]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Wed, 4 Mar 2015 11:24:51 +0000 (12:24 +0100)]
Make TransProxyType ipfw work correctly
Fixes bug 15064; bugfix on 0.2.5.4-alpha.
Nick Mathewson [Tue, 24 Feb 2015 18:24:57 +0000 (13:24 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Tue, 24 Feb 2015 18:23:44 +0000 (13:23 -0500)]
Merge remote-tracking branch 'public/bug14129_024' into maint-0.2.4
Nick Mathewson [Fri, 20 Feb 2015 06:04:26 +0000 (01:04 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Sina Rabbani [Fri, 13 Feb 2015 17:47:43 +0000 (09:47 -0800)]
Faravahar's New IP Address as of 2/20/2015
Nick Mathewson [Fri, 23 Jan 2015 13:52:55 +0000 (08:52 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Fri, 23 Jan 2015 13:52:35 +0000 (08:52 -0500)]
Merge remote-tracking branch 'karsten/geoip6-jan2015' into maint-0.2.4
Nick Mathewson [Fri, 23 Jan 2015 13:52:20 +0000 (08:52 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Karsten Loesing [Thu, 22 Jan 2015 08:58:29 +0000 (09:58 +0100)]
Update geoip6 to the January 7 2015 database.
Karsten Loesing [Thu, 22 Jan 2015 08:56:54 +0000 (09:56 +0100)]
Update geoip to the January 7 2015 database.
Nick Mathewson [Fri, 16 Jan 2015 16:49:58 +0000 (11:49 -0500)]
fix another mingw64 unit test warnin
Nick Mathewson [Thu, 15 Jan 2015 17:56:57 +0000 (12:56 -0500)]
Fix a compilation warning in the unit tests
Nick Mathewson [Sat, 10 Jan 2015 21:06:25 +0000 (16:06 -0500)]
Ignore warning for redundant decl in openssl/srtp.h
Backports some commits from tor master.
Nick Mathewson [Tue, 13 Jan 2015 17:24:42 +0000 (12:24 -0500)]
Remove needless strdup in addressmap_register_virtual_address()
Fixes bug 14195. Bugfix on 0.1.0.1-rc.
Nick Mathewson [Mon, 12 Jan 2015 05:59:29 +0000 (00:59 -0500)]
Merge remote-tracking branch 'public/bug14129_024' into maint-0.2.5
teor [Sun, 11 Jan 2015 08:33:04 +0000 (19:33 +1100)]
Don't crash on torrc Vi[rtualAddrNetworkIPv[4|6]] with no option value
Check for a missing option value in parse_virtual_addr_network
before asserting on the NULL in tor_addr_parse_mask_ports.
This avoids crashing on torrc lines like Vi[rtualAddrNetworkIPv[4|6]]
when no value follows the option.
Bugfix on 0.2.3 (
de4cc126cbb5 on 24 November 2012), fixes #14142.
Nick Mathewson [Thu, 8 Jan 2015 16:00:21 +0000 (11:00 -0500)]
Avoid attempts to double-remove edge connections from the DNS resolver.
Also, avoid crashing when we attempt to double-remove an edge
connection from the DNS resolver: just log a bug warning instead.
Fixes bug 14129. Bugfix on
0d20fee2fbd48978 , which was in 0.0.7rc1.
jowr found the bug. cypherpunks wrote the fix. I added the log
message and removed the assert.
Sebastian Hahn [Wed, 7 Jan 2015 11:43:21 +0000 (12:43 +0100)]
Enlarge the buffer for a line in a bw file
Nick Mathewson [Tue, 23 Dec 2014 15:55:25 +0000 (10:55 -0500)]
whoops; missing changes file for 14013
Nick Mathewson [Mon, 22 Dec 2014 20:58:49 +0000 (15:58 -0500)]
Merge remote-tracking branch 'public/bug14013_024' into maint-0.2.5
Nick Mathewson [Mon, 22 Dec 2014 17:56:35 +0000 (12:56 -0500)]
When decoding a base-{16,32,64} value, clear the target buffer first
This is a good idea in case the caller stupidly doesn't check the
return value from baseX_decode(), and as a workaround for the
current inconsistent API of base16_decode.
Prevents any fallout from bug 14013.
Nick Mathewson [Mon, 24 Nov 2014 14:19:06 +0000 (09:19 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Mon, 24 Nov 2014 14:18:36 +0000 (09:18 -0500)]
Merge remote-tracking branch 'karsten/geoip6-nov2014' into maint-0.2.4
Nick Mathewson [Mon, 24 Nov 2014 14:18:21 +0000 (09:18 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Karsten Loesing [Mon, 24 Nov 2014 13:23:18 +0000 (14:23 +0100)]
Update geoip6 to the November 15 2014 database.
Karsten Loesing [Mon, 24 Nov 2014 13:21:31 +0000 (14:21 +0100)]
Update geoip to the November 15 2014 database.
Nick Mathewson [Wed, 19 Nov 2014 22:26:42 +0000 (17:26 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Micah Anderson [Wed, 19 Nov 2014 22:22:25 +0000 (17:22 -0500)]
Update longclaw dirauth IP to be a more stable location
Nick Mathewson [Wed, 12 Nov 2014 20:29:39 +0000 (15:29 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Conflicts:
src/or/config.c
Sebastian Hahn [Wed, 12 Nov 2014 18:12:18 +0000 (19:12 +0100)]
Add changes file for #13926
Micah Anderson [Sun, 9 Nov 2014 20:49:11 +0000 (15:49 -0500)]
Remove turtles as a directory authority (#13296)
Micah Anderson [Sun, 9 Nov 2014 20:48:56 +0000 (15:48 -0500)]
Add longclaw as a directory authority (#13296)
Nick Mathewson [Fri, 24 Oct 2014 13:22:58 +0000 (09:22 -0400)]
bump version to 0.2.5.10-dev
Nick Mathewson [Mon, 20 Oct 2014 14:32:09 +0000 (10:32 -0400)]
bump maint-0.2.5 to 0.2.5.9-rc-dev
Nick Mathewson [Mon, 20 Oct 2014 14:31:20 +0000 (10:31 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Mon, 20 Oct 2014 14:29:16 +0000 (10:29 -0400)]
Whoops, bump the version properly.
Nick Mathewson [Mon, 20 Oct 2014 14:24:21 +0000 (10:24 -0400)]
bump maint-0.2.4 to 0.2.4.25-dev
Nick Mathewson [Sun, 19 Oct 2014 19:40:07 +0000 (15:40 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Sun, 19 Oct 2014 19:39:48 +0000 (15:39 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Sun, 19 Oct 2014 19:38:44 +0000 (15:38 -0400)]
Note that our #13426 fix is also a #13471 fix.
See also http://marc.info/?l=openssl-dev&m=
141357408522028 &w=2
Nick Mathewson [Thu, 16 Oct 2014 17:04:11 +0000 (13:04 -0400)]
Downgrade 'unexpected sendme cell from client' to PROTOCOL_WARN
Closes 8093.
Nick Mathewson [Thu, 16 Oct 2014 13:08:52 +0000 (09:08 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Thu, 16 Oct 2014 13:08:32 +0000 (09:08 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Thu, 16 Oct 2014 13:08:09 +0000 (09:08 -0400)]
Merge branch 'no_sslv3_023' into maint-0.2.3
Nick Mathewson [Wed, 15 Oct 2014 15:50:05 +0000 (11:50 -0400)]
Disable SSLv3 unconditionally. Closes ticket 13426.
The POODLE attack doesn't affect Tor, but there's no reason to tempt
fate: SSLv3 isn't going to get any better.
Nick Mathewson [Fri, 3 Oct 2014 23:57:41 +0000 (19:57 -0400)]
Merge remote-tracking branch 'public/bug13325_024' into maint-0.2.5
Nick Mathewson [Fri, 3 Oct 2014 16:15:09 +0000 (12:15 -0400)]
Run correctly on OpenBSD systems without SSL_METHOD.get_cipher_by_char
Also, make sure we will compile correctly on systems where they
finally rip it out.
Fixes issue #13325. Caused by this openbsd commit:
​http://marc.info/?l=openbsd-cvs&m=
140768179627976 &w=2
Reported by Fredzupy.
Nick Mathewson [Mon, 29 Sep 2014 17:02:35 +0000 (13:02 -0400)]
Merge branch 'bug13295_v2_025' into maint-0.2.5
Nick Mathewson [Mon, 29 Sep 2014 16:57:07 +0000 (12:57 -0400)]
Don't use the getaddrinfo sandbox cache from tor-resolve
Fixes bug 13295; bugfix on 0.2.5.3-alpha.
The alternative here is to call crypto_global_init() from tor-resolve,
but let's avoid linking openssl into tor-resolve for as long as we
can.
Roger Dingledine [Sat, 20 Sep 2014 20:50:32 +0000 (16:50 -0400)]
Merge branch 'maint-0.2.4' into maint-0.2.5
Conflicts:
src/or/config.c
Roger Dingledine [Sat, 20 Sep 2014 20:49:24 +0000 (16:49 -0400)]
Merge branch 'maint-0.2.3' into maint-0.2.4
Sebastian Hahn [Fri, 19 Sep 2014 11:40:37 +0000 (13:40 +0200)]
gabelmoo's IPv4 address changed
Nick Mathewson [Tue, 16 Sep 2014 15:10:02 +0000 (11:10 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Roger Dingledine [Sun, 14 Sep 2014 01:49:37 +0000 (21:49 -0400)]
clients now send correct address for rendezvous point
Clients now send the correct address for their chosen rendezvous point
when trying to access a hidden service. They used to send the wrong
address, which would still work some of the time because they also
sent the identity digest of the rendezvous point, and if the hidden
service happened to try connecting to the rendezvous point from a relay
that already had a connection open to it, the relay would reuse that
connection. Now connections to hidden services should be more robust
and faster. Also, this bug meant that clients were leaking to the hidden
service whether they were on a little-endian (common) or big-endian (rare)
system, which for some users might have reduced their anonymity.
Fixes bug 13151; bugfix on 0.2.1.5-alpha.
Nick Mathewson [Fri, 12 Sep 2014 01:38:32 +0000 (21:38 -0400)]
Bump maint-0.2.5 to 0.2.5.7-rc-dev
Roger Dingledine [Thu, 11 Sep 2014 12:02:37 +0000 (08:02 -0400)]
Reduce log severity for unused ClientTransportPlugin lines
Tor Browser includes several ClientTransportPlugin lines in its
torrc-defaults file, leading every Tor Browser user who looks at her
logs to see these notices and wonder if they're dangerous.
Resolves bug 13124; bugfix on 0.2.5.3-alpha.
Nick Mathewson [Thu, 11 Sep 2014 03:46:20 +0000 (23:46 -0400)]
In routerlist_assert_ok(), check r2 before taking &(r2->cache_info)
Technically, we're not allowed to take the address of a member can't
exist relative to the null pointer. That makes me wonder how any sane
compliant system implements the offsetof macro, but let's let sleeping
balrogs lie.
Fixes 13096; patch on 0.1.1.9-alpha; patch from "teor", who was using
clang -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error -ftrapv
Nick Mathewson [Thu, 11 Sep 2014 02:12:47 +0000 (22:12 -0400)]
Merge remote-tracking branch 'public/bug12908_025' into maint-0.2.5
Nick Mathewson [Tue, 9 Sep 2014 15:04:54 +0000 (11:04 -0400)]
Merge remote-tracking branch 'andrea/bug12160_025' into maint-0.2.5
Nick Mathewson [Tue, 9 Sep 2014 14:51:39 +0000 (10:51 -0400)]
Merge remote-tracking branch 'public/bug12700_024' into maint-0.2.5
Nick Mathewson [Tue, 9 Sep 2014 14:27:05 +0000 (10:27 -0400)]
Clean up the MVSC nmake files so they work again.
Fixes bug 13081; bugfix on 0.2.5.1-alpha. Patch from "NewEraCracker."
Nick Mathewson [Tue, 9 Sep 2014 14:22:01 +0000 (10:22 -0400)]
Add more escaped() calls in directory.c
Patch from teor to fix 13071.
Nick Mathewson [Mon, 8 Sep 2014 19:15:05 +0000 (15:15 -0400)]
Expand the event_mask field in controller conns to 64 bits
Back in
078d6bcd , we added an event number 0x20, but we didn't make
the event_mask field big enough to compensate.
Patch by "teor". Fixes 13085; bugfix on 0.2.5.1-alpha.
Nick Mathewson [Mon, 8 Sep 2014 19:07:54 +0000 (15:07 -0400)]
Add cscope generated files to .gitignore.
Closes #13092; patch from dgoulet.
Andrea Shepard [Fri, 5 Sep 2014 18:08:46 +0000 (11:08 -0700)]
Correctly update channel local mark when address of incoming connection changes after handshake; fixes bug #12160
rl1987 [Sun, 31 Aug 2014 11:09:06 +0000 (14:09 +0300)]
Documenting reject6 and accept6 ExitPolicy entries in manpage.
Nick Mathewson [Tue, 2 Sep 2014 15:55:53 +0000 (11:55 -0400)]
Fix a number of clang analyzer false-positives
Most of these are in somewhat non-obvious code where it is probably
a good idea to initialize variables and add extra assertions anyway.
Closes 13036. Patches from "teor".
rl1987 [Sun, 31 Aug 2014 11:35:30 +0000 (14:35 +0300)]
Adding changes file.
Nick Mathewson [Fri, 29 Aug 2014 20:44:50 +0000 (16:44 -0400)]
Merge remote-tracking branch 'arma/bug12996b' into maint-0.2.5
Roger Dingledine [Fri, 29 Aug 2014 20:38:54 +0000 (16:38 -0400)]
Downgrade "Unexpected onionskin length after decryption" warning
It's now a protocol-warn, since there's nothing relay operators can
do about a client that sends them a malformed create cell.
Resolves bug 12996; bugfix on 0.0.6rc1.
Nick Mathewson [Fri, 29 Aug 2014 20:05:58 +0000 (16:05 -0400)]
Improve "Tried to establish rendezvous on non-OR or non-edge circuit"
Instead of putting it all in one warning message, log what exactly
was wrong with the circuit.
Resolves ticket 12997.
Roger Dingledine [Wed, 27 Aug 2014 10:10:35 +0000 (06:10 -0400)]
Resume expanding abbreviations for command-line options
The fix for bug 4647 accidentally removed our hack from bug 586 that
rewrote HashedControlPassword to __HashedControlSessionPassword when
it appears on the commandline (which allowed the user to set her own
HashedControlPassword in the torrc file while the controller generates
a fresh session password for each run).
Fixes bug 12948; bugfix on 0.2.5.1-alpha.
Sathyanarayanan Gunasekaran [Tue, 22 Jul 2014 04:16:58 +0000 (21:16 -0700)]
Warn if Tor is a relay and a HS
Closes 12908; see #8742
Nick Mathewson [Mon, 18 Aug 2014 17:19:43 +0000 (13:19 -0400)]
Fix relay_command_to_string(); solve 12700.
Two bugs here:
1) We didn't add EXTEND2/EXTENDED2 to relay_command_to_string().
2) relay_command_to_string() didn't log the value of unrecognized
commands.
Both fixed here.
Nick Mathewson [Mon, 18 Aug 2014 14:19:05 +0000 (10:19 -0400)]
Fix windows warning introduced by
0808ed83f9cf312abe229
This will fix the warning
"/src/or/config.c:6854:48: error: unused parameter 'group_readable'"
that I introduced while fixing 12864.
Bug not in any released version of Tor.
Nick Mathewson [Fri, 15 Aug 2014 21:40:13 +0000 (17:40 -0400)]
Merge remote-tracking branch 'asn/nickm-bug12864_025' into maint-0.2.5
George Kadianakis [Fri, 15 Aug 2014 20:12:06 +0000 (23:12 +0300)]
Some documentation fixes for #12864.
Nick Mathewson [Fri, 15 Aug 2014 13:34:10 +0000 (09:34 -0400)]
Remove stale printfs from buffer/zlib_fin_at_chunk_end test
These got committed by mistake.
Nick Mathewson [Fri, 15 Aug 2014 12:32:54 +0000 (08:32 -0400)]
Documentation fix on arguments to CookieAuthFileGroupReadable
We don't actually allow a group name, but the documentation implied
that we did.
Nick Mathewson [Fri, 15 Aug 2014 12:30:44 +0000 (08:30 -0400)]
Restore functionality for CookieAuthFileGroupReadable.
When we merged the cookieauthfile creation logic in
33c3e60a37 , we
accidentally took out this feature. Fixes bug 12864, bugfix on
0.2.5.1-alpha.
Also adds an ExtORPortCookieAuthFileGroupReadable, since there's no
reason not to.
Nick Mathewson [Thu, 14 Aug 2014 03:14:28 +0000 (23:14 -0400)]
Merge remote-tracking branch 'public/bug12848_024' into maint-0.2.5
Conflicts:
src/or/circuitbuild.c
Nick Mathewson [Wed, 13 Aug 2014 19:11:00 +0000 (15:11 -0400)]
Apply an MSVC compilation fix from Gisle Vanem
This fixes a double-define introduced in
28538069b2f1909a7600ec6d
Nick Mathewson [Wed, 13 Aug 2014 16:52:40 +0000 (12:52 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Nick Mathewson [Wed, 13 Aug 2014 16:51:38 +0000 (12:51 -0400)]
Merge remote-tracking branch 'karsten/geoip6-aug2014' into maint-0.2.4
Nick Mathewson [Wed, 13 Aug 2014 16:51:27 +0000 (12:51 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Karsten Loesing [Wed, 13 Aug 2014 14:16:11 +0000 (16:16 +0200)]
Update geoip6 to the August 7 2014 database.
Karsten Loesing [Wed, 13 Aug 2014 14:08:33 +0000 (16:08 +0200)]
Update geoip to the August 7 2014 database.
Nick Mathewson [Tue, 12 Aug 2014 16:15:09 +0000 (12:15 -0400)]
Fix another case of 12848 in circuit_handle_first_hop
I looked for other places where we set circ->n_chan early, and found
one in circuit_handle_first_hop() right before it calls
circuit_send_next_onion_skin(). If onion_skin_create() fails there,
then n_chan will still be set when circuit_send_next_onion_skin()
returns. We should probably fix that too.
Nick Mathewson [Tue, 12 Aug 2014 16:14:05 +0000 (12:14 -0400)]
Add an extra check in channel_send_destroy for circID==0
Prevents other cases of 12848.
Nick Mathewson [Tue, 12 Aug 2014 16:10:57 +0000 (12:10 -0400)]
Don't send DESTROY to circID 0 when circuit_deliver_create_cell fails
Cypherpunks found this and wrote this patch.
Fix for 12848; fix on (I think)
d58d4c0d , which went into 0.0.8pre1
Nick Mathewson [Sat, 9 Aug 2014 19:57:06 +0000 (15:57 -0400)]
Fix some URLs in the README
patch from mttp; fixes 12830
Roger Dingledine [Sat, 9 Aug 2014 19:40:40 +0000 (15:40 -0400)]
fix extra words in man page
Roger Dingledine [Tue, 5 Aug 2014 20:54:46 +0000 (16:54 -0400)]
Build circuits more readily when DisableNetwork goes to 0
When Tor starts with DisabledNetwork set, it would correctly
conclude that it shouldn't try making circuits, but it would
mistakenly cache this conclusion and continue believing it even
when DisableNetwork is set to 0. Fixes the bug introduced by the
fix for bug 11200; bugfix on 0.2.5.4-alpha.
Roger Dingledine [Wed, 6 Aug 2014 06:20:51 +0000 (02:20 -0400)]
fix three typos in comments
Nick Mathewson [Wed, 30 Jul 2014 18:00:21 +0000 (14:00 -0400)]
Merge remote-tracking branch 'intrigeri/bug12731-systemd-no-run-as-daemon' into maint-0.2.5
Conflicts:
contrib/dist/tor.service.in
Nick Mathewson [Wed, 30 Jul 2014 17:59:39 +0000 (13:59 -0400)]
Merge remote-tracking branch 'intrigeri/bug12730-systemd-verify-config' into maint-0.2.5
intrigeri [Tue, 29 Jul 2014 12:13:01 +0000 (12:13 +0000)]
Verify configuration file via ExecStartPre in the systemd unit file (#12730).
intrigeri [Tue, 29 Jul 2014 12:23:04 +0000 (12:23 +0000)]
Explicitly disable RunAsDaemon in the systemd unit file (#12731).
Our current systemd unit uses "Type = simple", so systemd does not expect tor to
fork. If the user has "RunAsDaemon 1" in their torrc, then things won't work as
expected. This is e.g. the case on Debian (and derivatives), since there we pass
"--defaults-torrc /usr/share/tor/tor-service-defaults-torrc" (that contains
"RunAsDaemon 1") by default.
The only solution I could find is to explicitly pass "--RunAsDaemon 0" when
starting tor from the systemd unit file, which this commit does.
Roger Dingledine [Mon, 28 Jul 2014 08:13:18 +0000 (04:13 -0400)]
bump to 0.2.5.6-alpha
Roger Dingledine [Mon, 28 Jul 2014 08:09:37 +0000 (04:09 -0400)]
Merge branch 'maint-0.2.4' into maint-0.2.5