]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Mon, 11 Feb 2013 21:06:02 +0000 (16:06 -0500)]
Merge remote-tracking branch 'public/bug8208'
Nick Mathewson [Mon, 11 Feb 2013 21:05:03 +0000 (16:05 -0500)]
Check whether ei is non-NULL before altering it.
This fixes a crash bug if we fail to generate an extrainfo
descriptor.
Fixes bug 8208; bugfix on 0.2.3.16-alpha.
Nick Mathewson [Mon, 11 Feb 2013 20:55:50 +0000 (15:55 -0500)]
Suppress a coverity false positive in connection_edge_package_raw_inbuf
Coverity is worried that we're checking entry_conn in some cases,
but not in the case where we set entry_conn->pending_optimistic_data.
This commit should calm it down (CID 718623).
Nick Mathewson [Mon, 11 Feb 2013 20:20:20 +0000 (15:20 -0500)]
Fix even more dead code and resource leaks in the unit tests
Found by coverity
Nick Mathewson [Mon, 11 Feb 2013 20:13:42 +0000 (15:13 -0500)]
Fix a very short-lived socket leak in tor-resolve
This shouldn't actually matter, since tor-resolve will return soon
after this function exits, but it's nice to be warning-free
Found by coverity, fixes CID 718633
Nick Mathewson [Mon, 11 Feb 2013 19:57:10 +0000 (14:57 -0500)]
Resolve memory leaks in the unit tests and benchmarks (found by coverity)
These shouldn't really matter, but it's nice to be leak-free.
Nick Mathewson [Mon, 11 Feb 2013 19:42:33 +0000 (14:42 -0500)]
Fix a copy-and-paste issue found by coverity
Fixes CID 980650; bugfix on 0.2.4.10-alpha.
Nick Mathewson [Mon, 11 Feb 2013 18:55:42 +0000 (13:55 -0500)]
Speed up the curve25519 unit test by doing fewer iterations
This test was accounting for about 2/3 of our unit tests' runtime,
even on systems with a fast curve25519. No test should take so long.
Nick Mathewson [Mon, 11 Feb 2013 18:32:38 +0000 (13:32 -0500)]
Merge remote-tracking branch 'public/bug8158'
Nick Mathewson [Mon, 11 Feb 2013 18:05:27 +0000 (13:05 -0500)]
Avoid generating extra spaces when explaining how we guessed our address
Roger Dingledine [Sun, 10 Feb 2013 21:45:48 +0000 (16:45 -0500)]
Refactor resolve_my_address() so logs are more accurate / helpful
It returns the method by which we decided our public IP address
(explicitly configured, resolved from explicit hostname, guessed from
interfaces, learned by gethostname).
Now we can provide more helpful log messages when a relay guesses its IP
address incorrectly (e.g. due to unexpected lines in /etc/hosts). Resolves
ticket 2267.
While we're at it, stop sending a stray "(null)" in some cases for the
server status "EXTERNAL_ADDRESS" controller event. Resolves bug 8200.
Roger Dingledine [Mon, 2 Apr 2012 23:57:27 +0000 (19:57 -0400)]
log the hostname that resolve_my_address() used to guess our IP
Nick Mathewson [Mon, 11 Feb 2013 16:28:08 +0000 (11:28 -0500)]
Merge remote-tracking branch 'public/bug7801_v2'
Nick Mathewson [Sat, 9 Feb 2013 05:14:45 +0000 (00:14 -0500)]
Wrap more macro definitions in (parentheses)
To avoid surprises, good coding practice suggests parenthesizing every
macro definition -- or at the very least, all those involving an
expression.
Nick Mathewson [Fri, 8 Feb 2013 22:13:11 +0000 (17:13 -0500)]
Improve comment at Andrea's request
Nick Mathewson [Fri, 8 Feb 2013 21:48:50 +0000 (16:48 -0500)]
Merge remote-tracking branch 'public/signof_enum'
Nick Mathewson [Fri, 8 Feb 2013 21:46:50 +0000 (16:46 -0500)]
changes file for bug7801
Nick Mathewson [Fri, 8 Feb 2013 21:46:35 +0000 (16:46 -0500)]
Unit test for tor_weak_random_range
Nick Mathewson [Thu, 27 Dec 2012 21:38:33 +0000 (16:38 -0500)]
Add explicit check for !first_conn in ...resume_edge_reading_helper
This check isn't necessary (see comment on #7801), but it took at
least two smart people a little while to see why it wasn't necessary,
so let's have it in to make the code more readable.
Nick Mathewson [Fri, 8 Feb 2013 21:31:46 +0000 (16:31 -0500)]
Improve comment about our random stream choice algorithm
Nick Mathewson [Fri, 8 Feb 2013 21:28:05 +0000 (16:28 -0500)]
Fix numerous problems with Tor's weak RNG.
We need a weak RNG in a couple of places where the strong RNG is
both needless and too slow. We had been using the weak RNG from our
platform's libc implementation, but that was problematic (because
many platforms have exceptionally horrible weak RNGs -- like, ones
that only return values between 0 and SHORT_MAX) and because we were
using it in a way that was wrong for LCG-based weak RNGs. (We were
counting on the low bits of the LCG output to be as random as the
high ones, which isn't true.)
This patch adds a separate type for a weak RNG, adds an LCG
implementation for it, and uses that exclusively where we had been
using the platform weak RNG.
Nick Mathewson [Fri, 8 Feb 2013 17:12:09 +0000 (12:12 -0500)]
Add doxygen for bug8158 functions
Nick Mathewson [Fri, 8 Feb 2013 17:09:46 +0000 (12:09 -0500)]
Coalesce identical adjacent microdescriptor vote lines.
Nick Mathewson [Fri, 8 Feb 2013 16:52:51 +0000 (11:52 -0500)]
Refactor generating the m lines in a vote into its own function
Nick Mathewson [Fri, 8 Feb 2013 15:37:34 +0000 (10:37 -0500)]
Merge remote-tracking branch 'karsten/geoip-manual-update'
Nick Mathewson [Fri, 8 Feb 2013 15:36:51 +0000 (10:36 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.3'
Nick Mathewson [Fri, 8 Feb 2013 15:36:34 +0000 (10:36 -0500)]
Merge remote-tracking branch 'origin/maint-0.2.2' into maint-0.2.3
Karsten Loesing [Fri, 8 Feb 2013 13:41:32 +0000 (14:41 +0100)]
Comment out now obsolete change in geoip-manual.
Karsten Loesing [Fri, 8 Feb 2013 13:37:58 +0000 (14:37 +0100)]
Update to the February 2013 GeoIP database.
Nick Mathewson [Thu, 7 Feb 2013 22:13:51 +0000 (17:13 -0500)]
Merge remote-tracking branch 'public/easy_ratelim'
Conflicts:
src/or/connection.c
Nick Mathewson [Thu, 7 Feb 2013 21:29:32 +0000 (16:29 -0500)]
Have autoconf check whether enums are signed.
Fixes bug 7727; fix on 0.2.4.10-alpha.
Nick Mathewson [Thu, 7 Feb 2013 21:23:48 +0000 (16:23 -0500)]
Use a nicely written autoconf macro to determine the sign of a type
This beats our old implementation, which wouldn't work when cross-compiling
Nick Mathewson [Thu, 7 Feb 2013 20:22:36 +0000 (15:22 -0500)]
Merge remote-tracking branch 'arma/bug7054'
Nick Mathewson [Thu, 7 Feb 2013 20:20:50 +0000 (15:20 -0500)]
Merge remote-tracking branch 'public/bug7816_023'
Conflicts:
src/common/util.c
Nick Mathewson [Thu, 7 Feb 2013 20:13:21 +0000 (15:13 -0500)]
Merge remote-tracking branch 'public/bug7816_024'
Nick Mathewson [Thu, 7 Feb 2013 20:04:11 +0000 (15:04 -0500)]
Merge branch 'bug7902'
Nick Mathewson [Thu, 7 Feb 2013 19:31:51 +0000 (14:31 -0500)]
whitespace fix
Nick Mathewson [Thu, 7 Feb 2013 19:31:04 +0000 (14:31 -0500)]
Merge branch 'ticket8161_squashed'
Mike Perry [Tue, 5 Feb 2013 01:03:48 +0000 (17:03 -0800)]
Mention a trac ticket relevant to an XXX comment.
Mike Perry [Tue, 5 Feb 2013 01:01:56 +0000 (17:01 -0800)]
Better document an XXX comment about refactoring.
Mike Perry [Tue, 5 Feb 2013 01:15:15 +0000 (17:15 -0800)]
Changes file for path use bias threshold changes.
Mike Perry [Tue, 5 Feb 2013 00:59:28 +0000 (16:59 -0800)]
Separate the flags for logging use bias.
I think we want both sets of messages to appear independently to help us know
what needs tuning.
Nick Mathewson [Thu, 7 Feb 2013 19:09:17 +0000 (14:09 -0500)]
Merge branch 'bug8121_squashed'
Nick Mathewson [Mon, 4 Feb 2013 17:50:01 +0000 (12:50 -0500)]
Tolerate curve25519 backends where the high bit of the pk isn't ignored
Right now, all our curve25519 backends ignore the high bit of the
public key. But possibly, others could treat the high bit of the
public key as encoding out-of-bounds values, or as something to be
preserved. This could be used to distinguish clients with different
backends, at the cost of killing a circuit.
As a workaround, let's just clear the high bit of each public key
indiscriminately before we use it. Fix for bug 8121, reported by
rransom. Bugfix on 0.2.4.8-alpha.
Roger Dingledine [Tue, 5 Feb 2013 05:48:24 +0000 (00:48 -0500)]
revise history
Nick Mathewson [Tue, 5 Feb 2013 05:33:04 +0000 (00:33 -0500)]
Merge remote-tracking branch 'public/bug8151'
Mike Perry [Tue, 5 Feb 2013 01:07:19 +0000 (17:07 -0800)]
Update manpage for new pathbias use thresholds.
Mike Perry [Tue, 5 Feb 2013 00:57:09 +0000 (16:57 -0800)]
Lower path use bias thresholds.
I noticed bad wifi networks can have low use success rates.
Roger Dingledine [Mon, 4 Feb 2013 23:20:13 +0000 (18:20 -0500)]
bump to 0.2.4.10-alpha-dev
Roger Dingledine [Mon, 4 Feb 2013 22:11:00 +0000 (17:11 -0500)]
bump to 0.2.4.10-alpha
Roger Dingledine [Mon, 4 Feb 2013 22:06:01 +0000 (17:06 -0500)]
fold in changes for 0.2.4.10-alpha
Nick Mathewson [Mon, 4 Feb 2013 18:44:05 +0000 (13:44 -0500)]
Include a flag-thresholds line in each vote to describe flag cutoffs
Implements ticket 8151.
Nick Mathewson [Mon, 4 Feb 2013 17:34:14 +0000 (12:34 -0500)]
Merge branch 'authdir_quick_fix'
Nick Mathewson [Mon, 4 Feb 2013 17:34:09 +0000 (12:34 -0500)]
Merge branch 'bug8146_etc'
Nick Mathewson [Mon, 4 Feb 2013 17:23:20 +0000 (12:23 -0500)]
Quick fix on 5956 for authorities
Authorities don't set is_possible_guard on node_t, so they were
never deciding that they could build enough paths. This is a quick
and dirty fix.
Bug not in any released version of Tor
Nick Mathewson [Mon, 4 Feb 2013 16:54:38 +0000 (11:54 -0500)]
Merge branch 'bug8153'
Nick Mathewson [Mon, 4 Feb 2013 16:51:39 +0000 (11:51 -0500)]
Reinstate some fixes/tweaks from
6e4a4002
These seem to have gotten conflicted out of existence while mike was
working on path bias stuff.
Thanks to sysrqb for collecting these in a handy patch.
Nick Mathewson [Mon, 4 Feb 2013 16:34:23 +0000 (11:34 -0500)]
Fix a warning when building with --disable-curve25519
It appears that the code for 7291 gave an unused-value warning when
built with --disable-curve25519.
Nick Mathewson [Mon, 4 Feb 2013 16:32:55 +0000 (11:32 -0500)]
Fix compilation with --disable-curve25519 option
The fix is to move the two functions to format/parse base64
curve25519 public keys into a new "crypto_format.c" file. I could
have put them in crypto.c, but that's a big file worth splitting
anyway.
Fixes bug 8153; bugfix on 0.2.4.8-alpha where I did the fix for 7869.
Nick Mathewson [Mon, 4 Feb 2013 16:11:54 +0000 (11:11 -0500)]
When we mark a node as a sybil, mark it down and reset its uptime to 0
This prevents bug 8147, where such nodes would accrue points towards
Guard, Fast, HSDir, and so on.
Fixes bug 8147.
Nick Mathewson [Mon, 4 Feb 2013 15:47:08 +0000 (10:47 -0500)]
Ignore tiny bandwidths entirely when computing thresholds
Another bug 8145 fix.
Nick Mathewson [Mon, 4 Feb 2013 15:41:11 +0000 (10:41 -0500)]
Increase the minimum value for the Fast flag to 4096.
Fix for 8145.
Nick Mathewson [Mon, 4 Feb 2013 15:22:45 +0000 (10:22 -0500)]
Refactor should-count-towards-thresholds test into new function
Nick Mathewson [Mon, 4 Feb 2013 15:19:26 +0000 (10:19 -0500)]
When computing performance thresholds, ignore omitted-as-sybil nodes.
Fixes bug 8146.
Nick Mathewson [Mon, 4 Feb 2013 15:07:02 +0000 (10:07 -0500)]
Whoops: evdns_log, not tor_log, in src/ext/eventdns.c
Nick Mathewson [Fri, 1 Feb 2013 22:24:08 +0000 (17:24 -0500)]
Merge remote-tracking branch 'public/feature7706'
Nick Mathewson [Fri, 1 Feb 2013 22:11:46 +0000 (17:11 -0500)]
Merge remote-tracking branch 'public/bug7708_023_v3_squashed'
Nick Mathewson [Wed, 30 Jan 2013 22:07:32 +0000 (17:07 -0500)]
Clarify documentation of connection_finished_flushing
Nick Mathewson [Tue, 11 Dec 2012 22:46:12 +0000 (17:46 -0500)]
Fix serious breakage in connection_handle_write_impl
When we first implemented TLS, we assumed in conneciton_handle_write
that a TOR_TLS_WANT_WRITE from flush_buf_tls meant that nothing had
been written. But when we moved our buffers to a ring buffer
implementation back in 0.1.0.5-rc (!), we broke that invariant: it's
possible that some bytes have been written but nothing.
That's bad. It means that if we do a sequence of TLS writes that ends
with a WANTWRITE, we don't notice that we flushed any bytes, and we
don't (I think) decrement buckets.
Fixes bug 7708; bugfix on 0.1.0.5-rc
Nick Mathewson [Fri, 1 Feb 2013 22:03:12 +0000 (17:03 -0500)]
Merge branch 'ticket8081_squashed'
Nick Mathewson [Fri, 1 Feb 2013 22:03:00 +0000 (17:03 -0500)]
Fix a couple of warnings on the 8081 branch.
Mike Perry [Thu, 31 Jan 2013 16:01:36 +0000 (12:01 -0400)]
Add EntryGuardPathUseBias to state file keyword list.
Mike Perry [Thu, 31 Jan 2013 14:17:11 +0000 (10:17 -0400)]
Increment an informational counter for use failed state.
This informational counter is probably now redundant, but might as well keep
it consistent I guess.
Mike Perry [Thu, 31 Jan 2013 02:41:10 +0000 (22:41 -0400)]
Rename and relocate the bw weight scale param getter.
It had nothing to do with circuit build times.
Mike Perry [Thu, 31 Jan 2013 13:37:12 +0000 (09:37 -0400)]
Fix a log typo found by sysrqb.
Mike Perry [Thu, 31 Jan 2013 02:21:36 +0000 (22:21 -0400)]
Bounds-check path bias rate parameters.
The other remaining parameters don't really need range checks.
Mike Perry [Thu, 31 Jan 2013 01:27:38 +0000 (21:27 -0400)]
Refactor code that rolls back the use state
Also document it better.
Mention this refactoring in the comments for the path state machine.
Mike Perry [Thu, 31 Jan 2013 01:17:40 +0000 (21:17 -0400)]
Refactor and rename pathbias rate evaluation.
Mike Perry [Wed, 30 Jan 2013 22:40:46 +0000 (18:40 -0400)]
Refactor the scaling parameter fetching into a single function.
Also, deprecate the torrc options for the scaling values. It's unlikely anyone
but developers will ever tweak them, even if we provided a single ratio value.
Mike Perry [Wed, 30 Jan 2013 21:51:37 +0000 (17:51 -0400)]
Mark entry guard state dirty everwhere the pathbias code touches it.
Mike Perry [Wed, 30 Jan 2013 21:46:25 +0000 (17:46 -0400)]
Add a tristate to guard against unexpected circ purpose transitions
Mike Perry [Wed, 30 Jan 2013 21:01:10 +0000 (17:01 -0400)]
Clarify state transition and related pathbias comments
Nick Mathewson [Fri, 1 Feb 2013 21:23:26 +0000 (16:23 -0500)]
Merge branch 'rename_log_7599'
Roger Dingledine [Fri, 1 Feb 2013 21:22:34 +0000 (16:22 -0500)]
Help us track bug 8093:
Improve the log message when "Bug/attack: unexpected sendme cell
from client" occurs.
Nick Mathewson [Fri, 1 Feb 2013 21:19:02 +0000 (16:19 -0500)]
fix wide lines from tor_log rename
Nick Mathewson [Fri, 1 Feb 2013 21:09:16 +0000 (16:09 -0500)]
Fix a silly mistake in the tor_mathlog() documentation. Give it a unit test.
Nick Mathewson [Fri, 1 Feb 2013 20:47:46 +0000 (15:47 -0500)]
Remove old wrapper code and defines for keeping log() and log(3) apart
This is the non-automated portion of bug 7599.
Nick Mathewson [Fri, 1 Feb 2013 20:43:37 +0000 (15:43 -0500)]
Rename log() to tor_log() for logging
This is meant to avoid conflict with the built-in log() function in
math.h. It resolves ticket 7599. First reported by dhill.
This was generated with the following perl script:
#!/usr/bin/perl -w -i -p
s/\blog\(LOG_(ERR|WARN|NOTICE|INFO|DEBUG)\s*,\s*/log_\L$1\(/g;
s/\blog\(/tor_log\(/g;
Nick Mathewson [Thu, 31 Jan 2013 18:53:29 +0000 (13:53 -0500)]
typo in crypto_curve25519.c comment, spotted by rransom
Nick Mathewson [Thu, 31 Jan 2013 18:26:25 +0000 (13:26 -0500)]
whitespace fix
Nick Mathewson [Thu, 31 Jan 2013 18:19:27 +0000 (13:19 -0500)]
Merge branch 'double-0-check'
Nick Mathewson [Wed, 30 Jan 2013 22:35:28 +0000 (17:35 -0500)]
Use %d, not %02d, for decimal percentages
Cosmetic tweak on 5956; not in any released tor.
Nick Mathewson [Wed, 30 Jan 2013 17:58:59 +0000 (12:58 -0500)]
Merge branch 'rename_queue_macros_squashed'
Nick Mathewson [Wed, 30 Jan 2013 17:27:19 +0000 (12:27 -0500)]
Rename all of the macros in tor_queue.h to start with TOR_
Nick Mathewson [Wed, 30 Jan 2013 16:59:51 +0000 (11:59 -0500)]
Merge branch 'bug5956_squashed'
Nick Mathewson [Tue, 29 Jan 2013 16:05:13 +0000 (11:05 -0500)]
Parameterize FRAC_USABLE_NEEDED for fraction of circuits
Instead of hardcoding the minimum fraction of possible paths to 0.6, we
take it from the user, and failing that from the consensus, and
failing that we fall back to 0.6.
Nick Mathewson [Fri, 18 Jan 2013 18:24:14 +0000 (13:24 -0500)]
Compute whether we're ready to build circuits based on fraction of paths
Previously we did this based on the fraction of descriptors we
had. But really, we should be going based on what fraction of paths
we're able to build based on weighted bandwidth, since otherwise a
directory guard or two could make us behave quite oddly.
Implementation for feature 5956
Nick Mathewson [Fri, 18 Jan 2013 17:57:49 +0000 (12:57 -0500)]
Add an optional out-arg to count_usable_descriptors
This way we get the usable nodes themselves, so we can feed them into
frac_nodes_with_descriptors
Nick Mathewson [Fri, 18 Jan 2013 17:56:47 +0000 (12:56 -0500)]
Add a function to compute fraction of nodes (by weighted bw) with descriptors
Nick Mathewson [Wed, 30 Jan 2013 15:19:41 +0000 (10:19 -0500)]
Document the ?? country code.