]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
11 years agocircuit_build_failed: distinguish "first hop chan failed", "CREATE failed"
Nick Mathewson [Thu, 31 Oct 2013 20:53:31 +0000 (16:53 -0400)] 
circuit_build_failed: distinguish "first hop chan failed", "CREATE failed"

Roger spotted this on tor-dev in his comments on proposal 221.

(Actually, detect DESTROY vs everything else, since arma likes
network timeout indicating failure but not overload indicating failure.)

11 years agoImplement proposal 221: Stop sending CREATE_FAST
Nick Mathewson [Thu, 31 Oct 2013 20:44:14 +0000 (16:44 -0400)] 
Implement proposal 221: Stop sending CREATE_FAST

This makes FastFirstHopPK an AUTOBOOL; makes the default "auto"; and
makes the behavior of "auto" be "look at the consensus."

11 years agoAvoid illegal read off end of an array in prune_v2_cipher_list
Nick Mathewson [Tue, 10 Jun 2014 15:11:47 +0000 (11:11 -0400)] 
Avoid illegal read off end of an array in prune_v2_cipher_list

This function is supposed to construct a list of all the ciphers in
the "v2 link protocol cipher list" that are supported by Tor's
openssl.  It does this by invoking ssl23_get_cipher_by_char on each
two-byte ciphersuite ID to see which ones give a match.  But when
ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS
ciphersuite ID, it checks to see whether it has a match for a
three-byte SSL2 ciphersuite ID.  This was causing a read off the end
of the 'cipherid' array.

This was probably harmless in practice, but we shouldn't be having
any uninitialized reads.

(Using ssl23_get_cipher_by_char in this way is a kludge, but then
again the entire existence of the v2 link protocol is kind of a
kludge.  Once Tor 0.2.2 clients are all gone, we can drop this code
entirely.)

Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.

11 years agoupdate manpage for numentryguards / numdirectoryguards
Roger Dingledine [Thu, 24 Jul 2014 16:19:15 +0000 (12:19 -0400)] 
update manpage for numentryguards / numdirectoryguards

11 years agoadd a NumDirectoryGuards consensus param too
Roger Dingledine [Wed, 23 Jul 2014 19:28:40 +0000 (15:28 -0400)] 
add a NumDirectoryGuards consensus param too

11 years agoAdd and use a new NumEntryGuards consensus parameter.
Roger Dingledine [Wed, 23 Jul 2014 16:23:49 +0000 (12:23 -0400)] 
Add and use a new NumEntryGuards consensus parameter.

When specified, it overrides our default of 3 entry guards.

(By default, it overrides the number of directory guards too.)

Implements ticket 12688.

11 years agoMerge branch 'curve25519-donna32' into maint-0.2.4
Nick Mathewson [Thu, 24 Jul 2014 01:28:18 +0000 (21:28 -0400)] 
Merge branch 'curve25519-donna32' into maint-0.2.4

11 years agoPut the bug number and correct credits in the changes file for the new curve25519...
Nick Mathewson [Thu, 24 Jul 2014 01:25:53 +0000 (21:25 -0400)] 
Put the bug number and correct credits in the changes file for the new curve25519-donna32

11 years agoMerge remote-tracking branch 'karsten/geoip6-jul2014' into maint-0.2.4
Nick Mathewson [Mon, 21 Jul 2014 18:29:43 +0000 (14:29 -0400)] 
Merge remote-tracking branch 'karsten/geoip6-jul2014' into maint-0.2.4

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Mon, 21 Jul 2014 18:29:30 +0000 (14:29 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoUpdate geoip6 to the July 10 2014 database.
Karsten Loesing [Fri, 18 Jul 2014 14:31:25 +0000 (16:31 +0200)] 
Update geoip6 to the July 10 2014 database.

11 years agoUpdate geoip to the July 10 2014 database.
Karsten Loesing [Fri, 18 Jul 2014 14:28:50 +0000 (16:28 +0200)] 
Update geoip to the July 10 2014 database.

11 years agoSmall tweaks to make curve25519-donna32 compile with our warnings
Nick Mathewson [Tue, 15 Jul 2014 13:43:40 +0000 (15:43 +0200)] 
Small tweaks to make curve25519-donna32 compile with our warnings

11 years agoUpdate to latest curve25519-donna32
Nick Mathewson [Tue, 15 Jul 2014 13:42:20 +0000 (15:42 +0200)] 
Update to latest curve25519-donna32

11 years agoFix changes file for geoip
Nick Mathewson [Wed, 11 Jun 2014 01:08:44 +0000 (21:08 -0400)] 
Fix changes file for geoip

11 years agoMerge remote-tracking branch 'karsten/geoip6-jun2014' into maint-0.2.4
Nick Mathewson [Wed, 11 Jun 2014 01:08:12 +0000 (21:08 -0400)] 
Merge remote-tracking branch 'karsten/geoip6-jun2014' into maint-0.2.4

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Wed, 11 Jun 2014 01:07:57 +0000 (21:07 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoUpdate geoip to the June 4 2014 database.
Karsten Loesing [Tue, 10 Jun 2014 19:29:56 +0000 (21:29 +0200)] 
Update geoip to the June 4 2014 database.

11 years agoUpdate geoip6 to the June 4 2014 database.
Karsten Loesing [Tue, 10 Jun 2014 19:31:21 +0000 (21:31 +0200)] 
Update geoip6 to the June 4 2014 database.

11 years agoBump maint-0.2.4 version to 0.2.4.22-dev
Nick Mathewson [Fri, 16 May 2014 13:16:54 +0000 (09:16 -0400)] 
Bump maint-0.2.4 version to 0.2.4.22-dev

(See discussion on #9553)

11 years agoMerge commit 'bb9b4c37f8e7f5cf78918f382e90d8b11ff42551' into maint-0.2.4
Nick Mathewson [Thu, 8 May 2014 03:11:32 +0000 (23:11 -0400)] 
Merge commit 'bb9b4c37f8e7f5cf78918f382e90d8b11ff42551' into maint-0.2.4

11 years agoMerge remote-tracking branch 'public/ticket11528_024' into maint-0.2.4
Nick Mathewson [Thu, 8 May 2014 03:04:59 +0000 (23:04 -0400)] 
Merge remote-tracking branch 'public/ticket11528_024' into maint-0.2.4

11 years agoMerge remote-tracking branch 'public/bug11513_024' into maint-0.2.4
Nick Mathewson [Thu, 8 May 2014 03:04:48 +0000 (23:04 -0400)] 
Merge remote-tracking branch 'public/bug11513_024' into maint-0.2.4

11 years agoMerge remote-tracking branch 'public/update_ciphers_ff28' into maint-0.2.4
Nick Mathewson [Thu, 8 May 2014 03:04:22 +0000 (23:04 -0400)] 
Merge remote-tracking branch 'public/update_ciphers_ff28' into maint-0.2.4

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Thu, 1 May 2014 15:44:25 +0000 (11:44 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

Conflicts:
src/or/microdesc.c

11 years agoDowngrade bug 7164 warning to INFO
Nick Mathewson [Thu, 1 May 2014 15:42:02 +0000 (11:42 -0400)] 
Downgrade bug 7164 warning to INFO

The 0.2.5.x warning is the one that might help us track this down; the
warnings in stable are just annoying users over and over and over.

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Thu, 1 May 2014 00:25:15 +0000 (20:25 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoMerge remote-tracking branch 'public/bug10849_023_bruteforce' into maint-0.2.3
Nick Mathewson [Thu, 1 May 2014 00:23:22 +0000 (20:23 -0400)] 
Merge remote-tracking branch 'public/bug10849_023_bruteforce' into maint-0.2.3

11 years agoDrop the MaxMemInCellQueues lower limit down to 256 MB.
Nick Mathewson [Wed, 20 Nov 2013 17:12:47 +0000 (12:12 -0500)] 
Drop the MaxMemInCellQueues lower limit down to 256 MB.

on #9686, gmorehose reports that the 500 MB lower limit is too high
for raspberry pi users.

This is a backport of 647248729fa65f0e51d062e2af8f4e8b38592bf5 to 0.2.4.

Note that in 0.2.4, the option is called MaxMemInCellQueues.

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Tue, 29 Apr 2014 17:02:18 +0000 (13:02 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoStop leaking memory in error cases of md parsing
Nick Mathewson [Sat, 26 Apr 2014 16:45:34 +0000 (12:45 -0400)] 
Stop leaking memory in error cases of md parsing

When clearing a list of tokens, it's important to do token_clear()
on them first, or else any keys they contain will leak.  This didn't
leak memory on any of the successful microdescriptor parsing paths,
but it does leak on some failing paths when the failure happens
during tokenization.

Fixes bug 11618; bugfix on 0.2.2.6-alpha.

11 years agoForbid TunneledDirConns 0 and PreferTunneledDirConns 0 if being a HS
Nick Mathewson [Fri, 25 Apr 2014 18:24:41 +0000 (14:24 -0400)] 
Forbid TunneledDirConns 0 and PreferTunneledDirConns 0 if being a HS

Fixes bug 10849; bugfix on 0.2.1.1-alpha (I believe)

11 years agoMerge remote-tracking branch 'public/bug9229_024' into maint-0.2.4
Nick Mathewson [Wed, 23 Apr 2014 15:01:39 +0000 (11:01 -0400)] 
Merge remote-tracking branch 'public/bug9229_024' into maint-0.2.4

11 years agoSupply better and less frequent warnings on circID exhaustion
Nick Mathewson [Fri, 18 Apr 2014 16:28:30 +0000 (12:28 -0400)] 
Supply better and less frequent warnings on circID exhaustion

Fixes the surface behavior of #11553

11 years agoElevate server TLS cipher preferences over client
Nick Mathewson [Thu, 17 Apr 2014 14:23:18 +0000 (10:23 -0400)] 
Elevate server TLS cipher preferences over client

The server cipher list is (thanks to #11513) chosen systematically to
put the best choices for Tor first.  The client cipher list is chosen
to resemble a browser.  So let's set SSL_OP_CIPHER_SERVER_PREFERENCE
to have the servers pick according to their own preference order.

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Wed, 16 Apr 2014 18:57:14 +0000 (14:57 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoremove note about dannenberg; it has upgraded.
Nick Mathewson [Wed, 16 Apr 2014 18:56:49 +0000 (14:56 -0400)] 
remove note about dannenberg; it has upgraded.

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Wed, 16 Apr 2014 17:32:20 +0000 (13:32 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoUpdate the authority signing key blacklist
Nick Mathewson [Wed, 16 Apr 2014 17:31:40 +0000 (13:31 -0400)] 
Update the authority signing key blacklist

Now it only has dannenberg

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Tue, 15 Apr 2014 18:51:19 +0000 (14:51 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

Conflicts:
src/or/circuituse.c

11 years agoMerge remote-tracking branch 'public/bug11519_023' into maint-0.2.3
Nick Mathewson [Tue, 15 Apr 2014 18:48:00 +0000 (14:48 -0400)] 
Merge remote-tracking branch 'public/bug11519_023' into maint-0.2.3

11 years agoDon't send uninitialized stack to the controller and say it's a date.
Nick Mathewson [Tue, 15 Apr 2014 01:51:30 +0000 (21:51 -0400)] 
Don't send uninitialized stack to the controller and say it's a date.

Fixes bug 11519, apparently bugfix on 0.2.3.11-alpha.

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Mon, 14 Apr 2014 22:00:38 +0000 (18:00 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

Conflicts:
src/or/routerlist.h

11 years agoMerge branch 'bug11464_023_squashed' into maint-0.2.3
Nick Mathewson [Mon, 14 Apr 2014 21:59:01 +0000 (17:59 -0400)] 
Merge branch 'bug11464_023_squashed' into maint-0.2.3

11 years agoTweak changes file and comment dates.
Nick Mathewson [Mon, 14 Apr 2014 21:58:49 +0000 (17:58 -0400)] 
Tweak changes file and comment dates.

11 years agoFill in the list of blacklisted signing keys.
Nick Mathewson [Mon, 14 Apr 2014 20:03:53 +0000 (16:03 -0400)] 
Fill in the list of blacklisted signing keys.

I used a list of certificate files from arma, and a little script,
both at 11464.

11 years agoCode to blacklist authority signing keys
Nick Mathewson [Fri, 11 Apr 2014 14:22:14 +0000 (10:22 -0400)] 
Code to blacklist authority signing keys

(I need a list of actual signing keys to blacklist.)

11 years agoNew sort order for server choice of ciphersuites.
Nick Mathewson [Mon, 14 Apr 2014 18:10:05 +0000 (14:10 -0400)] 
New sort order for server choice of ciphersuites.

Back in 175b2678, we allowed servers to recognize clients who are
telling them the truth about their ciphersuites, and select the best
cipher from on that list. This implemented the server side of proposal
198.

In bugs 11492, 11498, and 11499, cypherpunks found a bunch of mistakes
and omissions and typos in the UNRESTRICTED_SERVER_CIPHER_LIST we had.
In #11513, I found a couple more.

Rather than try to hand-edit this list, I wrote a short python script
to generate our ciphersuite preferences from the openssl headers.

The new rules are:
  * Require forward secrecy.
  * Require RSA (since our servers only configure RSA keys)
  * Require AES or 3DES. (This means, reject RC4, DES, SEED, CAMELLIA,
    and NULL.)
  * No export ciphersuites.

Then:
  * Prefer AES to 3DES.
  * If both suites have the same cipher, prefer ECDHE to DHE.
  * If both suites have the same DHE group type, prefer GCM to CBC.
  * If both suites have the same cipher mode, prefer SHA384 to SHA256
    to SHA1.
  * If both suites have the same digest, prefer AES256 to AES128.

11 years agoMerge remote-tracking branch 'public/bug11437_024' into maint-0.2.4
Nick Mathewson [Wed, 9 Apr 2014 00:29:24 +0000 (20:29 -0400)] 
Merge remote-tracking branch 'public/bug11437_024' into maint-0.2.4

11 years agoUpdate ciphers.inc to match ff28
Nick Mathewson [Tue, 8 Apr 2014 15:31:48 +0000 (11:31 -0400)] 
Update ciphers.inc to match ff28

The major changes are to re-order some ciphers, to drop the ECDH suites
(note: *not* ECDHE: ECDHE is still there), to kill off some made-up
stuff (like the SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA suite), to drop
some of the DSS suites... *and* to enable the ECDHE+GCM ciphersuites.

This change is autogenerated by get_mozilla_ciphers.py from
Firefox 28 and OpenSSL 1.0.1g.

Resolves ticket 11438.

11 years agoTeach the get_mozilla_ciphers.py script to parse recent firefoxen
Nick Mathewson [Tue, 8 Apr 2014 07:19:38 +0000 (03:19 -0400)] 
Teach the get_mozilla_ciphers.py script to parse recent firefoxen

11 years agoFix a small memory leak when resolving PTR addresses
Nick Mathewson [Tue, 8 Apr 2014 03:29:47 +0000 (23:29 -0400)] 
Fix a small memory leak when resolving PTR addresses

Fixes bug 11437; bugfix on 0.2.4.7-alpha.

Found by coverity; this is CID 1198198.

11 years agoMerge branch 'bug9213_doc_024' into maint-0.2.4
Nick Mathewson [Wed, 2 Apr 2014 00:59:13 +0000 (20:59 -0400)] 
Merge branch 'bug9213_doc_024' into maint-0.2.4

11 years agoFix documentation of torrc search order
Nick Mathewson [Thu, 27 Mar 2014 18:58:46 +0000 (14:58 -0400)] 
Fix documentation of torrc search order

We are searching @CONFDIR@ before $HOME, but the documentation
implied otherwise.

I screwed this up in f5e86bcd6c06d43ff3af5acd8135bd8b577bc3, when I
first documented the $HOME/.torrc possibility.

Fix for bug 9213; bugfix on 0.2.3.18-rc.

11 years agowhitespace fix
Nick Mathewson [Thu, 27 Mar 2014 19:34:57 +0000 (15:34 -0400)] 
whitespace fix

11 years agoFix unittest compilation with --disable-curve25519
Nick Mathewson [Thu, 20 Mar 2014 17:52:50 +0000 (13:52 -0400)] 
Fix unittest compilation with --disable-curve25519

This is a fix for 9700, which we already fixed in 0.2.5.x, but which
got left in 0.2.4.x.

This is a partial backport of a0a855d586d99540277014ccd3

11 years agoRemove the unused router_hex_digest_matches
Nick Mathewson [Tue, 11 Mar 2014 15:17:46 +0000 (11:17 -0400)] 
Remove the unused router_hex_digest_matches

When I removed some unused functions in 5bfa373eeeb, this became
unused as well.

11 years agoUpdate ns downloads when we receive a bridge descriptor
Nick Mathewson [Mon, 10 Mar 2014 19:01:27 +0000 (15:01 -0400)] 
Update ns downloads when we receive a bridge descriptor

This prevents long stalls when we're starting with a state file but
with no bridge descriptors.  Fixes bug 9229.  I believe this bug has
been present since 0.2.0.3-alpha.

11 years agoCorrect the URL in the "a relay on win95???" message
Nick Mathewson [Thu, 6 Mar 2014 14:57:42 +0000 (09:57 -0500)] 
Correct the URL in the "a relay on win95???" message

This is a fix for 9393; it's not a bugfix on any Tor version per se,
but rather on whatever Tor version was current when we reorganized the
wiki.

11 years agoMerge remote-tracking branch 'public/no_itime_queue' into maint-0.2.4
Nick Mathewson [Tue, 25 Feb 2014 20:58:53 +0000 (15:58 -0500)] 
Merge remote-tracking branch 'public/no_itime_queue' into maint-0.2.4

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Tue, 25 Feb 2014 15:02:14 +0000 (10:02 -0500)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoFix geoip by falling back to registered countries.
Karsten Loesing [Tue, 25 Feb 2014 12:28:34 +0000 (13:28 +0100)] 
Fix geoip by falling back to registered countries.

See 1d2179bc900f1646a5491b65294e78b175e70056 in master for details.

"""
Fall back to registered country if necessary.

When extracting geoip and geoip6 files from MaxMind's GeoLite2 Country
database, we only look at country->iso_code which is the two-character ISO
3166-1 country code of the country where MaxMind believes the end user is
located.

But if MaxMind thinks a range belongs to anonymous proxies, they don't put
anything there.  Hence, we omit those ranges and resolve them all to '??'.
That's not what we want.

What we should do is first try country->iso_code, and if there's no such
key, try registered_country->iso_code which is the country in which the
ISP has registered the IP address.

In short: let's fill all A1 entries with what ARIN et. al think.
"""

11 years agoMerge remote-tracking branch 'public/feature9777_024_squashed' into maint-0.2.4
Nick Mathewson [Mon, 24 Feb 2014 18:05:25 +0000 (13:05 -0500)] 
Merge remote-tracking branch 'public/feature9777_024_squashed' into maint-0.2.4

11 years agowhoops; mistaek in a496010642c2. so many comma
Nick Mathewson [Tue, 18 Feb 2014 01:15:59 +0000 (01:15 +0000)] 
whoops; mistaek in a496010642c2. so many comma

11 years agoadd changes file for bug 10929
Nick Mathewson [Mon, 17 Feb 2014 23:06:18 +0000 (23:06 +0000)] 
add changes file for bug 10929

11 years agoEnveigle configure to look for a2x.py as well as a2x.
dana koch [Sat, 15 Feb 2014 10:46:55 +0000 (21:46 +1100)] 
Enveigle configure to look for a2x.py as well as a2x.

It's not guaranteed that every package symlinks a2x to a2x.py; OpenBSD
does not do this, so let's just look for a2x.py as well.

11 years agoMerge remote-tracking branch 'karsten/geoip6-feb2014' into maint-0.2.4
Nick Mathewson [Sat, 15 Feb 2014 05:06:40 +0000 (00:06 -0500)] 
Merge remote-tracking branch 'karsten/geoip6-feb2014' into maint-0.2.4

11 years agoMerge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4
Nick Mathewson [Sat, 15 Feb 2014 05:06:25 +0000 (00:06 -0500)] 
Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4

11 years agoMerge remote-tracking branch 'karsten/geoip-feb2014' into maint-0.2.3
Nick Mathewson [Sat, 15 Feb 2014 05:06:01 +0000 (00:06 -0500)] 
Merge remote-tracking branch 'karsten/geoip-feb2014' into maint-0.2.3

11 years agochanges file for bug 10904
Nick Mathewson [Sat, 15 Feb 2014 04:51:14 +0000 (23:51 -0500)] 
changes file for bug 10904

11 years agogcc/clang: Mark macro-generated functions as possible unused
Sebastian Hahn [Thu, 13 Feb 2014 07:25:08 +0000 (08:25 +0100)] 
gcc/clang: Mark macro-generated functions as possible unused

clang 3.4 introduced a new by-default warning about unused static
functions, which we triggered heavily for the hashtable and map function
generating macros. We can use __attribute__ ((unused)) (thanks nickm for
the suggestion :-) ) to silence these warnings.

11 years agoUpdate geoip6 to the February 2014 GeoIP database.
Karsten Loesing [Thu, 13 Feb 2014 18:04:51 +0000 (19:04 +0100)] 
Update geoip6 to the February 2014 GeoIP database.

11 years agoFix windows compilation of e0c8031516852
Nick Mathewson [Wed, 12 Feb 2014 14:16:22 +0000 (09:16 -0500)] 
Fix windows compilation of e0c8031516852

There is no WSAEPERM; we were implying that there was.This fixes a
bug in e0c8031516852143fb82d8fee91a0f4c576c7418, which hadn't yet
appeared in any released Tor.

11 years agoMerge branch 'bug10777_netunreach_024' into maint-0.2.4
Nick Mathewson [Tue, 11 Feb 2014 23:57:55 +0000 (18:57 -0500)] 
Merge branch 'bug10777_netunreach_024' into maint-0.2.4

11 years agoupdate changes file
Nick Mathewson [Tue, 11 Feb 2014 23:57:38 +0000 (18:57 -0500)] 
update changes file

11 years agoMerge remote-tracking branch 'public/bug10777_nointernal_024' into maint-0.2.4
Nick Mathewson [Tue, 11 Feb 2014 23:55:26 +0000 (18:55 -0500)] 
Merge remote-tracking branch 'public/bug10777_nointernal_024' into maint-0.2.4

11 years agomake EACCES survivable too.
Nick Mathewson [Mon, 10 Feb 2014 20:06:10 +0000 (15:06 -0500)] 
make EACCES survivable too.

11 years agoExcise the insertion_time_elem_t logic
Nick Mathewson [Mon, 10 Feb 2014 18:55:27 +0000 (13:55 -0500)] 
Excise the insertion_time_elem_t logic

It's now redundant with the inserted_time field in packed_cell_t

Fixes bug 10870.

11 years agoMerge remote-tracking branch 'andrea/bug9602' into maint-0.2.4
Nick Mathewson [Mon, 10 Feb 2014 02:41:24 +0000 (21:41 -0500)] 
Merge remote-tracking branch 'andrea/bug9602' into maint-0.2.4

11 years agoDon't treat END_STREAM_REASON_INTERNAL as total circuit failure
Nick Mathewson [Mon, 10 Feb 2014 02:35:14 +0000 (21:35 -0500)] 
Don't treat END_STREAM_REASON_INTERNAL as total circuit failure

It can happen because we sent something that got an ENETUNREACH
response.

Bugfix on 0.2.4.8-alpha; fixes a part of bug 10777.

11 years agoCall ENETUNREACH a case of NOROUTE, not a case of INTERNAL.
Nick Mathewson [Mon, 10 Feb 2014 02:30:23 +0000 (21:30 -0500)] 
Call ENETUNREACH a case of NOROUTE, not a case of INTERNAL.

Found by cypherpunks; fix for a part of bug 10777; bugfix on 0.1.0.1-rc.

11 years agoMake sure orconn->chan gets nulled out when channels exit from channel_free_all(...
Andrea Shepard [Sat, 8 Feb 2014 22:05:51 +0000 (14:05 -0800)] 
Make sure orconn->chan gets nulled out when channels exit from channel_free_all() too

11 years agoUpdate to the February 2014 GeoIP database.
Karsten Loesing [Sat, 8 Feb 2014 11:09:37 +0000 (12:09 +0100)] 
Update to the February 2014 GeoIP database.

11 years agoSurvive fedora's openssl in our benchmarks
Nick Mathewson [Fri, 7 Feb 2014 22:36:11 +0000 (17:36 -0500)] 
Survive fedora's openssl in our benchmarks

Apparently fedora currently has ECDH but not P224. This isn't a huge
deal, since we no longer use OpenSSL's P224 ever (see #9780 and
72c1e5acfe1c6). But we shouldn't have segfaulting benchmarks really.

Fixes bug 10835; bugfix on 0.2.4.8-alpha.

11 years agoDiscard circuit paths on which nobody supports ntor
Nick Mathewson [Thu, 6 Feb 2014 22:08:50 +0000 (17:08 -0500)] 
Discard circuit paths on which nobody supports ntor

Right now this accounts for about 1% of circuits over all, but if you
pick a guard that's running 0.2.3, it will be about 6% of the circuits
running through that guard.

Making sure that every circuit has at least one ntor link means that
we're getting plausibly good forward secrecy on every circuit.

This implements ticket 9777,

11 years agoAttribute bug 9602 to a version.
Nick Mathewson [Fri, 7 Feb 2014 15:38:00 +0000 (10:38 -0500)] 
Attribute bug 9602 to a version.

11 years agoNULL out conns on tlschans when freeing in case channel_run_cleanup() is late; fixes...
Andrea Shepard [Thu, 6 Feb 2014 22:47:34 +0000 (14:47 -0800)] 
NULL out conns on tlschans when freeing in case channel_run_cleanup() is late; fixes bug 9602

11 years agoMerge remote-tracking branch 'public/bug9716_024' into maint-0.2.4
Nick Mathewson [Thu, 6 Feb 2014 21:29:08 +0000 (16:29 -0500)] 
Merge remote-tracking branch 'public/bug9716_024' into maint-0.2.4

11 years agochangelog for 10793
Nick Mathewson [Mon, 3 Feb 2014 15:47:49 +0000 (10:47 -0500)] 
changelog for 10793

11 years agoSome anti-forensics paranoia...
Florent Daigniere [Sun, 2 Feb 2014 18:40:30 +0000 (18:40 +0000)] 
Some anti-forensics paranoia...

sed -i 's/BN_free/BN_clear_free/g'

11 years agoAdd a missing include
Nick Mathewson [Thu, 6 Feb 2014 18:25:36 +0000 (13:25 -0500)] 
Add a missing include

11 years agoMerge branch 'bug10485_024' into maint-0.2.4
Nick Mathewson [Thu, 6 Feb 2014 18:24:12 +0000 (13:24 -0500)] 
Merge branch 'bug10485_024' into maint-0.2.4

11 years agoDeliver circuit handshake counts as part of the heartbeat
Nick Mathewson [Thu, 6 Feb 2014 18:03:01 +0000 (13:03 -0500)] 
Deliver circuit handshake counts as part of the heartbeat

Previously, they went out once an hour, unconditionally.

Fixes 10485; bugfix on 0.2.4.17-rc.

11 years agoClarify DirPort multiplicity
Nick Mathewson [Tue, 24 Dec 2013 00:00:46 +0000 (19:00 -0500)] 
Clarify DirPort multiplicity

Fix for #10470 as suggested by arma

11 years agoMerge branch 'bug10465' into maint-0.2.4
Nick Mathewson [Sun, 22 Dec 2013 22:20:22 +0000 (17:20 -0500)] 
Merge branch 'bug10465' into maint-0.2.4

11 years agoFix automapping to ipv6
Nick Mathewson [Sun, 22 Dec 2013 13:38:36 +0000 (08:38 -0500)] 
Fix automapping to ipv6

Bugfix on 0.2.4.7-alpha; fixes bug 10465.

11 years agoMerge branch 'bug10456' into maint-0.2.4
Nick Mathewson [Sun, 22 Dec 2013 02:15:39 +0000 (21:15 -0500)] 
Merge branch 'bug10456' into maint-0.2.4

11 years agoFix a logic error in circuit_stream_is_being_handled.
Nick Mathewson [Sat, 21 Dec 2013 15:15:09 +0000 (10:15 -0500)] 
Fix a logic error in circuit_stream_is_being_handled.

When I introduced the unusable_for_new_circuits flag in
62fb209d837f3f551, I had a spurious ! in the
circuit_stream_is_being_handled loop.  This made us decide that
non-unusable circuits (that is, usable ones) were the ones to avoid,
and caused it to launch a bunch of extra circuits.

Fixes bug 10456; bugfix on 0.2.4.12-alpha.

11 years agoMerge branch 'bug10402_redux_024' into maint-0.2.4
Nick Mathewson [Thu, 19 Dec 2013 02:55:06 +0000 (21:55 -0500)] 
Merge branch 'bug10402_redux_024' into maint-0.2.4

11 years agoNever allow OpenSSL engines to replace the RAND_SSLeay method
Nick Mathewson [Wed, 18 Dec 2013 16:49:44 +0000 (11:49 -0500)] 
Never allow OpenSSL engines to replace the RAND_SSLeay method

This fixes bug 10402, where the rdrand engine would use the rdrand
instruction, not as an additional entropy source, but as a replacement
for the entire userspace PRNG.  That's obviously stupid: even if you
don't think that RDRAND is a likely security risk, the right response
to an alleged new alleged entropy source is never to throw away all
previously used entropy sources.

Thanks to coderman and rl1987 for diagnosing and tracking this down.