]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
14 years agoAdd a data-independent variant of memcmp and a d-i memeq function.
Nick Mathewson [Mon, 9 May 2011 22:39:23 +0000 (18:39 -0400)] 
Add a data-independent variant of memcmp and a d-i memeq function.

The tor_memcmp code is by Robert Ransom, and the tor_memeq code is
by me.  Both incorporate some ideas from DJB's stuff.

14 years agoFix a failure case of connection_ap_handshake_attach_circuit()
Sebastian Hahn [Wed, 27 Apr 2011 23:48:25 +0000 (01:48 +0200)] 
Fix a failure case of connection_ap_handshake_attach_circuit()

tor_fragile_assert() might be a no-op, so we have to return something
here to indicate failure to the caller.

14 years agoFix a bug introduced by purging rend_cache on NEWNYM
Robert Ransom [Mon, 25 Apr 2011 13:38:35 +0000 (06:38 -0700)] 
Fix a bug introduced by purging rend_cache on NEWNYM

If the user sent a SIGNAL NEWNYM command after we fetched a rendezvous
descriptor, while we were building the introduction-point circuit, we
would give up entirely on trying to connect to the hidden service.

Original patch by rransom slightly edited to go into 0.2.1

14 years agoAllow rend_client_send_introduction to fail transiently
Robert Ransom [Mon, 25 Apr 2011 15:36:02 +0000 (08:36 -0700)] 
Allow rend_client_send_introduction to fail transiently

i.e. without closing the AP connection.

14 years agoForget all rendezvous client state on SIGNAL NEWNYM
Robert Ransom [Wed, 20 Apr 2011 09:27:58 +0000 (02:27 -0700)] 
Forget all rendezvous client state on SIGNAL NEWNYM

14 years agoMake SIZE_T_CEILING unsigned; add a signed SSIZE_T_CEILING
Nick Mathewson [Tue, 26 Apr 2011 17:00:46 +0000 (13:00 -0400)] 
Make SIZE_T_CEILING unsigned; add a signed SSIZE_T_CEILING

None of the comparisons were _broken_ previously, but avoiding
signed/unsigned comparisons makes everybody happier.

Fixes bug2475.

14 years agoFix a bug in removing DNSPort requests from their circular list
Nick Mathewson [Thu, 21 Apr 2011 17:39:00 +0000 (13:39 -0400)] 
Fix a bug in removing DNSPort requests from their circular list

Under heavy load, this could result in an assertion failure.  Fix for
bug 2933; bugfix on 0.2.0.10-alpha.

14 years agoMerge remote-tracking branch 'rransom/bug2750-v3' into maint-0.2.1
Nick Mathewson [Tue, 19 Apr 2011 16:30:50 +0000 (12:30 -0400)] 
Merge remote-tracking branch 'rransom/bug2750-v3' into maint-0.2.1

14 years agoOuch: correctly tabify the micro-revision.i target in Makefile.am (0.2.1 only)
Nick Mathewson [Tue, 19 Apr 2011 16:29:20 +0000 (12:29 -0400)] 
Ouch: correctly tabify the micro-revision.i target in Makefile.am (0.2.1 only)

14 years agoAdd an XXX
Robert Ransom [Mon, 18 Apr 2011 20:25:48 +0000 (13:25 -0700)] 
Add an XXX

14 years agoCorrect the warning emitted when rejecting an oversized HS desc
Robert Ransom [Mon, 11 Apr 2011 09:26:07 +0000 (02:26 -0700)] 
Correct the warning emitted when rejecting an oversized HS desc

14 years agoMerge remote-tracking branch 'public/bug2402_again' into maint-0.2.1
Nick Mathewson [Wed, 6 Apr 2011 20:13:22 +0000 (16:13 -0400)] 
Merge remote-tracking branch 'public/bug2402_again' into maint-0.2.1

14 years agoswitch to the apr 2011 geoip db
Roger Dingledine [Mon, 4 Apr 2011 07:52:58 +0000 (03:52 -0400)] 
switch to the apr 2011 geoip db

14 years agoFix configure.in zlib package names.
Erinn Clark [Tue, 15 Feb 2011 01:15:42 +0000 (02:15 +0100)] 
Fix configure.in zlib package names.

14 years agoFix a compile warning when using clang
Sebastian Hahn [Wed, 9 Mar 2011 15:39:04 +0000 (16:39 +0100)] 
Fix a compile warning when using clang

Issue noticed by Steven Murdoch; fixes bug 2689. The cast didn't do
anything, and we don't need to look at the return value of the function
here.

14 years agowe're not reachable if we don't have a routerinfo yet
Roger Dingledine [Sun, 13 Mar 2011 19:47:59 +0000 (15:47 -0400)] 
we're not reachable if we don't have a routerinfo yet

14 years agoput the 0.2.1.30 changes into releasenotes
Roger Dingledine [Fri, 11 Mar 2011 22:38:55 +0000 (17:38 -0500)] 
put the 0.2.1.30 changes into releasenotes

14 years agoBackport: Generate version tags using Git, not (broken) svn revisions.
Nick Mathewson [Tue, 25 Jan 2011 19:01:04 +0000 (14:01 -0500)] 
Backport: Generate version tags using Git, not (broken) svn revisions.

Partial backport of daa0326aaaa85a760be94ee2360cfa61a9fb5be2 .
Resolves bug 2402.  Bugfix on 0.2.1.15 (for the part where we switched to
git) and on 0.2.1.30 (for the part where we dumped micro-revisions.)

14 years agoRevert "Simplest fix to bug2402: do not include SVN versions"
Nick Mathewson [Fri, 11 Mar 2011 15:47:25 +0000 (10:47 -0500)] 
Revert "Simplest fix to bug2402: do not include SVN versions"

This reverts commit a1073ee956021ead19d30c2151510dbaced416a8.

Apparently, we totally misunderstood how the debian packages were using
microrevisions.  Better fix that!

14 years agomove to march 2011 geoip file
Roger Dingledine [Tue, 8 Mar 2011 23:15:17 +0000 (18:15 -0500)] 
move to march 2011 geoip file

14 years agoAvoid crash in any_pending_bridge_descriptor_fetches
Nick Mathewson [Tue, 8 Mar 2011 20:17:41 +0000 (15:17 -0500)] 
Avoid crash in any_pending_bridge_descriptor_fetches

This is based on shitlei's fix for bug2629, with extra parens removed.
Fixes bug 2629, bugfix on 0.2.1.2-alpha.

14 years agoMerge branch 'real_ipv6_fix' into maint-0.2.1
Nick Mathewson [Sun, 6 Mar 2011 18:42:05 +0000 (13:42 -0500)] 
Merge branch 'real_ipv6_fix' into maint-0.2.1

14 years agoOops, here's the *REAL* fix for the ipv6 issue
Nick Mathewson [Sun, 6 Mar 2011 18:31:06 +0000 (13:31 -0500)] 
Oops, here's the *REAL* fix for the ipv6 issue

We need to _REJECT_ descriptors with accept6/reject6 lines.  If we
let them onto the network , other un-upgraded tors will crash.

14 years agoMerge branch 'careful_with_all_descs' into maint-0.2.1
Nick Mathewson [Sun, 6 Mar 2011 18:35:42 +0000 (13:35 -0500)] 
Merge branch 'careful_with_all_descs' into maint-0.2.1

14 years agochanges file for careful_with_all_descs
Nick Mathewson [Sun, 6 Mar 2011 18:35:24 +0000 (13:35 -0500)] 
changes file for careful_with_all_descs

14 years agoRevert "Disallow reject6 and accept6 lines in descriptors"
Nick Mathewson [Sun, 6 Mar 2011 18:26:38 +0000 (13:26 -0500)] 
Revert "Disallow reject6 and accept6 lines in descriptors"

This reverts commit b3918b3bbbfa9097246d63746c8b540eff2ec8e8.

14 years agoexit_policy_is_general_exit is IPv4 only; it should admit it.
Nick Mathewson [Sun, 6 Mar 2011 18:16:53 +0000 (13:16 -0500)] 
exit_policy_is_general_exit is IPv4 only; it should admit it.

14 years agoChanges file for ipv6 parsing issue
Nick Mathewson [Sun, 6 Mar 2011 18:15:32 +0000 (13:15 -0500)] 
Changes file for ipv6 parsing issue

14 years agoDisallow reject6 and accept6 lines in descriptors
Sebastian Hahn [Sun, 6 Mar 2011 17:20:28 +0000 (18:20 +0100)] 
Disallow reject6 and accept6 lines in descriptors

This fixes a remotely triggerable assert on directory authorities, who
don't handle descriptors with ipv6 contents well yet. We will want to
revert this once we're ready to handle ipv6.

Issue raised by lorth on #tor, who wasn't able to use Tor anymore.
Analyzed with help from Christian Fromme. Fix suggested by arma. Bugfix
on 0.2.1.3-alpha.

14 years agoDo not serve encrypt-only descriptors with the "all" request. Reported by piebeer
Nick Mathewson [Fri, 4 Mar 2011 04:51:07 +0000 (23:51 -0500)] 
Do not serve encrypt-only descriptors with the "all" request. Reported by piebeer

14 years agoRemove doc/spec/Makefile.in from list of generated files
Nick Mathewson [Tue, 22 Feb 2011 22:51:03 +0000 (17:51 -0500)] 
Remove doc/spec/Makefile.in from list of generated files

14 years agoMerge remote branch 'public/bug1859_021' into maint-0.2.1
Nick Mathewson [Tue, 22 Feb 2011 22:19:41 +0000 (17:19 -0500)] 
Merge remote branch 'public/bug1859_021' into maint-0.2.1

14 years agoMerge remote branch 'public/bug2402_nothing' into maint-0.2.1
Nick Mathewson [Tue, 22 Feb 2011 20:54:13 +0000 (15:54 -0500)] 
Merge remote branch 'public/bug2402_nothing' into maint-0.2.1

14 years agochanges file for removing torspec from the tarball
Roger Dingledine [Tue, 22 Feb 2011 19:50:00 +0000 (14:50 -0500)] 
changes file for removing torspec from the tarball

14 years agoprefer https urls
Roger Dingledine [Tue, 22 Feb 2011 19:39:09 +0000 (14:39 -0500)] 
prefer https urls

14 years agoRemove specs from 0.2.1 branch: they have moved to a new repository.
Nick Mathewson [Mon, 21 Feb 2011 21:02:16 +0000 (16:02 -0500)] 
Remove specs from 0.2.1 branch: they have moved to a new repository.

14 years agofix the other half of bug 1074
Roger Dingledine [Thu, 10 Feb 2011 22:11:06 +0000 (17:11 -0500)] 
fix the other half of bug 1074

14 years agoMake the DH parameter we use for TLS match the one from Apache's mod_ssl
Nick Mathewson [Mon, 24 Jan 2011 21:03:14 +0000 (16:03 -0500)] 
Make the DH parameter we use for TLS match the one from Apache's mod_ssl

Our regular DH parameters that we use for circuit and rendezvous
crypto are unchanged.  This is yet another small step on the path of
protocol fingerprinting resistance.

(Backport from 0.2.2's 5ed73e3807d90dd0a3)

14 years agoUpdate documentation for PublishServerDescriptor
Robert Ransom [Wed, 19 Jan 2011 21:38:40 +0000 (13:38 -0800)] 
Update documentation for PublishServerDescriptor

14 years agoIgnore and warn about "PublishServerDescriptor hidserv"
Robert Ransom [Tue, 18 Jan 2011 11:54:56 +0000 (03:54 -0800)] 
Ignore and warn about "PublishServerDescriptor hidserv"

Fixes #2408.

14 years agomove the clause above the "if bw is too low" check
Roger Dingledine [Tue, 8 Feb 2011 04:22:45 +0000 (23:22 -0500)] 
move the clause above the "if bw is too low" check

14 years agodtrt when only relaybandwidthburst is set
Roger Dingledine [Tue, 8 Feb 2011 04:21:33 +0000 (23:21 -0500)] 
dtrt when only relaybandwidthburst is set

fixes bug 2470

14 years agoUpdate to the February 1 2011 Maxmind GeoLite Country database.
Karsten Loesing [Thu, 3 Feb 2011 06:34:00 +0000 (07:34 +0100)] 
Update to the February 1 2011 Maxmind GeoLite Country database.

14 years agofix the links in the exit-list notice we give out to users.
Andrew Lewman [Wed, 26 Jan 2011 16:14:44 +0000 (11:14 -0500)] 
fix the links in the exit-list notice we give out to users.

14 years agoBackport current tor-exit-notice to 0.2.1
Nick Mathewson [Wed, 26 Jan 2011 16:13:57 +0000 (11:13 -0500)] 
Backport current tor-exit-notice to 0.2.1

14 years agoSimplest fix to bug2402: do not include SVN versions
Nick Mathewson [Tue, 25 Jan 2011 19:08:13 +0000 (14:08 -0500)] 
Simplest fix to bug2402: do not include SVN versions

When we stopped using svn, 0.2.1.x lost the ability to notice its svn
revision and report it in the version number.  However, it kept
looking at the micro-revision.i file... so if you switched to master,
built tor, then switched to 0.2.1.x, you'd get a micro-revision.i file
from master reported as an SVN tag.  This patch takes out the "include
the svn tag" logic entirely.

Bugfix on 0.2.1.15-rc; fixes bug 2402.

14 years agoMerge remote branch 'rransom/policy_summarize-assert' into maint-0.2.1
Nick Mathewson [Thu, 20 Jan 2011 19:59:23 +0000 (14:59 -0500)] 
Merge remote branch 'rransom/policy_summarize-assert' into maint-0.2.1

14 years agoFix bounds-checking in policy_summarize
Robert Ransom [Thu, 20 Jan 2011 19:17:57 +0000 (11:17 -0800)] 
Fix bounds-checking in policy_summarize

Found by piebeer.

14 years agoOops; actually add the code to the last patch. :/
Nick Mathewson [Wed, 19 Jan 2011 18:25:17 +0000 (13:25 -0500)] 
Oops; actually add the code to the last patch. :/

14 years agoFix two more SIZE_T_CEILING issues
Nick Mathewson [Wed, 19 Jan 2011 18:22:50 +0000 (13:22 -0500)] 
Fix two more SIZE_T_CEILING issues

This patch imposes (very long) limits on the length of a line in a
directory document, and on the length of a certificate.  I don't
think it should actually be possible to overrun these remotely,
since we already impose a maximum size on any directory object we're
downloading, but a little defensive programming never hurt anybody.

Roger emailed me that doorss reported these on IRC, but nobody seems
to have put them on the bugtracker.

14 years agobe the winner, rewrite history
Roger Dingledine [Wed, 19 Jan 2011 00:12:01 +0000 (19:12 -0500)] 
be the winner, rewrite history

14 years ago0.2.1.29 changelog and blurb
Roger Dingledine [Sun, 16 Jan 2011 00:56:10 +0000 (19:56 -0500)] 
0.2.1.29 changelog and blurb

14 years agoFix a couple of non-cleared key issues in hidden services
Nick Mathewson [Sat, 15 Jan 2011 16:32:56 +0000 (11:32 -0500)] 
Fix a couple of non-cleared key issues in hidden services

we need to do more hunting, but this fixes the ones mentioned in 2385.

14 years agoZero out some more key data before freeing it
Nick Mathewson [Sat, 15 Jan 2011 16:22:25 +0000 (11:22 -0500)] 
Zero out some more key data before freeing it

Found by cypherpunks; fixes bug 2384.

14 years agoMerge branch 'bug2352_obsize' into maint-0.2.1
Nick Mathewson [Sat, 15 Jan 2011 18:15:06 +0000 (13:15 -0500)] 
Merge branch 'bug2352_obsize' into maint-0.2.1

14 years agoAdd missing check for hostname answer_len in dnsserv size
Nick Mathewson [Sat, 15 Jan 2011 18:09:12 +0000 (13:09 -0500)] 
Add missing check for hostname answer_len in dnsserv size

This is checked elsewhere too, but let's be RFC-conformant.

14 years agoMerge branch 'bug2332_part2' into maint-0.2.1
Nick Mathewson [Sat, 15 Jan 2011 17:43:02 +0000 (12:43 -0500)] 
Merge branch 'bug2332_part2' into maint-0.2.1

14 years agoMerge branch 'bug2324_uncompress' into maint-0.2.1
Nick Mathewson [Sat, 15 Jan 2011 17:12:34 +0000 (12:12 -0500)] 
Merge branch 'bug2324_uncompress' into maint-0.2.1

14 years agoclean up message; explain a magic number in a comment
Nick Mathewson [Sat, 15 Jan 2011 17:12:10 +0000 (12:12 -0500)] 
clean up message; explain a magic number in a comment

14 years agomake the description of tolen_asserts more dire
Nick Mathewson [Sat, 15 Jan 2011 15:54:58 +0000 (10:54 -0500)] 
make the description of tolen_asserts more dire

We have a CVE # for this bug.

14 years agoFix a heap overflow found by debuger, and make it harder to make that mistake again
Nick Mathewson [Thu, 13 Jan 2011 19:36:41 +0000 (14:36 -0500)] 
Fix a heap overflow found by debuger, and make it harder to make that mistake again

Our public key functions assumed that they were always writing into a
large enough buffer.  In one case, they weren't.

(Incorporates fixes from sebastian)

14 years agoAlways nul-terminate the result passed to evdns_server_add_ptr_reply
Nick Mathewson [Mon, 10 Jan 2011 21:18:32 +0000 (16:18 -0500)] 
Always nul-terminate the result passed to evdns_server_add_ptr_reply

In dnsserv_resolved(), we carefully made a nul-terminated copy of the
answer in a PTR RESOLVED cell... then never used that nul-terminated
copy.  Ouch.

Surprisingly this one isn't as huge a security problem as it could be.
The only place where the input to dnsserv_resolved wasn't necessarily
nul-terminated was when it was called indirectly from relay.c with the
contents of a relay cell's payload.  If the end of the payload was
filled with junk, eventdns.c would take the strdup() of the name [This
part is bad; we might crash there if the cell is in a bad part of the
stack or the heap] and get a name of at least length
495[*]. eventdns.c then rejects any name of length over 255, so the
bogus data would be neither transmitted nor altered.

  [*] If the name was less than 495 bytes long, the client wouldn't
     actually be reading off the end of the cell.

Nonetheless this is a reasonably annoying bug.  Better fix it.

Found while looking at bug 2332, reported by doorss.  Bugfix on
0.2.0.1-alpha.

14 years agocatch another overlong malloc possibility. found by cypherpunks
Nick Mathewson [Sat, 15 Jan 2011 15:42:11 +0000 (10:42 -0500)] 
catch another overlong malloc possibility. found by cypherpunks

14 years agoMake our replacement INT32_MAX always signed
Nick Mathewson [Wed, 12 Jan 2011 19:29:38 +0000 (14:29 -0500)] 
Make our replacement INT32_MAX always signed

The C standard says that INT32_MAX is supposed to be a signed
integer.  On platforms that have it, we get the correct
platform-defined value.  Our own replacement, however, was
unsigned.  That's going to cause a bug somewhere eventually.

14 years agoAlways nul-terminate the result passed to evdns_server_add_ptr_reply
Nick Mathewson [Mon, 10 Jan 2011 21:18:32 +0000 (16:18 -0500)] 
Always nul-terminate the result passed to evdns_server_add_ptr_reply

In dnsserv_resolved(), we carefully made a nul-terminated copy of the
answer in a PTR RESOLVED cell... then never used that nul-terminated
copy.  Ouch.

Surprisingly this one isn't as huge a security problem as it could be.
The only place where the input to dnsserv_resolved wasn't necessarily
nul-terminated was when it was called indirectly from relay.c with the
contents of a relay cell's payload.  If the end of the payload was
filled with junk, eventdns.c would take the strdup() of the name [This
part is bad; we might crash there if the cell is in a bad part of the
stack or the heap] and get a name of at least length
495[*]. eventdns.c then rejects any name of length over 255, so the
bogus data would be neither transmitted nor altered.

  [*] If the name was less than 495 bytes long, the client wouldn't
     actually be reading off the end of the cell.

Nonetheless this is a reasonably annoying bug.  Better fix it.

Found while looking at bug 2332, reported by doorss.  Bugfix on
0.2.0.1-alpha.

14 years agoImpose maximum sizes on parsed objects
Nick Mathewson [Mon, 10 Jan 2011 17:12:11 +0000 (12:12 -0500)] 
Impose maximum sizes on parsed objects

An object, you'll recall, is something between -----BEGIN----- and
-----END----- tags in a directory document.  Some of our code, as
doorss has noted in bug 2352, could assert if one of these ever
overflowed SIZE_T_CEILING but not INT_MAX.  As a solution, I'm setting
a maximum size on a single object such that neither of these limits
will ever be hit.  I'm also fixing the INT_MAX checks, just to be sure.

14 years agoAdd logic in routerparse to not read overlong private keys
Nick Mathewson [Mon, 10 Jan 2011 17:07:34 +0000 (12:07 -0500)] 
Add logic in routerparse to not read overlong private keys

I am not at all sure that it is possible to trigger a bug here,
but better safe than sorry.

14 years agoUpdate to the January 1 2011 Maxmind GeoLite Country database.
Karsten Loesing [Mon, 10 Jan 2011 09:37:54 +0000 (10:37 +0100)] 
Update to the January 1 2011 Maxmind GeoLite Country database.

14 years agoRemove a loud info log message
Nick Mathewson [Sat, 8 Jan 2011 03:03:22 +0000 (22:03 -0500)] 
Remove a loud info log message

14 years agoCorrectly detect and exclude addresses outside of our virtual address range
Nick Mathewson [Fri, 7 Jan 2011 17:18:37 +0000 (12:18 -0500)] 
Correctly detect and exclude addresses outside of our virtual address range

Found by cypherpunks; fixes more of 2328.  Bug was introduced in 3623a122;
first appeared in 0.2.0.5-alpha.

14 years agoMerge branch 'bug2328_021' into maint-0.2.1
Nick Mathewson [Thu, 6 Jan 2011 18:36:29 +0000 (13:36 -0500)] 
Merge branch 'bug2328_021' into maint-0.2.1

14 years agoNotice a little faster if we're running out of virtual addresses
Nick Mathewson [Thu, 6 Jan 2011 18:29:36 +0000 (13:29 -0500)] 
Notice a little faster if we're running out of virtual addresses

We were not decrementing "available" every time we did
++next_virtual_addr in addressmap_get_virtual_address: we left out the
--available when we skipped .00 and .255 addresses.

This didn't actually cause a bug in most cases, since the failure mode
was to keep looping around the virtual addresses until we found one,
or until available hit zero.  It could have given you an infinite loop
rather than a useful message, however, if you said "VirtualAddrNetwork
127.0.0.255/32" or something broken like that.

Spotted by cypherpunks

14 years agoHandle a NULL return from addressmap_get_virtual_address
Nick Mathewson [Wed, 5 Jan 2011 21:36:48 +0000 (16:36 -0500)] 
Handle a NULL return from addressmap_get_virtual_address

Fix for bug 2328; bugfix on 0.1.2.1-alpha; bug found by doorss.

14 years agoFix a double-counting bug in addrmap_get_virtual_address
Nick Mathewson [Wed, 5 Jan 2011 21:02:43 +0000 (16:02 -0500)] 
Fix a double-counting bug in addrmap_get_virtual_address

We were decrementing "available" twice for each in-use address we ran
across.  This would make us declare that we ran out of virtual
addresses when the address space was only half full.

14 years agoFix a SIZE_T_CEILING check in torgzip.c; noticed by cypherpunks
Nick Mathewson [Wed, 5 Jan 2011 17:42:34 +0000 (12:42 -0500)] 
Fix a SIZE_T_CEILING check in torgzip.c; noticed by cypherpunks

14 years agoNote that Tor requires Automake 1.7. Fixes bug 2305
Nick Mathewson [Mon, 3 Jan 2011 22:19:05 +0000 (17:19 -0500)] 
Note that Tor requires Automake 1.7. Fixes bug 2305

14 years agoDetect and disallow compression bombs
Nick Mathewson [Mon, 3 Jan 2011 20:54:23 +0000 (15:54 -0500)] 
Detect and disallow compression bombs

14 years agoAvoid assertion on read_file_to_str() with size==SIZE_T_CEILING-1
Nick Mathewson [Mon, 3 Jan 2011 20:30:11 +0000 (15:30 -0500)] 
Avoid assertion on read_file_to_str() with size==SIZE_T_CEILING-1

Spotted by doors, fixes bug 2326.

14 years agoCheck size against SIZE_T_CEILING in realloc too.
Nick Mathewson [Mon, 3 Jan 2011 20:15:27 +0000 (15:15 -0500)] 
Check size against SIZE_T_CEILING in realloc too.

Fixes bug 2324.

14 years agoNever include pthread.h when building for Windows.
Nick Mathewson [Mon, 3 Jan 2011 17:42:19 +0000 (12:42 -0500)] 
Never include pthread.h when building for Windows.

On Windows, we never use pthreads, since it doesn't usually exist,
and when it does it tends to be a little weirdly-behaved.  But some
mingw installations have a pthreads installed, so autoconf detects
pthread.h and tells us about it.  This would make us include
pthread.h, which could make for trouble when the iffy pthread.h
tried to include config.h.

This patch changes compat.h so that we never include pthread.h on
Windows.  Fixes bug 2313; bugfix on 0.1.0.1-rc.

14 years agofix whitespace issues
Nick Mathewson [Mon, 3 Jan 2011 16:57:42 +0000 (11:57 -0500)] 
fix whitespace issues

14 years agoBump copyright statements to 2011
Nick Mathewson [Mon, 3 Jan 2011 16:50:39 +0000 (11:50 -0500)] 
Bump copyright statements to 2011

14 years agoMerge remote branch 'public/bug2190_021' into maint-0.2.1
Nick Mathewson [Tue, 21 Dec 2010 20:44:50 +0000 (15:44 -0500)] 
Merge remote branch 'public/bug2190_021' into maint-0.2.1

14 years agoput 0.2.1.28 release notes in place too
Roger Dingledine [Fri, 17 Dec 2010 00:20:18 +0000 (19:20 -0500)] 
put 0.2.1.28 release notes in place too

14 years agoMerge commit 'nickm/fix_security_bug_021' into maint-0.2.1
Roger Dingledine [Thu, 16 Dec 2010 21:59:12 +0000 (16:59 -0500)] 
Merge commit 'nickm/fix_security_bug_021' into maint-0.2.1

14 years agoChange gabelmoo's IP address and ports.
Karsten Loesing [Thu, 16 Dec 2010 12:10:19 +0000 (13:10 +0100)] 
Change gabelmoo's IP address and ports.

14 years agoAdd a changelog entry
Nick Mathewson [Thu, 16 Dec 2010 03:35:07 +0000 (22:35 -0500)] 
Add a changelog entry

14 years agoMake payloads into uint8_t.
Nick Mathewson [Tue, 14 Dec 2010 00:34:01 +0000 (19:34 -0500)] 
Make payloads into uint8_t.

This will avoid some signed/unsigned assignment-related bugs.

15 years agoHave all of our allocation functions and a few others check for underflow
Nick Mathewson [Mon, 13 Dec 2010 23:40:21 +0000 (18:40 -0500)] 
Have all of our allocation functions and a few others check for underflow

It's all too easy in C to convert an unsigned value to a signed one,
which will (on all modern computers) give you a huge signed value.  If
you have a size_t value of size greater than SSIZE_T_MAX, that is way
likelier to be an underflow than it is to be an actual request for
more than 2gb of memory in one go.  (There's nothing in Tor that
should be trying to allocate >2gb chunks.)

15 years agoBase SIZE_T_CEILING on SSIZE_T_MAX.
Nick Mathewson [Mon, 13 Dec 2010 23:40:15 +0000 (18:40 -0500)] 
Base SIZE_T_CEILING on SSIZE_T_MAX.

15 years agoUpdate to the December 1 2010 Maxmind GeoLite Country database.
Karsten Loesing [Wed, 8 Dec 2010 16:59:40 +0000 (17:59 +0100)] 
Update to the December 1 2010 Maxmind GeoLite Country database.

15 years agoadd 0.2.1.27 blurb and changelog to release notes
Roger Dingledine [Wed, 1 Dec 2010 05:07:03 +0000 (00:07 -0500)] 
add 0.2.1.27 blurb and changelog to release notes

15 years agoFix compilation with mingw and OpenSSL 0.9.8m+
mingw-san [Mon, 26 Jul 2010 19:05:11 +0000 (15:05 -0400)] 
Fix compilation with mingw and OpenSSL 0.9.8m+

15 years agoUse S_CASE for ehostunreach, not E_CASE. Partial backport of 69deb22f. Fixes 0.2...
Nick Mathewson [Tue, 23 Nov 2010 17:46:41 +0000 (12:46 -0500)] 
Use S_CASE for ehostunreach, not E_CASE. Partial backport of 69deb22f. Fixes 0.2.1 compilation on windows

15 years agostop shipping doc/img and doc/website in the tarball
Roger Dingledine [Tue, 23 Nov 2010 05:03:50 +0000 (00:03 -0500)] 
stop shipping doc/img and doc/website in the tarball

15 years agoMerge branch 'fix2204' into maint-0.2.1
Nick Mathewson [Sun, 21 Nov 2010 19:28:38 +0000 (14:28 -0500)] 
Merge branch 'fix2204' into maint-0.2.1

15 years agoDo not set the hostname TLS extension server-side; only client-side
Nick Mathewson [Sun, 21 Nov 2010 03:21:50 +0000 (22:21 -0500)] 
Do not set the hostname TLS extension server-side; only client-side

This may fix bug 2204, and resolve the incompatibility with openssl
0.9.8p/1.0.0b.

15 years agoDo not send Libevent log messages to a controller (0.2.1 backport)
Nick Mathewson [Sat, 20 Nov 2010 03:22:43 +0000 (22:22 -0500)] 
Do not send Libevent log messages to a controller (0.2.1 backport)

Doing so could make Libevent call Libevent from inside a Libevent
logging call, which is a recipe for reentrant confusion and
hard-to-debug crashes.  This would especially hurt if Libevent
debug-level logging is enabled AND the user has a controller
watching for low-severity log messages.

Fix bug 2190; fix on 0.1.0.2-rc.

15 years agoFix a remaining bug in Robert's bug1859 fix.
Nick Mathewson [Thu, 21 Oct 2010 15:08:15 +0000 (11:08 -0400)] 
Fix a remaining bug in Robert's bug1859 fix.

When intro->extend_info is created for an introduction point, it
only starts out with a nickname, not necessarily an identity digest.
Thus, doing router_get_by_digest isn't necessarily safe.

15 years agoIssues with router_get_by_nickname() (3)
Robert Hogan [Sun, 17 Oct 2010 14:12:25 +0000 (15:12 +0100)] 
Issues with router_get_by_nickname() (3)

Add changes file