]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Fri, 19 Jun 2015 13:10:03 +0000 (09:10 -0400)]
Merge remote-tracking branch 'dgoulet/rendcache_027_01'
Nick Mathewson [Fri, 19 Jun 2015 13:03:25 +0000 (09:03 -0400)]
fix some memory leaks that coverity found
David Goulet [Thu, 18 Jun 2015 15:23:08 +0000 (11:23 -0400)]
Move cache objects and functions to rendcache.{c|h}
Every functions and objects that are used for hidden service descriptor
caches are moved to rendcache.{c|h}.
This commit does NOT change anything, just moving code around.
Fixes #16399
Signed-off-by: David Goulet <dgoulet@ev0ke.net>
David Goulet [Thu, 18 Jun 2015 15:00:10 +0000 (11:00 -0400)]
Add rendcache.{c|h}
For now, rend_cache_entry_t has been moved from or.h to rendcache.h and
those files have been added to the build system.
In the next commit, these will contain hidden service descriptor cache ABI
and API for both client and directory side. The goal is to consolidate the
descriptor caches in one location to ease development, maintenance, review
and improve documentation for each cache behavior and algorithm.
Signed-off-by: David Goulet <dgoulet@ev0ke.net>
Nick Mathewson [Thu, 18 Jun 2015 15:33:24 +0000 (11:33 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Thu, 18 Jun 2015 15:30:01 +0000 (11:30 -0400)]
Merge remote-tracking branch 'dgoulet/bug16381_026_01-revert' into maint-0.2.6
Nick Mathewson [Wed, 17 Jun 2015 17:51:45 +0000 (13:51 -0400)]
Handle "keygen" if datadir does not yet exist
Nick Mathewson [Wed, 17 Jun 2015 17:01:39 +0000 (13:01 -0400)]
add test-memwipe to .gitignore
Nick Mathewson [Wed, 17 Jun 2015 15:31:53 +0000 (11:31 -0400)]
Fix an unchecked-case warning on windows
Nick Mathewson [Wed, 17 Jun 2015 14:51:39 +0000 (10:51 -0400)]
changes file for 13642
Nick Mathewson [Wed, 17 Jun 2015 14:12:37 +0000 (10:12 -0400)]
Merge branch '13642_offline_master_v2_squashed'
Nick Mathewson [Sun, 1 Mar 2015 15:40:02 +0000 (16:40 +0100)]
Support encrypted offline master keys with a new --keygen flag
When --keygen is provided, we prompt for a passphrase when we make a
new master key; if it is nonempty, we store the secret key in a new
crypto_pwbox.
Also, if --keygen is provided and there *is* an encrypted master key,
we load it and prompt for a passphrase unconditionally.
We make a new signing key unconditionally when --keygen is provided.
We never overwrite a master key.
Nick Mathewson [Sun, 1 Mar 2015 14:35:36 +0000 (15:35 +0100)]
Add a tor_getpass to read passphrases. Needs better backend.
David Goulet [Tue, 16 Jun 2015 14:29:29 +0000 (10:29 -0400)]
Extend intro point to a 4th hop on cannibalization
Fixes #16260
Signed-off-by: David Goulet <dgoulet@ev0ke.net>
Nick Mathewson [Wed, 17 Jun 2015 13:19:11 +0000 (09:19 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Wed, 17 Jun 2015 13:18:45 +0000 (09:18 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5' into maint-0.2.6
teor [Sat, 13 Jun 2015 11:28:02 +0000 (21:28 +1000)]
Correctly handle failed crypto_early_init
If crypto_early_init fails, a typo in a return value from tor_init
means that tor_main continues running, rather than returning
an error value.
Fixes bug 16360; bugfix on
d3fb846d8c98 in 0.2.5.2-alpha,
introduced when implementing #4900.
Patch by "teor".
David Goulet [Tue, 16 Jun 2015 17:16:34 +0000 (13:16 -0400)]
Revert "Do not replace a HS descriptor with a different replica of itself"
This reverts commit
9407040c592184e05e45a3c1a00739c2dd302288 .
Small fix, "e->received" had to be removed since that variable doesn't exist
anymore.
Signed-off-by: David Goulet <dgoulet@ev0ke.net>
teor [Mon, 15 Jun 2015 17:11:09 +0000 (03:11 +1000)]
Document the consensus download interval used by hidden services
In the comments in update_consensus_networkstatus_fetch_time_impl
in networkstatus.c
teor [Mon, 15 Jun 2015 17:10:44 +0000 (03:10 +1000)]
Fix spacing in tortls.c
Nick Mathewson [Mon, 15 Jun 2015 14:19:46 +0000 (10:19 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Mon, 15 Jun 2015 14:19:32 +0000 (10:19 -0400)]
Merge commit '
1eb2c0cbd3a9be2650419bd07474770629261f56 '
This is an 'ours' merge to leave the version number alone.
Nick Mathewson [Mon, 15 Jun 2015 14:13:11 +0000 (10:13 -0400)]
Fix another seccomp2 issue
Allow pipe() and pipe2() syscalls; we need these when eventfd2()
support is missing. Fixes bug 16363; bugfix on 0.2.6.3-alpha. Patch
from "teor".
Nick Mathewson [Thu, 11 Jun 2015 14:24:28 +0000 (10:24 -0400)]
Merge remote-tracking branch 'teor/feature15817-clang-sanitizers'
Nick Mathewson [Thu, 11 Jun 2015 13:55:47 +0000 (09:55 -0400)]
Add a log message to try to track down #16013
Nick Mathewson [Wed, 10 Jun 2015 18:09:36 +0000 (14:09 -0400)]
Spell occurred right
Nick Mathewson [Wed, 10 Jun 2015 17:58:20 +0000 (13:58 -0400)]
fwd-port 0.2.6.9 changes
Nick Mathewson [Wed, 10 Jun 2015 16:40:32 +0000 (12:40 -0400)]
Merge remote-tracking branch 'teor/bug16343-master-key-assert'
teor [Wed, 10 Jun 2015 15:06:15 +0000 (01:06 +1000)]
Fix clang address of struct member always non-NULL in SSL master key
clang complains that the address of struct member in an assert in
SSL_SESSION_get_master_key is always non-NULL.
Instead, check each pointer argument is non-NULL before using it.
Fix on
f90a704f1258 from 27 May 2015, not in any released version of tor.
Andrea Shepard [Wed, 10 Jun 2015 15:05:52 +0000 (15:05 +0000)]
Update and clarify release checklist
Andrea Shepard [Wed, 10 Jun 2015 14:58:33 +0000 (14:58 +0000)]
Bump version to 0.2.6.9
teor [Wed, 10 Jun 2015 14:59:04 +0000 (00:59 +1000)]
Tweak clang sanitizer blacklist for out-of-tree builds, make, ccache
Avoid using file names and file paths for compatibility with
out-of-tree builds.
Note make and ccache don't track blacklist dependencies,
add workarounds.
Nick Mathewson [Mon, 8 Jun 2015 14:57:25 +0000 (10:57 -0400)]
Merge remote-tracking branch 'teor/feature15817-clang-sanitizers'
Nick Mathewson [Mon, 8 Jun 2015 14:33:38 +0000 (10:33 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
David Goulet [Mon, 11 May 2015 15:27:30 +0000 (11:27 -0400)]
HSDir flag now requires the Stable flag
Fixes #8243
teor [Fri, 5 Jun 2015 21:56:41 +0000 (07:56 +1000)]
Edit contrib/README to document the contrib/clang directory
teor [Fri, 5 Jun 2015 18:04:23 +0000 (04:04 +1000)]
Add instructions for clang sanitizers, static analyzer, and coverity
Document use of coverity, clang static analyzer, and clang dynamic
undefined behavior and address sanitizers in doc/HACKING.
Add clang dynamic sanitizer blacklist in
contrib/clang/sanitizer_blacklist.txt to exempt known undefined
behavior. Include detailed usage instructions in this blacklist file.
Patch by "teor".
Nick Mathewson [Thu, 4 Jun 2015 19:02:47 +0000 (15:02 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
Yawning Angel [Thu, 4 Jun 2015 13:53:35 +0000 (13:53 +0000)]
Set session_group after the port's data structure has been populated.
Fixes #16247, patch by "jojelino".
Nick Mathewson [Tue, 2 Jun 2015 19:08:14 +0000 (15:08 -0400)]
Merge remote-tracking branch 'public/bug15760_hard_026_v2'
Yawning Angel [Tue, 2 Jun 2015 18:58:57 +0000 (18:58 +0000)]
A few more minor OpenSSL 1.1 fixes.
* Use `TLS_method()` instead of the deprecated `SSLv23_method()`
* Fix one missed conversion to `SSL_CIPHER_get_id()`
Nick Mathewson [Tue, 2 Jun 2015 18:51:13 +0000 (14:51 -0400)]
Merge remote-tracking branch 'teor/bug16115-minor-fixes'
Nick Mathewson [Tue, 2 Jun 2015 18:29:37 +0000 (14:29 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
Peter Palfrader [Tue, 2 Jun 2015 18:06:49 +0000 (20:06 +0200)]
Fix sandboxing to work when running as a relay
This includes correctly allowing renaming secret_id_key and allowing the
eventfd2 and futex syscalls. Fixes bug 16244; bugfix on 0.2.6.1-alpha.
teor [Tue, 2 Jun 2015 17:58:28 +0000 (03:58 +1000)]
Check for NULL values in getinfo_helper_onions
Fix on
915c7438a77e in Tor 0.2.7.1-alpha.
teor [Tue, 2 Jun 2015 17:56:05 +0000 (03:56 +1000)]
Ensure signing_key is non-NULL before accessing one of its members
signing_key can be NULL in ed_key_init_from_file in routerkeys.c.
Discovered by clang 3.7 address sanitizer.
Fix on
c03694938ed0 , not in any released version of Tor.
teor [Tue, 2 Jun 2015 17:52:31 +0000 (03:52 +1000)]
Remove undefined directive-in-macro in test_util_writepid
clang 3.7 complains that using a preprocessor directive inside
a macro invocation in test_util_writepid in test_util.c is undefined.
Fix on
79e85313aa61 on 0.2.7.1-alpha.
teor [Tue, 2 Jun 2015 17:48:46 +0000 (03:48 +1000)]
Always initialise return value in compute_desc_id in rendcommon.c
Fix on
e6a581f126ba , released in 0.2.7.1-alpha.
teor [Tue, 2 Jun 2015 17:43:46 +0000 (03:43 +1000)]
Silence unused variable warnings in find_cipher_by_id
Unused variable warnings were still generated under some versions of OpenSSL.
Instead, make sure all variables are used under all versions.
Fix on
496df21c89d1 , not in any released version of tor.
teor [Tue, 2 Jun 2015 17:39:34 +0000 (03:39 +1000)]
Fix an incorrect comment on spawn_func
spawn_func calls pthread_create on unix, not fork
Fix on existing code split out of compat.c into
compat_pthreads.c in
c2f0d52b7fb9
Nick Mathewson [Tue, 2 Jun 2015 17:45:27 +0000 (13:45 -0400)]
Merge remote-tracking branch 'public/bug15760_hard_026_v2'
Conflicts:
src/common/tortls.c
Nick Mathewson [Tue, 2 Jun 2015 17:27:55 +0000 (13:27 -0400)]
Use autoconf, not OPENSSL_VERSION_NUMBER, to detect SSL_CIPHER_find
Repairs build with libressl
Nick Mathewson [Tue, 26 May 2015 16:09:53 +0000 (12:09 -0400)]
Use accessor functions for client_random/server_random/master_key
If OpenSSL accepts my patch to introduce these functions, they'll
be a way to help Tor work with OpenSSL 1.1.
Nick Mathewson [Mon, 1 Jun 2015 15:24:55 +0000 (11:24 -0400)]
Add a master-key-
ed25519 line for convenience
Nick Mathewson [Mon, 1 Jun 2015 14:56:54 +0000 (10:56 -0400)]
More check-spaces fixes
Nick Mathewson [Mon, 1 Jun 2015 14:45:51 +0000 (10:45 -0400)]
Fix a memory leak in routerkeys.c
Nick Mathewson [Mon, 1 Jun 2015 14:26:11 +0000 (10:26 -0400)]
Fix some memory leaks in
ed25519 code and tests
Andrea Shepard [Mon, 1 Jun 2015 12:59:14 +0000 (12:59 +0000)]
Appease make check-spaces
Sharif Olorin [Sat, 30 May 2015 06:03:50 +0000 (06:03 +0000)]
Fix return-type gcc warning
find_dl_schedule_and_len caused gcc to spit up with -Werror.
Signed-off-by: Sharif Olorin <sio@tesser.org>
Nick Mathewson [Fri, 29 May 2015 20:17:54 +0000 (16:17 -0400)]
Another memory leak bytes the dust.
Nick Mathewson [Fri, 29 May 2015 18:38:59 +0000 (14:38 -0400)]
Attempt to fix keypinning on Windows
Not that I would countenance a directory authority on Windows, but
it would be nice if the unit tests passed.
Nick Mathewson [Fri, 29 May 2015 18:09:11 +0000 (14:09 -0400)]
Fix another int-to-ptr cast.
Nick Mathewson [Fri, 29 May 2015 18:08:51 +0000 (14:08 -0400)]
Fix a warning from the clangalyzer.
Nick Mathewson [Fri, 29 May 2015 17:50:12 +0000 (13:50 -0400)]
Fix a sizeof(ptr) mistake in test-memwipe.c
Nick Mathewson [Fri, 29 May 2015 17:50:05 +0000 (13:50 -0400)]
more generic scan-build script
Nick Mathewson [Thu, 28 May 2015 18:06:01 +0000 (14:06 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Thu, 28 May 2015 18:05:46 +0000 (14:05 -0400)]
Fix sandbox use with systemd. bug 16212.
Nick Mathewson [Thu, 28 May 2015 17:23:09 +0000 (13:23 -0400)]
Avoid double-free on rend_add_service() failure
Rend_add_service() frees its argument on failure; no need to free again.
Fixes bug 16228, bugfix on 0.2.7.1-alpha
Found by coverity; this is CID
1301387 .
Nick Mathewson [Thu, 28 May 2015 17:17:24 +0000 (13:17 -0400)]
There sure are a lot of these in test_hs.c. CID
1301385
Nick Mathewson [Thu, 28 May 2015 17:14:30 +0000 (13:14 -0400)]
Fix a bug in earlier torcert fix, fix another.
Nick Mathewson [Thu, 28 May 2015 17:13:15 +0000 (13:13 -0400)]
Another test_hs leak. CID
1301383 .
Nick Mathewson [Thu, 28 May 2015 17:11:54 +0000 (13:11 -0400)]
Memory leak in tor_cert_parse. CID
1301382 .
Nick Mathewson [Thu, 28 May 2015 17:09:00 +0000 (13:09 -0400)]
Memory leak in tor_cert_parse. CID gi1301381
Nick Mathewson [Thu, 28 May 2015 17:06:30 +0000 (13:06 -0400)]
Fix leak-on-test-failure in test_routerkeys.c
CID
1301379
Nick Mathewson [Thu, 28 May 2015 17:01:48 +0000 (13:01 -0400)]
Memory leak in test_hs_rend_data
CID
1301377
Nick Mathewson [Thu, 28 May 2015 17:00:25 +0000 (13:00 -0400)]
Fix memory leak in test_routerkeys
CID
1301376
Nick Mathewson [Thu, 28 May 2015 16:52:34 +0000 (12:52 -0400)]
Small leak in ed_key_init_from_file. CID
1301373
Nick Mathewson [Thu, 28 May 2015 16:51:20 +0000 (12:51 -0400)]
Memory leak on error in connection_or_compute_auth_cell_body. CID
1301372
Nick Mathewson [Thu, 28 May 2015 16:49:39 +0000 (12:49 -0400)]
fix memory leak on bad ns convote. CID
1301371 .
Nick Mathewson [Thu, 28 May 2015 16:47:31 +0000 (12:47 -0400)]
Fix memory leak on failure to generate EI. CID
1301370 .
Nick Mathewson [Thu, 28 May 2015 16:46:06 +0000 (12:46 -0400)]
Fix null dereference on key setup error.
CID
1301369
Nick Mathewson [Thu, 28 May 2015 16:44:52 +0000 (12:44 -0400)]
Update trunnel code.
This gets the minor change in trunnel 1.4.1, which should avoid
deadcode warnings from Coverity.
Nick Mathewson [Thu, 28 May 2015 16:41:00 +0000 (12:41 -0400)]
Avoid dereferencing null on unit test failure for link handshakes.
This fixes CID
1301368 -- found by coverity
Nick Mathewson [Thu, 28 May 2015 16:30:25 +0000 (12:30 -0400)]
Fix a bug when we fail to read a cert from a file.
Found by coverity -- CID
1301366 .
Nick Mathewson [Thu, 28 May 2015 16:27:22 +0000 (12:27 -0400)]
Add assertions to crypto_dh_dup()
Without these, coverity is annoyed that aren't checking for NULL in bench.c
CID
1293335 -- found by coverity.
Nick Mathewson [Thu, 28 May 2015 16:24:29 +0000 (12:24 -0400)]
Impose an upper limit on threads per threadpool.
Found by Coverity; Fixes CID
1268069
Nick Mathewson [Thu, 28 May 2015 15:40:20 +0000 (11:40 -0400)]
Bug 12498 needs a changes file.
Nick Mathewson [Thu, 28 May 2015 15:04:33 +0000 (11:04 -0400)]
Merge branch '12498_ed25519_keys_v6'
Fixed numerous conflicts, and ported code to use new base64 api.
Nick Mathewson [Thu, 28 May 2015 14:18:42 +0000 (10:18 -0400)]
Document some
ed25519 key options
Nick Mathewson [Tue, 26 May 2015 20:09:34 +0000 (16:09 -0400)]
Note some functions that should move or be merged
Nick Mathewson [Fri, 15 May 2015 15:09:10 +0000 (11:09 -0400)]
Do not allocate our ed-link crosscert till after tls ctx
We need this to prevent some annoying chutney crash-at-starts
Nick Mathewson [Thu, 28 May 2015 14:47:42 +0000 (10:47 -0400)]
Generate weird certificates correctly
(Our link protocol assumes that the link cert certifies the TLS key,
and there is an RSA->
Ed25519 crosscert)
Nick Mathewson [Thu, 28 May 2015 14:44:09 +0000 (10:44 -0400)]
Regenerate
ed25519 keys when they will expire soon.
Also, have testing-level options to set the lifetimes and
expiration-tolerances of all key types, plus a non-testing-level
option to set the lifetime of any auto-generated signing key.
Nick Mathewson [Sun, 1 Mar 2015 13:36:40 +0000 (14:36 +0100)]
# This is a combination of 2 commits.
# The first commit's message is:
Regenerate
ed25519 keys when they will expire soon.
Also, have testing-level options to set the lifetimes and
expiration-tolerances of all key types, plus a non-testing-level
option to set the lifetime of any auto-generated signing key.
# The 2nd commit message will be skipped:
# fixup! Regenerate
ed25519 keys when they will expire soon.
Nick Mathewson [Sun, 1 Mar 2015 13:05:00 +0000 (14:05 +0100)]
Only load master
ed25519 secret keys when we absolutely must.
Nick Mathewson [Thu, 13 Nov 2014 15:03:55 +0000 (10:03 -0500)]
Implement
ed25519 identity collation for voting.
This is a new collator type that follows proposal 220 for deciding
which identities to include. The rule is (approximately):
If a <ed,rsa> identity is listed by more than half of authorities,
include it. And include all <rsa> votes about that node as
matching.
Otherwise, if an <*,rsa> or <rsa> identity is listed by more than
half of the authorities, and no <ed,rsa> has been listed, include
it.
Nick Mathewson [Wed, 12 Nov 2014 19:29:05 +0000 (14:29 -0500)]
Refactor code that matches up routers with the same identity in votes
This makes 'routerstatus collation' into a first-class concept, so
we can change how that works for prop220.
Nick Mathewson [Wed, 29 Oct 2014 17:36:21 +0000 (13:36 -0400)]
Checkpoint some work on voting on
ed25519 identities
* Include
ed25519 identities in votes
* Include "no
ed25519 identity" in votes
* Include some commented-out code about identity voting. (This
will disappear.)
* Include some functions for identity voting (These will disappear.)
* Enforce uniqueness in
ed25519 keys within a vote
Nick Mathewson [Fri, 24 Oct 2014 13:19:49 +0000 (09:19 -0400)]
Enforce more correspondence between ri and ei
In particular, they have to list the same
ed25519 certificate, and
the SHA256 digest of the ei needs to match.
Nick Mathewson [Thu, 28 May 2015 14:42:22 +0000 (10:42 -0400)]
Sign extrainfo documents with
ed25519
Extrainfo documents are now ed-signed just as are router
descriptors, according to proposal 220. This patch also includes
some more tests for successful/failing parsing, and fixes a crash
bug in
ed25519 descriptor parsing.