]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
10 years agoFix a bug when we fail to read a cert from a file.
Nick Mathewson [Thu, 28 May 2015 16:30:25 +0000 (12:30 -0400)] 
Fix a bug when we fail to read a cert from a file.

Found by coverity -- CID 1301366.

10 years agoAdd assertions to crypto_dh_dup()
Nick Mathewson [Thu, 28 May 2015 16:27:22 +0000 (12:27 -0400)] 
Add assertions to crypto_dh_dup()

Without these, coverity is annoyed that aren't checking for NULL in bench.c

CID 1293335 -- found by coverity.

10 years agoImpose an upper limit on threads per threadpool.
Nick Mathewson [Thu, 28 May 2015 16:24:29 +0000 (12:24 -0400)] 
Impose an upper limit on threads per threadpool.

Found by Coverity; Fixes CID 1268069

10 years agoBug 12498 needs a changes file.
Nick Mathewson [Thu, 28 May 2015 15:40:20 +0000 (11:40 -0400)] 
Bug 12498 needs a changes file.

10 years agoMerge branch '12498_ed25519_keys_v6'
Nick Mathewson [Thu, 28 May 2015 15:04:33 +0000 (11:04 -0400)] 
Merge branch '12498_ed25519_keys_v6'

Fixed numerous conflicts, and ported code to use new base64 api.

10 years agoDocument some ed25519 key options
Nick Mathewson [Thu, 28 May 2015 14:18:42 +0000 (10:18 -0400)] 
Document some ed25519 key options

10 years agoNote some functions that should move or be merged
Nick Mathewson [Tue, 26 May 2015 20:09:34 +0000 (16:09 -0400)] 
Note some functions that should move or be merged

10 years agoDo not allocate our ed-link crosscert till after tls ctx
Nick Mathewson [Fri, 15 May 2015 15:09:10 +0000 (11:09 -0400)] 
Do not allocate our ed-link crosscert till after tls ctx

We need this to prevent some annoying chutney crash-at-starts

10 years agoGenerate weird certificates correctly
Nick Mathewson [Thu, 28 May 2015 14:47:42 +0000 (10:47 -0400)] 
Generate weird certificates correctly

(Our link protocol assumes that the link cert certifies the TLS key,
and there is an RSA->Ed25519 crosscert)

10 years agoRegenerate ed25519 keys when they will expire soon.
Nick Mathewson [Thu, 28 May 2015 14:44:09 +0000 (10:44 -0400)] 
Regenerate ed25519 keys when they will expire soon.

Also, have testing-level options to set the lifetimes and
expiration-tolerances of all key types, plus a non-testing-level
option to set the lifetime of any auto-generated signing key.

10 years ago# This is a combination of 2 commits.
Nick Mathewson [Sun, 1 Mar 2015 13:36:40 +0000 (14:36 +0100)] 
# This is a combination of 2 commits.
# The first commit's message is:

Regenerate ed25519 keys when they will expire soon.

Also, have testing-level options to set the lifetimes and
expiration-tolerances of all key types, plus a non-testing-level
option to set the lifetime of any auto-generated signing key.

# The 2nd commit message will be skipped:

# fixup! Regenerate ed25519 keys when they will expire soon.

10 years agoOnly load master ed25519 secret keys when we absolutely must.
Nick Mathewson [Sun, 1 Mar 2015 13:05:00 +0000 (14:05 +0100)] 
Only load master ed25519 secret keys when we absolutely must.

10 years agoImplement ed25519 identity collation for voting.
Nick Mathewson [Thu, 13 Nov 2014 15:03:55 +0000 (10:03 -0500)] 
Implement ed25519 identity collation for voting.

This is a new collator type that follows proposal 220 for deciding
which identities to include.  The rule is (approximately):

  If a <ed,rsa> identity is listed by more than half of authorities,
  include it.  And include all <rsa> votes about that node as
  matching.

  Otherwise, if an <*,rsa> or <rsa> identity is listed by more than
  half of the authorities, and no <ed,rsa> has been listed, include
  it.

10 years agoRefactor code that matches up routers with the same identity in votes
Nick Mathewson [Wed, 12 Nov 2014 19:29:05 +0000 (14:29 -0500)] 
Refactor code that matches up routers with the same identity in votes

This makes 'routerstatus collation' into a first-class concept, so
we can change how that works for prop220.

10 years agoCheckpoint some work on voting on ed25519 identities
Nick Mathewson [Wed, 29 Oct 2014 17:36:21 +0000 (13:36 -0400)] 
Checkpoint some work on voting on ed25519 identities

 * Include ed25519 identities in votes
 * Include "no ed25519 identity" in votes
 * Include some commented-out code about identity voting.  (This
   will disappear.)
 * Include some functions for identity voting (These will disappear.)
 * Enforce uniqueness in ed25519 keys within a vote

10 years agoEnforce more correspondence between ri and ei
Nick Mathewson [Fri, 24 Oct 2014 13:19:49 +0000 (09:19 -0400)] 
Enforce more correspondence between ri and ei

In particular, they have to list the same ed25519 certificate, and
the SHA256 digest of the ei needs to match.

10 years agoSign extrainfo documents with ed25519
Nick Mathewson [Thu, 28 May 2015 14:42:22 +0000 (10:42 -0400)] 
Sign extrainfo documents with ed25519

Extrainfo documents are now ed-signed just as are router
descriptors, according to proposal 220.  This patch also includes
some more tests for successful/failing parsing, and fixes a crash
bug in ed25519 descriptor parsing.

10 years agoRevise makedesc.py: teach it how to emit ed signatures and crosscerts
Nick Mathewson [Wed, 22 Oct 2014 18:19:18 +0000 (14:19 -0400)] 
Revise makedesc.py: teach it how to emit ed signatures and crosscerts

Also, add a trivial ed25519-signed routerinfo to the tests.

10 years agoRefactor link handshake cell type implementations to use trunnel
Nick Mathewson [Fri, 17 Oct 2014 21:06:31 +0000 (17:06 -0400)] 
Refactor link handshake cell type implementations to use trunnel

Unit tests still pass.

10 years agoFix memory leaks in test_link_handshake.c
Nick Mathewson [Fri, 17 Oct 2014 20:30:42 +0000 (16:30 -0400)] 
Fix memory leaks in test_link_handshake.c

10 years agoTests for AUTHENTICATE cell functionality.
Nick Mathewson [Thu, 16 Oct 2014 13:07:50 +0000 (09:07 -0400)] 
Tests for AUTHENTICATE cell functionality.

10 years agoStart testing cell encoders/processers for the v3 handshake.
Nick Mathewson [Wed, 8 Oct 2014 19:39:34 +0000 (15:39 -0400)] 
Start testing cell encoders/processers for the v3 handshake.

An earlier version of these tests was broken; now they're a nicer,
more robust, more black-box set of tests.  The key is to have each
test check a handshake message that is wrong in _one_ way.

10 years agoAdd trunnel-generated items for link handshake code.
Nick Mathewson [Wed, 8 Oct 2014 18:43:33 +0000 (14:43 -0400)] 
Add trunnel-generated items for link handshake code.

This includes the link handshake variations for proposal220.

We'll use this for testing first, and then use it to extend our
current code to support prop220.

10 years agoInclude ed25519 keys in microdescriptors.
Nick Mathewson [Wed, 8 Oct 2014 15:33:59 +0000 (11:33 -0400)] 
Include ed25519 keys in microdescriptors.

10 years agoFix the position-check for ed25519 certs to work with annotations
Nick Mathewson [Wed, 8 Oct 2014 13:13:09 +0000 (09:13 -0400)] 
Fix the position-check for ed25519 certs to work with annotations

When there are annotations on a router descriptor, the
ed25519-identity element won't be at position 0 or 1; it will be at
router+1 or router-1.

This patch also adds a missing smartlist function to search a list for
an item with a particular pointer.

10 years agoTie key-pinning logic into directory authority operation
Nick Mathewson [Wed, 8 Oct 2014 12:32:00 +0000 (08:32 -0400)] 
Tie key-pinning logic into directory authority operation

With this patch:
  * Authorities load the key-pinning log at startup.
  * Authorities open a key-pinning log for writing at startup.
  * Authorities reject any router with an ed25519 key where they have
    previously seen that ed25519 key with a different RSA key, or vice
    versa.
  * Authorities warn about, but *do not* reject, RSA-only descriptors
    when the RSA key has previously gone along with an Ed25519 key.
    (We should make this a 'reject' too, but we can't do that until we're
    sure there's no legit reason to downgrade to 0.2.5.)

10 years agoKey-pinning back-end for directory authorities.
Nick Mathewson [Thu, 2 Oct 2014 19:34:23 +0000 (15:34 -0400)] 
Key-pinning back-end for directory authorities.

This module implements a key-pinning mechanism to ensure that it's
safe to use RSA keys as identitifers even as we migrate to Ed25519
keys.  It remembers, for every Ed25519 key we've seen, what the
associated Ed25519 key is.  This way, if we see a different Ed25519
key with that RSA key, we'll know that there's a mismatch.

We persist these entries to disk using a simple format, where each
line has a base64-encoded RSA SHA1 hash, then a base64-endoded
Ed25519 key.  Empty lines, misformed lines, and lines beginning with
a # are ignored. Lines beginning with @ are reserved for future
extensions.

10 years agoImplement proposal 228: cross-certification with onion keys
Nick Mathewson [Thu, 28 May 2015 14:41:43 +0000 (10:41 -0400)] 
Implement proposal 228: cross-certification with onion keys

Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.

10 years agoImplement proposal 228: cross-certification with onion keys
Nick Mathewson [Wed, 1 Oct 2014 15:54:07 +0000 (11:54 -0400)] 
Implement proposal 228: cross-certification with onion keys

Routers now use TAP and ntor onion keys to sign their identity keys,
and put these signatures in their descriptors.  That allows other
parties to be confident that the onion keys are indeed controlled by
the router that generated the descriptor.

10 years agoImplement ed25519-signed descriptors
Nick Mathewson [Wed, 1 Oct 2014 03:36:47 +0000 (23:36 -0400)] 
Implement ed25519-signed descriptors

Now that we have ed25519 keys, we can sign descriptors with them
and check those signatures as documented in proposal 220.

10 years agoprop220: Implement certificates and key storage/creation
Nick Mathewson [Tue, 30 Sep 2014 20:00:17 +0000 (16:00 -0400)] 
prop220: Implement certificates and key storage/creation

For prop220, we have a new ed25519 certificate type. This patch
implements the code to create, parse, and validate those, along with
code for routers to maintain their own sets of certificates and
keys.  (Some parts of master identity key encryption are done, but
the implementation of that isn't finished)

10 years agoFIx a couple of mistypes.
rl1987 [Tue, 26 May 2015 18:52:26 +0000 (21:52 +0300)] 
FIx a couple of mistypes.

10 years agoMerge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Tue, 26 May 2015 13:41:30 +0000 (09:41 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.6'

10 years agoFix --enable-systemd builds on systems with libsystemd but not systemd
Nick Mathewson [Tue, 26 May 2015 13:39:53 +0000 (09:39 -0400)] 
Fix --enable-systemd builds on systems with libsystemd but not systemd

Fixes bug 16164; bugfix on 0.2.6.3-alpha. Patch from Peter Palfrader.

10 years agoRevert "Try using SSL_get_ciphers in place of session->ciphers"
Nick Mathewson [Fri, 22 May 2015 14:22:11 +0000 (10:22 -0400)] 
Revert "Try using SSL_get_ciphers in place of session->ciphers"

This reverts commit 67964cfa787461bc56380fe46439fd5c9863bb4f.

It was the cause of #16153, and was not in any released Tor.  We need
a better solution for getting session->ciphers.

10 years agoMerge remote-tracking branch 'yawning/ticket16140'
Nick Mathewson [Thu, 21 May 2015 17:20:24 +0000 (13:20 -0400)] 
Merge remote-tracking branch 'yawning/ticket16140'

10 years agoRevert the broken part of 548b4be
Nick Mathewson [Thu, 21 May 2015 17:18:51 +0000 (13:18 -0400)] 
Revert the broken part of 548b4be

Fixes 16152.

10 years agoRemove support for OpenSSL without ECC.
Yawning Angel [Thu, 21 May 2015 17:07:30 +0000 (17:07 +0000)] 
Remove support for OpenSSL without ECC.

As OpenSSL >= 1.0.0 is now required, ECDHE is now mandatory.  The group
has to be validated at runtime, because of RedHat lawyers (P224 support
is entirely missing in the OpenSSL RPM, but P256 is present and is the
default).

Resolves ticket #16140.

10 years agoGenerate error ASAP if building with too-old openssl
Nick Mathewson [Thu, 21 May 2015 15:54:13 +0000 (11:54 -0400)] 
Generate error ASAP if building with too-old openssl

10 years agomove "version" declaration to avoid "set but not used" warnings
Nick Mathewson [Thu, 21 May 2015 15:17:18 +0000 (11:17 -0400)] 
move "version" declaration to avoid "set but not used" warnings

10 years agoMerge remote-tracking branch 'yawning/bug16052a_027'
Nick Mathewson [Thu, 21 May 2015 14:48:52 +0000 (10:48 -0400)] 
Merge remote-tracking branch 'yawning/bug16052a_027'

10 years agofwd-port 0.2.6.8 changelog
Nick Mathewson [Thu, 21 May 2015 14:42:16 +0000 (10:42 -0400)] 
fwd-port 0.2.6.8 changelog

10 years ago19:38 < Yawning> nickm: you left the "+#ifndef SSL_clear_mode" block in ;_;
Nick Mathewson [Wed, 20 May 2015 19:40:42 +0000 (15:40 -0400)] 
19:38 < Yawning> nickm: you left the "+#ifndef SSL_clear_mode" block in ;_;

10 years agoMerge branch 'bug16034_no_more_openssl_098_squashed'
Nick Mathewson [Wed, 20 May 2015 19:33:22 +0000 (15:33 -0400)] 
Merge branch 'bug16034_no_more_openssl_098_squashed'

Conflicts:
src/test/testing_common.c

10 years agoDrop support for OpenSSLs without AES_CTR
Nick Mathewson [Wed, 20 May 2015 14:23:23 +0000 (10:23 -0400)] 
Drop support for OpenSSLs without AES_CTR

10 years agoNow that OpenSSL 0.9.8 is dead, crypto_seed_rng() needs no args
Nick Mathewson [Tue, 19 May 2015 20:17:03 +0000 (16:17 -0400)] 
Now that OpenSSL 0.9.8 is dead, crypto_seed_rng() needs no args

It needed an argument before because it wasn't safe to call
RAND_poll() on openssl 0.9.8c if you had already opened more fds
than would fit in fd_set.

10 years agoRemove code to support OpenSSL 0.9.8
Nick Mathewson [Tue, 19 May 2015 20:14:20 +0000 (16:14 -0400)] 
Remove code to support OpenSSL 0.9.8

10 years agoStop poking SSL_CTX->comp_methods
Nick Mathewson [Thu, 14 May 2015 14:24:02 +0000 (10:24 -0400)] 
Stop poking SSL_CTX->comp_methods

10 years agoUse SSL_CIPHER accessor functions
Nick Mathewson [Thu, 14 May 2015 14:17:37 +0000 (10:17 -0400)] 
Use SSL_CIPHER accessor functions

10 years agoUse SSL_CIPHER_find where possible.
Nick Mathewson [Thu, 14 May 2015 14:14:06 +0000 (10:14 -0400)] 
Use SSL_CIPHER_find where possible.

10 years agoTry using SSL_get_ciphers in place of session->ciphers
Nick Mathewson [Thu, 14 May 2015 12:42:08 +0000 (08:42 -0400)] 
Try using SSL_get_ciphers in place of session->ciphers

This should help openssl 1.1.  On pre-1.1, we double-check that these
two methods give us the same list, since the underlying code is awfully
hairy.

10 years agoTweak rectify_client_ciphers to work with openssl 1.1
Nick Mathewson [Wed, 13 May 2015 16:38:17 +0000 (12:38 -0400)] 
Tweak rectify_client_ciphers to work with openssl 1.1

The key here is to never touch ssl->cipher_list directly, but only
via SSL_get_ciphers().  But it's not so simple.

See, if there is no specialized cipher_list on the SSL object,
SSL_get_ciphers returns the cipher_list on the SSL_CTX.  But we sure
don't want to modify that one!  So we need to use
SSL_set_cipher_list first to make sure that we really have a cipher
list on the SSL object.

10 years agoAdd support for 'HiddenServiceMaxStream' to 'ADD_ONION'.
Yawning Angel [Wed, 20 May 2015 17:41:27 +0000 (17:41 +0000)] 
Add support for 'HiddenServiceMaxStream' to 'ADD_ONION'.

Done as a separate commit to ease backporting the tunables to 0.2.6.x.

10 years agoAdd "HiddenServiceMaxStreams" as a per-HS tunable.
Yawning Angel [Wed, 20 May 2015 17:33:59 +0000 (17:33 +0000)] 
Add "HiddenServiceMaxStreams" as a per-HS tunable.

When set, this limits the maximum number of simultaneous streams per
rendezvous circuit on the server side of a HS, with further RELAY_BEGIN
cells being silently ignored.

This can be modified via "HiddenServiceMaxStreamsCloseCircuit", which
if set will cause offending rendezvous circuits to be torn down instead.

Addresses part of #16052.

10 years agoMerge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Tue, 19 May 2015 18:59:39 +0000 (14:59 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.6'

10 years agoBump maint-0.2.6 to 0.2.6.8
Nick Mathewson [Tue, 19 May 2015 18:48:09 +0000 (14:48 -0400)] 
Bump maint-0.2.6 to 0.2.6.8

10 years agoFix some compilation warnings
Nick Mathewson [Mon, 18 May 2015 19:57:21 +0000 (15:57 -0400)] 
Fix some compilation warnings

10 years agoMerge remote-tracking branch 'andrea/ticket15358_squashed_2'
Nick Mathewson [Mon, 18 May 2015 18:44:28 +0000 (14:44 -0400)] 
Merge remote-tracking branch 'andrea/ticket15358_squashed_2'

10 years agoMerge remote-tracking branch 'special/bug16060'
Nick Mathewson [Mon, 18 May 2015 15:56:16 +0000 (11:56 -0400)] 
Merge remote-tracking branch 'special/bug16060'

10 years agoMerge remote-tracking branch 'dgoulet/bug16021_027_01'
Nick Mathewson [Mon, 18 May 2015 15:29:50 +0000 (11:29 -0400)] 
Merge remote-tracking branch 'dgoulet/bug16021_027_01'

10 years agoSilence two make rules
cypherpunks [Mon, 18 May 2015 15:29:07 +0000 (11:29 -0400)] 
Silence two make rules

10 years agoChanges file for ticket 15358
Andrea Shepard [Sun, 17 May 2015 13:58:05 +0000 (13:58 +0000)] 
Changes file for ticket 15358

10 years agoAdd GETINFO network-liveness to control protocol
Andrea Shepard [Fri, 15 May 2015 19:44:13 +0000 (19:44 +0000)] 
Add GETINFO network-liveness to control protocol

10 years agoImplement EVENT_NETWORK_LIVENESS
Andrea Shepard [Wed, 6 May 2015 12:37:13 +0000 (12:37 +0000)] 
Implement EVENT_NETWORK_LIVENESS

10 years agoFix crash on HUP with mixed ephemeral services
John Brooks [Sun, 17 May 2015 01:50:18 +0000 (19:50 -0600)] 
Fix crash on HUP with mixed ephemeral services

Ephemeral services will be listed in rend_services_list at the end of
rend_config_services, so it must check whether directory is non-NULL
before comparing.

This crash happens when reloading config on a tor with mixed configured
and ephemeral services.

Fixes bug #16060. Bugfix on 0.2.7.1-alpha.

10 years agoTest: add unit test for rend_data_t object and functions
David Goulet [Thu, 14 May 2015 16:08:54 +0000 (12:08 -0400)] 
Test: add unit test for rend_data_t object and functions

Closes #16021

Signed-off-by: David Goulet <dgoulet@ev0ke.net>
10 years agoFix: init HSDirs list in rend_data_service_create
David Goulet [Thu, 14 May 2015 14:56:14 +0000 (10:56 -0400)] 
Fix: init HSDirs list in rend_data_service_create

Signed-off-by: David Goulet <dgoulet@ev0ke.net>
10 years agoMerge branch 'bug15880_027_03'
Nick Mathewson [Thu, 14 May 2015 14:46:45 +0000 (10:46 -0400)] 
Merge branch 'bug15880_027_03'

10 years agoTest: fix HS_DESC to expect descriptor ID
David Goulet [Tue, 12 May 2015 20:45:56 +0000 (16:45 -0400)] 
Test: fix HS_DESC to expect descriptor ID

With #15881 implemented, this adds the missing descriptor ID at the end of
the expected control message.

Signed-off-by: David Goulet <dgoulet@ev0ke.net>
10 years agoAdd missing descriptor ID to HS_DESC control event
David Goulet [Thu, 30 Apr 2015 16:28:11 +0000 (12:28 -0400)] 
Add missing descriptor ID to HS_DESC control event

For FAILED and RECEIVED action of the HS_DESC event, we now sends back the
descriptor ID at the end like specified in the control-spec section 4.1.25.

Fixes #15881

Signed-off-by: David Goulet <dgoulet@ev0ke.net>
10 years agoFix rend_config_services() indentation
David Goulet [Mon, 11 May 2015 20:16:41 +0000 (16:16 -0400)] 
Fix rend_config_services() indentation

Not sure what happened but whitespace gone wild! :)

Signed-off-by: David Goulet <dgoulet@ev0ke.net>
10 years agoUse safe_str_client() for service ID in log
David Goulet [Mon, 11 May 2015 20:19:16 +0000 (16:19 -0400)] 
Use safe_str_client() for service ID in log

Scrub the service ID in a warning log.

Signed-off-by: David Goulet <dgoulet@ev0ke.net>
10 years agotor_tls_get_buffer_sizes() will not work on openssl 1.1. Patch from yawning
Nick Mathewson [Wed, 13 May 2015 16:12:53 +0000 (12:12 -0400)] 
tor_tls_get_buffer_sizes() will not work on openssl 1.1.  Patch from yawning

10 years agoUse SSL_state() to inspect the state of SSL objects.
Nick Mathewson [Wed, 13 May 2015 15:29:33 +0000 (11:29 -0400)] 
Use SSL_state() to inspect the state of SSL objects.

10 years agoUse SSL_clear_mode where available.
Nick Mathewson [Wed, 13 May 2015 15:24:47 +0000 (11:24 -0400)] 
Use SSL_clear_mode where available.

10 years agoSSL_clear_mode exists; we can use it.
Nick Mathewson [Wed, 13 May 2015 15:21:38 +0000 (11:21 -0400)] 
SSL_clear_mode exists; we can use it.

10 years agoStop accessing 'ssl->s3->flags' when we are using openssl 1.1
Nick Mathewson [Wed, 13 May 2015 15:19:19 +0000 (11:19 -0400)] 
Stop accessing 'ssl->s3->flags' when we are using openssl 1.1

This field was only needed to work with the now-long-gone (I hope,
except for some horrible apples) openssl 0.9.8l; if your headers say
you have openssl 1.1, you won't even need it.

10 years agoERR_remove_state() is deprecated since OpenSSL 1.0.0.
Yawning Angel [Thu, 23 Apr 2015 10:56:31 +0000 (10:56 +0000)] 
ERR_remove_state() is deprecated since OpenSSL 1.0.0.

OpenSSL 1.1.0 must be built with "enable-deprecated", and compiled with
`OPENSSL_USE_DEPRECATED` for this to work, so instead, use the newer
routine as appropriate.

10 years agoMerge remote-tracking branch 'origin/maint-0.2.6'
Nick Mathewson [Wed, 13 May 2015 15:06:10 +0000 (11:06 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.6'

10 years agoMerge remote-tracking branch 'origin/maint-0.2.5' into maint-0.2.6
Nick Mathewson [Wed, 13 May 2015 15:05:33 +0000 (11:05 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.5' into maint-0.2.6

10 years agoMerge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Wed, 13 May 2015 15:04:17 +0000 (11:04 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.5'

10 years agoMerge branch 'bug15823_025' into maint-0.2.5
Nick Mathewson [Wed, 13 May 2015 15:03:05 +0000 (11:03 -0400)] 
Merge branch 'bug15823_025' into maint-0.2.5

10 years agoBump version to 0.2.7.1-alpha-dev
Nick Mathewson [Tue, 12 May 2015 15:54:06 +0000 (11:54 -0400)] 
Bump version to 0.2.7.1-alpha-dev

10 years agoAdd a .dummy file in the changes directory to stop git from removing it tor-0.2.7.1-alpha
Nick Mathewson [Mon, 11 May 2015 15:41:48 +0000 (11:41 -0400)] 
Add a .dummy file in the changes directory to stop git from removing it

10 years agocomment patch from dgoulet that was in my inbox too long
Nick Mathewson [Mon, 11 May 2015 15:32:00 +0000 (11:32 -0400)] 
comment patch from dgoulet that was in my inbox too long

10 years agoreflow changelog.
Nick Mathewson [Mon, 11 May 2015 15:18:17 +0000 (11:18 -0400)] 
reflow changelog.

10 years agoTweak spelling and word choice in changelog
Nick Mathewson [Mon, 11 May 2015 15:17:49 +0000 (11:17 -0400)] 
Tweak spelling and word choice in changelog

10 years agoBump version to 0.2.7.1-alpha. (This is not the release yet.)
Nick Mathewson [Mon, 11 May 2015 14:10:29 +0000 (10:10 -0400)] 
Bump version to 0.2.7.1-alpha. (This is not the release yet.)

10 years agoIntro blurb for 0.2.7.1-alpha
Nick Mathewson [Mon, 11 May 2015 13:46:28 +0000 (09:46 -0400)] 
Intro blurb for 0.2.7.1-alpha

10 years agoTweak changelog more.
Nick Mathewson [Mon, 11 May 2015 13:42:41 +0000 (09:42 -0400)] 
Tweak changelog more.

10 years agoFix segfault in HSPOST command introduce with feature #3523
Donncha O'Cearbhaill [Fri, 8 May 2015 08:50:13 +0000 (09:50 +0100)] 
Fix segfault in HSPOST command introduce with feature #3523

Checking if node->rs->is_hs_dir when the router_status for the node does
not exist results in a segfault. This bug is not in any released Tor.

10 years agoMerge branch 'writing_tests'
Nick Mathewson [Thu, 7 May 2015 19:29:56 +0000 (15:29 -0400)] 
Merge branch 'writing_tests'

10 years agoWrite the outlines of a WritingTests.txt document
Nick Mathewson [Thu, 18 Sep 2014 18:03:49 +0000 (14:03 -0400)] 
Write the outlines of a WritingTests.txt document

Also, add some sample tests to be examples.

10 years agoTweak changelog entries a bit
Nick Mathewson [Tue, 5 May 2015 22:24:19 +0000 (18:24 -0400)] 
Tweak changelog entries a bit

10 years agoFix a bug in format_changelog, in a silly way
Nick Mathewson [Tue, 5 May 2015 22:23:56 +0000 (18:23 -0400)] 
Fix a bug in format_changelog, in a silly way

10 years agoMerge remote-tracking branch 'public/bug15821_025'
Nick Mathewson [Tue, 5 May 2015 19:06:57 +0000 (15:06 -0400)] 
Merge remote-tracking branch 'public/bug15821_025'

10 years agoFix out-of-bounds read in INTRODUCE2 client auth
John Brooks [Sun, 26 Apr 2015 04:52:35 +0000 (22:52 -0600)] 
Fix out-of-bounds read in INTRODUCE2 client auth

The length of auth_data from an INTRODUCE2 cell is checked when the
auth_type is recognized (1 or 2), but not for any other non-zero
auth_type. Later, auth_data is assumed to have at least
REND_DESC_COOKIE_LEN bytes, leading to a client-triggered out of bounds
read.

Fixed by checking auth_len before comparing the descriptor cookie
against known clients.

Fixes #15823; bugfix on 0.2.1.6-alpha.

10 years agoRe-sort and flow the changelog. Add new entry
Nick Mathewson [Tue, 5 May 2015 15:26:11 +0000 (11:26 -0400)] 
Re-sort and flow the changelog. Add new entry

10 years agoAdd collation/splitting support to sortChanges script
Nick Mathewson [Tue, 5 May 2015 15:24:01 +0000 (11:24 -0400)] 
Add collation/splitting support to sortChanges script

10 years agoFix a few more memory leaks; not in any released Tor
Nick Mathewson [Tue, 5 May 2015 15:08:05 +0000 (11:08 -0400)] 
Fix a few more memory leaks; not in any released Tor