 16:20:08 +0000 (12:20 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.2'

14 years agoAvoid running DNS self-tests if we're operating as a bridge
warms0x [Fri, 7 Oct 2011 07:04:29 +0000 (07:04 +0000)] 
Avoid running DNS self-tests if we're operating as a bridge

14 years agoRevive our beautiful unit tests.
George Kadianakis [Fri, 7 Oct 2011 13:44:58 +0000 (15:44 +0200)] 
Revive our beautiful unit tests.

They broke when the PT_PROTO_INFANT proxy state was added.

14 years agoMake it compile on Windows™.
George Kadianakis [Fri, 7 Oct 2011 13:44:44 +0000 (15:44 +0200)] 
Make it compile on Windows™.

14 years agoSupport multiple transports in a single transport line.
George Kadianakis [Fri, 7 Oct 2011 12:13:41 +0000 (14:13 +0200)] 
Support multiple transports in a single transport line.

Support multiple comma-separated transpotrs in a single
{Client,Server}TransportPlugin line.

14 years agoTurn on directory request statistics by default.
Karsten Loesing [Tue, 9 Nov 2010 13:18:00 +0000 (14:18 +0100)] 
Turn on directory request statistics by default.

Change the default values for collecting directory request statistics and
inlcuding them in extra-info descriptors to 1.

Don't break if we are configured to collect directory request or entry
statistics and don't have a GeoIP database. Instead, print out a notice
and skip initializing the affected statistics code.

This is the cherry-picked 499661524b0a572303087af721325608dd91f7ce.

14 years agoMerge remote-tracking branch 'origin/maint-0.2.2'
Nick Mathewson [Mon, 3 Oct 2011 19:19:00 +0000 (15:19 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.2'

14 years agoFix compilation of 3335 and 3825 fixes
Nick Mathewson [Mon, 3 Oct 2011 19:13:38 +0000 (15:13 -0400)] 
Fix compilation of 3335 and 3825 fixes

In master, they ran into problems with the edge_conn/entry_conn split.

14 years agoMerge remote-tracking branch 'rransom-tor/bug3335-v2'
Nick Mathewson [Mon, 3 Oct 2011 19:06:07 +0000 (15:06 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug3335-v2'

Conflicts:
src/or/connection_edge.c
src/or/rendclient.c

14 years agoAdd changes file for bug 4094
Nick Mathewson [Mon, 3 Oct 2011 16:58:07 +0000 (12:58 -0400)] 
Add changes file for bug 4094

14 years agoRephrase the log messages emitted if the TestSocks check is positive
Fabian Keil [Wed, 28 Sep 2011 16:00:59 +0000 (18:00 +0200)] 
Rephrase the log messages emitted if the TestSocks check is positive

Previously Tor would always claim to have been given a hostname
by the client, while actually only verifying that the client
is using SOCKS4A or SOCKS5 with hostnames. Both protocol versions
allow IP addresses, too, in which case the log messages were wrong.

Fixes #4094.

14 years agoRemove an HS's last_hid_serv_requests entries when a conn. attempt ends
Robert Ransom [Tue, 20 Sep 2011 11:26:09 +0000 (04:26 -0700)] 
Remove an HS's last_hid_serv_requests entries when a conn. attempt ends

14 years agoRecord the HS's address in last_hid_serv_request keys
Robert Ransom [Tue, 20 Sep 2011 10:50:45 +0000 (03:50 -0700)] 
Record the HS's address in last_hid_serv_request keys

14 years agoFix comment typo
Robert Ransom [Tue, 20 Sep 2011 10:42:40 +0000 (03:42 -0700)] 
Fix comment typo

14 years agoDetect and remove unreachable intro points
Robert Ransom [Sat, 17 Sep 2011 10:53:07 +0000 (03:53 -0700)] 
Detect and remove unreachable intro points

14 years agoClear the timed_out flag when an HS connection attempt ends
Robert Ransom [Sat, 17 Sep 2011 10:23:26 +0000 (03:23 -0700)] 
Clear the timed_out flag when an HS connection attempt ends

14 years agoRecord intro point timeouts in rend_intro_point_t
Robert Ransom [Sat, 17 Sep 2011 10:19:29 +0000 (03:19 -0700)] 
Record intro point timeouts in rend_intro_point_t

14 years agoRefetch an HS's desc if we don't have a usable one
Robert Ransom [Thu, 29 Sep 2011 03:00:24 +0000 (20:00 -0700)] 
Refetch an HS's desc if we don't have a usable one

Previously, we wouldn't refetch an HS's descriptor unless we didn't
have one at all.  That was equivalent to refetching iff we didn't have
a usable one, but the next commit will make us keep some non-usable HS
descriptors around in our cache.

Code bugfix on the release that introduced the v2 HS directory system,
because rend_client_refetch_v2_renddesc's documentation comment should
have described what it actually did, not what its behaviour happened
to be equivalent to; no behaviour change in this commit.

14 years agoLooks like Windows version 6.2 will be Windows 8
Sebastian Hahn [Sat, 1 Oct 2011 12:44:39 +0000 (14:44 +0200)] 
Looks like Windows version 6.2 will be Windows 8

Thanks to funkstar for the report

14 years agobump to 0.2.3.5-alpha tor-0.2.3.5-alpha
Roger Dingledine [Wed, 28 Sep 2011 22:25:16 +0000 (18:25 -0400)] 
bump to 0.2.3.5-alpha

14 years agogive 0.2.3.5-alpha a blurb
Roger Dingledine [Wed, 28 Sep 2011 22:25:09 +0000 (18:25 -0400)] 
give 0.2.3.5-alpha a blurb

14 years agofix default for TokenBucketRefillInterval in man page
Roger Dingledine [Wed, 28 Sep 2011 22:23:17 +0000 (18:23 -0400)] 
fix default for TokenBucketRefillInterval in man page

14 years agofold in recent changes entries
Roger Dingledine [Wed, 28 Sep 2011 19:41:29 +0000 (15:41 -0400)] 
fold in recent changes entries

14 years agorefill our token buckets 10 times/sec, not 100
Roger Dingledine [Wed, 28 Sep 2011 19:38:36 +0000 (15:38 -0400)] 
refill our token buckets 10 times/sec, not 100

refilling often is good, but refilling often has unclear side effects
on a) cpu load, and b) making sure every cell, ever, is sent out one at
a time

14 years agoMerge branch 'maint-0.2.2'
Roger Dingledine [Wed, 28 Sep 2011 19:38:02 +0000 (15:38 -0400)] 
Merge branch 'maint-0.2.2'

14 years agobridges should use create_fast cells for their own circuits
Roger Dingledine [Wed, 28 Sep 2011 19:35:27 +0000 (15:35 -0400)] 
bridges should use create_fast cells for their own circuits

fixes bug 4124, as noticed in bug 4115