]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
13 years agoUpdate to the February 2012 GeoIP database. maint-0.2.1
Karsten Loesing [Thu, 9 Feb 2012 08:16:24 +0000 (09:16 +0100)] 
Update to the February 2012 GeoIP database.

13 years agoFix a compilation warning for our bug4822 fix on 64-bit linux
Nick Mathewson [Wed, 11 Jan 2012 16:06:31 +0000 (11:06 -0500)] 
Fix a compilation warning for our bug4822 fix on 64-bit linux

13 years agoMerge branch 'bug4822_021_v2_squashed' into maint-0.2.1
Nick Mathewson [Thu, 5 Jan 2012 19:11:42 +0000 (14:11 -0500)] 
Merge branch 'bug4822_021_v2_squashed' into maint-0.2.1

13 years agoLog at info level when disabling SSLv3
Robert Ransom [Thu, 5 Jan 2012 04:41:28 +0000 (20:41 -0800)] 
Log at info level when disabling SSLv3

13 years agoAdd a changes file for bug4822
Nick Mathewson [Thu, 5 Jan 2012 02:17:52 +0000 (21:17 -0500)] 
Add a changes file for bug4822

13 years agoDisable SSLv3 when using a not-up-to-date openssl
Nick Mathewson [Wed, 4 Jan 2012 22:15:50 +0000 (17:15 -0500)] 
Disable SSLv3 when using a not-up-to-date openssl

This is to address bug 4822, and CVE-2011-4576.

13 years agoadd a changes file for ticket 4825
Roger Dingledine [Thu, 5 Jan 2012 11:42:26 +0000 (06:42 -0500)] 
add a changes file for ticket 4825

13 years agoUpdate to the January 2012 GeoIP database.
Karsten Loesing [Thu, 5 Jan 2012 10:10:57 +0000 (11:10 +0100)] 
Update to the January 2012 GeoIP database.

13 years agoBug 4786 fix: don't convert EARLY to RELAY on v1 connections
Nick Mathewson [Tue, 27 Dec 2011 21:41:25 +0000 (16:41 -0500)] 
Bug 4786 fix: don't convert EARLY to RELAY on v1 connections

We used to do this as a workaround for older Tors, but now it's never
the correct thing to do (especially since anything that didn't
understand RELAY_EARLY is now deprecated hard).

13 years agoAdd a fix for the buf_pullup bug that Vektor reported
Nick Mathewson [Wed, 14 Dec 2011 21:38:43 +0000 (16:38 -0500)] 
Add a fix for the buf_pullup bug that Vektor reported

13 years agoUpdate to the December 2011 GeoIP database.
Karsten Loesing [Thu, 8 Dec 2011 08:55:44 +0000 (09:55 +0100)] 
Update to the December 2011 GeoIP database.

13 years agoMerge remote-tracking branch 'karsten/geoip-november2011' into maint-0.2.1
Nick Mathewson [Mon, 14 Nov 2011 16:10:10 +0000 (11:10 -0500)] 
Merge remote-tracking branch 'karsten/geoip-november2011' into maint-0.2.1

13 years agoUpdate to the November 2011 GeoIP database.
Karsten Loesing [Mon, 7 Nov 2011 13:23:48 +0000 (14:23 +0100)] 
Update to the November 2011 GeoIP database.

13 years agoAdd a changes file for 4410
Sebastian Hahn [Sun, 6 Nov 2011 16:24:09 +0000 (17:24 +0100)] 
Add a changes file for 4410

13 years agoFix remotely triggerable assert during ip decryption
Dan Rosenberg [Sun, 6 Nov 2011 16:23:14 +0000 (17:23 +0100)] 
Fix remotely triggerable assert during ip decryption

Fixes bug 4410.

13 years agobump maint to 0.2.1.31
Roger Dingledine [Fri, 28 Oct 2011 00:01:58 +0000 (20:01 -0400)] 
bump maint to 0.2.1.31

13 years agoReject create cells on outgoing OR connections from bridges
Robert Ransom [Sun, 23 Oct 2011 22:21:49 +0000 (15:21 -0700)] 
Reject create cells on outgoing OR connections from bridges

13 years agoMark which OR connections are outgoing
Robert Ransom [Sun, 23 Oct 2011 21:58:00 +0000 (14:58 -0700)] 
Mark which OR connections are outgoing

13 years agoDon't use any OR connection which sent us a CREATE_FAST cell for an EXTEND
Robert Ransom [Sun, 23 Oct 2011 21:27:56 +0000 (14:27 -0700)] 
Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND

Fix suggested by Nick Mathewson.

13 years agoDon't send a certificate chain on outgoing TLS connections from non-relays
Nick Mathewson [Sun, 23 Oct 2011 16:06:06 +0000 (16:06 +0000)] 
Don't send a certificate chain on outgoing TLS connections from non-relays

13 years agoRemove the -F option from tor-resolve.
Nick Mathewson [Mon, 23 May 2011 20:59:41 +0000 (16:59 -0400)] 
Remove the -F option from tor-resolve.

It used to mean "Force": it would tell tor-resolve to ask tor to
resolve an address even if it ended with .onion.  But when
AutomapHostsOnResolve was added, automatically refusing to resolve
.onion hosts stopped making sense.  So in 0.2.1.16-rc (commit
298dc95dfd8), we made tor-resolve happy to resolve anything.

The -F option stayed in, though, even though it didn't do anything.
Oddly, it never got documented.

Found while fixing GCC 4.6 "set, unused variable" warnings.

13 years agomanually backport a5232e0c4c
Roger Dingledine [Wed, 26 Oct 2011 21:11:52 +0000 (17:11 -0400)] 
manually backport a5232e0c4c

13 years agostop asserting at boot
Roger Dingledine [Tue, 31 May 2011 03:50:37 +0000 (23:50 -0400)] 
stop asserting at boot

The patch for 3228 made us try to run init_keys() before we had loaded
our state file, resulting in an assert inside init_keys. We had moved
it too early in the function.

Now it's later in the function, but still above the accounting calls.

13 years agoReinit keys at the start of options_act().
Nick Mathewson [Mon, 23 May 2011 20:38:35 +0000 (16:38 -0400)] 
Reinit keys at the start of options_act().

Previously we did this nearer to the end (in the old_options &&
transition_affects_workers() block).  But other stuff cares about
keys being consistent with options... particularly anything which
tries to access a key, which can die in assert_identity_keys_ok().

Fixes bug 3228; bugfix on 0.2.2.18-alpha.

Conflicts:

src/or/config.c

13 years agoDon't crash a bridge authority on SIGHUP if it's not in the consensus
Robert Ransom [Wed, 16 Feb 2011 12:12:37 +0000 (04:12 -0800)] 
Don't crash a bridge authority on SIGHUP if it's not in the consensus

Fixes bug 2572.

13 years agoFix assert for relay/bridge state change
Sebastian Hahn [Tue, 25 Jan 2011 14:28:58 +0000 (15:28 +0100)] 
Fix assert for relay/bridge state change

When we added support for separate client tls certs on bridges in
a2bb0bfdd5 we forgot to correctly initialize this when changing
from relay to bridge or vice versa while Tor is running. Fix that
by always initializing keys when the state changes.

Fixes bug 2433.

Conflicts:

src/or/config.c

13 years agoDon't crash when accountingmax is set in non-server Tors
Nick Mathewson [Fri, 3 Dec 2010 18:37:13 +0000 (13:37 -0500)] 
Don't crash when accountingmax is set in non-server Tors

We use a hash of the identity key to seed a prng to tell when an
accounting period should end.  But thanks to the bug998 changes,
clients no longer have server-identity keys to use as a long-term seed
in accounting calculations.  In any case, their identity keys (as used
in TLS) were never never fixed.  So we can just set the wakeup time
from a random seed instead there.  Still open is whether everybody
should be random.

This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha.

Diagnosed with help from boboper on irc.

13 years agoProperly refcount client_identity_key
Sebastian Hahn [Tue, 26 Oct 2010 16:22:04 +0000 (18:22 +0200)] 
Properly refcount client_identity_key

In a2bb0bf we started using a separate client identity key. When we are
in "public server mode" (that means not a bridge) we will use the same
key. Reusing the key without doing the proper refcounting leads to a
segfault on cleanup during shutdown. Fix that.

Also introduce an assert that triggers if our refcount falls below 0.
That should never happen.

13 years agoAdd some asserts to get_{tlsclient|server}_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:54:12 +0000 (13:54 -0400)] 
Add some asserts to get_{tlsclient|server}_identity_key

We now require that:
  - Only actual servers should ever call get_server_identity_key
  - If you're being a client or bridge, the client and server keys should
    differ.
  - If you're being a public relay, the client and server keys
    should be the same.

13 years agoRename get_client_identity_key to get_tlsclient_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:53:31 +0000 (13:53 -0400)] 
Rename get_client_identity_key to get_tlsclient_identity_key

13 years agoMaintain separate server and client identity keys when appropriate.
Robert Ransom [Mon, 4 Oct 2010 05:38:53 +0000 (22:38 -0700)] 
Maintain separate server and client identity keys when appropriate.

Fixes a bug described in ticket #988.

Conflicts:

src/or/main.c
src/or/router.c

13 years agoMake crypto_free_pk_env tolerate NULL arg in 0.2.1. Error-proofing against bug 988...
Nick Mathewson [Sat, 13 Nov 2010 01:21:50 +0000 (20:21 -0500)] 
Make crypto_free_pk_env tolerate NULL arg in 0.2.1.  Error-proofing against bug 988 backport

13 years agoMaintain separate server and client TLS contexts.
Robert Ransom [Mon, 4 Oct 2010 01:14:08 +0000 (18:14 -0700)] 
Maintain separate server and client TLS contexts.

Fixes bug #988.

Conflicts:

src/or/main.c
src/or/router.c

13 years agoRefactor tor_tls_context_new:
Robert Ransom [Fri, 1 Oct 2010 21:06:57 +0000 (14:06 -0700)] 
Refactor tor_tls_context_new:

* Make tor_tls_context_new internal to tortls.c, and return the new
  tor_tls_context_t from it.

* Add a public tor_tls_context_init wrapper function to replace it.

Conflicts:

src/or/main.c
src/or/router.c

13 years agoAdd public_server_mode function.
Robert Ransom [Fri, 1 Oct 2010 07:07:10 +0000 (00:07 -0700)] 
Add public_server_mode function.

13 years agoFix zlib macro brokenness on osx with zlib 1.2.4 and higher.
Nick Mathewson [Tue, 8 Jun 2010 22:10:20 +0000 (18:10 -0400)] 
Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.

From the code:
   zlib 1.2.4 and 1.2.5 do some "clever" things with macros.  Instead of
   saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory
   that nobody will care if the compile outputs a no-such-identifier warning.

   Sorry, but we like -Werror over here, so I guess we need to define these.
   I hope that zlib 1.2.6 doesn't break these too.

Possible fix for bug 1526.

13 years agoUpdate to the October 2011 GeoIP database.
Karsten Loesing [Thu, 13 Oct 2011 05:43:47 +0000 (07:43 +0200)] 
Update to the October 2011 GeoIP database.

13 years agoUpdate to the September 2011 GeoIP database.
Karsten Loesing [Mon, 12 Sep 2011 09:40:26 +0000 (11:40 +0200)] 
Update to the September 2011 GeoIP database.

13 years agoGenerate our ssl session certs with a plausible lifetime
Roger Dingledine [Tue, 13 Sep 2011 22:24:45 +0000 (18:24 -0400)] 
Generate our ssl session certs with a plausible lifetime

Nobody but Tor uses certs on the wire with 2 hour lifetimes,
and it makes us stand out. Resolves ticket 4014.

14 years agoUpdate to the August 2011 GeoIP database.
Karsten Loesing [Mon, 8 Aug 2011 14:57:01 +0000 (16:57 +0200)] 
Update to the August 2011 GeoIP database.

14 years agoupdate to the july 2011 geoip db
Roger Dingledine [Thu, 7 Jul 2011 17:28:36 +0000 (13:28 -0400)] 
update to the july 2011 geoip db

14 years agoMerge branches 'cov217_021' and 'cid_450' into maint-0.2.1
Nick Mathewson [Fri, 1 Jul 2011 16:54:51 +0000 (12:54 -0400)] 
Merge branches 'cov217_021' and 'cid_450' into maint-0.2.1

14 years agoUse strlcpy in create_unix_sockaddr()
Nick Mathewson [Fri, 1 Jul 2011 16:06:54 +0000 (12:06 -0400)] 
Use strlcpy in create_unix_sockaddr()

Using strncpy meant that if listenaddress were ever >=
sizeof(sockaddr_un.sun_path), we would fail to nul-terminate
sun_path.  This isn't a big deal: we never read sun_path, and the
kernel is smart enough to reject the sockaddr_un if it isn't
nul-terminated.  Nonetheless, it's a dumb failure mode.  Instead, we
should reject addresses that don't fit in sockaddr_un.sun_path.

Coverity found this; it's CID 428.  Bugfix on 0.2.0.3-alpha.

14 years agoFix a rare memory leak in rend_cache_store
Nick Mathewson [Fri, 1 Jul 2011 15:52:39 +0000 (11:52 -0400)] 
Fix a rare memory leak in rend_cache_store

When we rejected a descriptor for not being the one we wanted, we
were letting the parsed descriptor go out of scope.

Found by Coverity; CID # 30.

Bugfix on 0.2.1.26.

(No changes file yet, since this is not in any 0.2.1.x release.)

14 years agoFix insanely large stack_allocation in log_credential_status
Nick Mathewson [Fri, 1 Jul 2011 16:36:33 +0000 (12:36 -0400)] 
Fix insanely large stack_allocation in log_credential_status

I'm not one to insist on C's miserly stack limits, but allocating a
256K array on the stack is too much even for me.

Bugfix on 0.2.1.7-alpha.  Found by coverity.  Fixes CID # 450.

14 years agoAbandon rendezvous circuits on SIGNAL NEWNYM
Robert Ransom [Fri, 10 Jun 2011 02:56:40 +0000 (19:56 -0700)] 
Abandon rendezvous circuits on SIGNAL NEWNYM

14 years agomove to the june 1 2011 maxmind geoip db
Roger Dingledine [Sun, 5 Jun 2011 15:12:28 +0000 (11:12 -0400)] 
move to the june 1 2011 maxmind geoip db

14 years agoFix typo in changes/bug2574. Thanks, rransom
Nick Mathewson [Sat, 28 May 2011 06:13:04 +0000 (02:13 -0400)] 
Fix typo in changes/bug2574. Thanks, rransom

14 years agoMerge branch 'bug2574' into maint-0.2.1
Nick Mathewson [Sat, 28 May 2011 06:07:48 +0000 (02:07 -0400)] 
Merge branch 'bug2574' into maint-0.2.1

14 years agoWork correctly if your nameserver is ::1
Nick Mathewson [Mon, 23 May 2011 21:42:38 +0000 (17:42 -0400)] 
Work correctly if your nameserver is ::1

We had all the code in place to handle this right... except that we
were unconditionally opening a PF_INET socket instead of looking at
sa_family.  Ow.

Fixes bug 2574; not a bugfix on any particular version, since this
never worked before.

14 years agorm files for changes merged in all of release021, release022, master
Nick Mathewson [Mon, 16 May 2011 20:17:35 +0000 (16:17 -0400)] 
rm files for changes merged in all of release021, release022, master

14 years agosquash! Add crypto_pk_check_key_public_exponent function
Nick Mathewson [Mon, 16 May 2011 18:44:23 +0000 (14:44 -0400)] 
squash! Add crypto_pk_check_key_public_exponent function

Rename crypto_pk_check_key_public_exponent to crypto_pk_public_exponent_ok:
it's nice to name predicates s.t. you can tell how to interpret true
and false.

14 years agoRequire that certain public keys have public exponent 65537
Robert Ransom [Thu, 28 Apr 2011 21:35:03 +0000 (14:35 -0700)] 
Require that certain public keys have public exponent 65537

14 years agoAdd crypto_pk_check_key_public_exponent function
Robert Ransom [Thu, 28 Apr 2011 19:13:03 +0000 (12:13 -0700)] 
Add crypto_pk_check_key_public_exponent function

14 years agoCheck fetched rendezvous descriptors' service IDs
Robert Ransom [Wed, 27 Apr 2011 20:37:08 +0000 (13:37 -0700)] 
Check fetched rendezvous descriptors' service IDs

14 years agoFixup whitespace issues from 3122 commit
Nick Mathewson [Mon, 16 May 2011 00:06:36 +0000 (20:06 -0400)] 
Fixup whitespace issues from 3122 commit

14 years agoAnother doc tweak on tor_memcmp: <b>b</b>, not <b>.
Nick Mathewson [Sun, 15 May 2011 23:56:05 +0000 (19:56 -0400)] 
Another doc tweak on tor_memcmp: <b>b</b>, not <b>.

14 years agominor tweaks to 4b19730c8234d
Roger Dingledine [Sun, 15 May 2011 23:20:42 +0000 (19:20 -0400)] 
minor tweaks to 4b19730c8234d

14 years agoMerge remote-tracking branch 'public/bug3122_memcmp_squashed' into maint-0.2.1
Nick Mathewson [Thu, 12 May 2011 23:20:40 +0000 (19:20 -0400)] 
Merge remote-tracking branch 'public/bug3122_memcmp_squashed' into maint-0.2.1

14 years agoMerge branch 'bug3135' into maint-0.2.1
Nick Mathewson [Thu, 12 May 2011 02:49:44 +0000 (22:49 -0400)] 
Merge branch 'bug3135' into maint-0.2.1

14 years agoFix crash when read_file_to_string() fails in SAVECONF
Nick Mathewson [Thu, 12 May 2011 02:05:41 +0000 (22:05 -0400)] 
Fix crash when read_file_to_string() fails in SAVECONF

The new behavior is to try to rename the old file if there is one there
that we can't read.  In all likelihood, that will fail too, but at least
we tried, and at least it won't crash.

14 years agoHand-conversion and audit phase of memcmp transition
Nick Mathewson [Tue, 10 May 2011 20:58:38 +0000 (16:58 -0400)] 
Hand-conversion and audit phase of memcmp transition

Here I looked at the results of the automated conversion and cleaned
them up as follows:

   If there was a tor_memcmp or tor_memeq that was in fact "safe"[*] I
   changed it to a fast_memcmp or fast_memeq.

   Otherwise if there was a tor_memcmp that could turn into a
   tor_memneq or tor_memeq, I converted it.

This wants close attention.

[*] I'm erring on the side of caution here, and leaving some things
as tor_memcmp that could in my opinion use the data-dependent
fast_memcmp variant.

14 years agoAutomated conversion of memcmp to tor_memcmp/tor_mem[n]eq
Nick Mathewson [Tue, 10 May 2011 20:23:43 +0000 (16:23 -0400)] 
Automated conversion of memcmp to tor_memcmp/tor_mem[n]eq

This commit is _exactly_ the result of

perl -i -pe 's/\bmemcmp\(/tor_memcmp\(/g' src/*/*.[ch]
perl -i -pe 's/\!\s*tor_memcmp\(/tor_memeq\(/g' src/*/*.[ch]
perl -i -pe 's/0\s*==\s*tor_memcmp\(/tor_memeq\(/g' src/*/*.[ch]
perl -i -pe 's/0\s*!=\s*tor_memcmp\(/tor_memneq\(/g' src/*/*.[ch]
git checkout src/common/di_ops.[ch]
git checkout src/or/test.c
git checkout src/common/test.h

14 years agoAdd a "di_ops.h" include to util.h
Nick Mathewson [Tue, 10 May 2011 20:19:58 +0000 (16:19 -0400)] 
Add a "di_ops.h" include to util.h

14 years agoAdd a data-independent variant of memcmp and a d-i memeq function.
Nick Mathewson [Mon, 9 May 2011 22:39:23 +0000 (18:39 -0400)] 
Add a data-independent variant of memcmp and a d-i memeq function.

The tor_memcmp code is by Robert Ransom, and the tor_memeq code is
by me.  Both incorporate some ideas from DJB's stuff.

14 years agoUpdate to the May 1 2011 Maxmind GeoLite Country database
Roger Dingledine [Wed, 11 May 2011 03:04:11 +0000 (23:04 -0400)] 
Update to the May 1 2011 Maxmind GeoLite Country database

14 years agoFix a failure case of connection_ap_handshake_attach_circuit()
Sebastian Hahn [Wed, 27 Apr 2011 23:48:25 +0000 (01:48 +0200)] 
Fix a failure case of connection_ap_handshake_attach_circuit()

tor_fragile_assert() might be a no-op, so we have to return something
here to indicate failure to the caller.

14 years agoFix a bug introduced by purging rend_cache on NEWNYM
Robert Ransom [Mon, 25 Apr 2011 13:38:35 +0000 (06:38 -0700)] 
Fix a bug introduced by purging rend_cache on NEWNYM

If the user sent a SIGNAL NEWNYM command after we fetched a rendezvous
descriptor, while we were building the introduction-point circuit, we
would give up entirely on trying to connect to the hidden service.

Original patch by rransom slightly edited to go into 0.2.1

14 years agoAllow rend_client_send_introduction to fail transiently
Robert Ransom [Mon, 25 Apr 2011 15:36:02 +0000 (08:36 -0700)] 
Allow rend_client_send_introduction to fail transiently

i.e. without closing the AP connection.

14 years agoForget all rendezvous client state on SIGNAL NEWNYM
Robert Ransom [Wed, 20 Apr 2011 09:27:58 +0000 (02:27 -0700)] 
Forget all rendezvous client state on SIGNAL NEWNYM

14 years agoMake SIZE_T_CEILING unsigned; add a signed SSIZE_T_CEILING
Nick Mathewson [Tue, 26 Apr 2011 17:00:46 +0000 (13:00 -0400)] 
Make SIZE_T_CEILING unsigned; add a signed SSIZE_T_CEILING

None of the comparisons were _broken_ previously, but avoiding
signed/unsigned comparisons makes everybody happier.

Fixes bug2475.

14 years agoFix a bug in removing DNSPort requests from their circular list
Nick Mathewson [Thu, 21 Apr 2011 17:39:00 +0000 (13:39 -0400)] 
Fix a bug in removing DNSPort requests from their circular list

Under heavy load, this could result in an assertion failure.  Fix for
bug 2933; bugfix on 0.2.0.10-alpha.

14 years agoMerge remote-tracking branch 'rransom/bug2750-v3' into maint-0.2.1
Nick Mathewson [Tue, 19 Apr 2011 16:30:50 +0000 (12:30 -0400)] 
Merge remote-tracking branch 'rransom/bug2750-v3' into maint-0.2.1

14 years agoOuch: correctly tabify the micro-revision.i target in Makefile.am (0.2.1 only)
Nick Mathewson [Tue, 19 Apr 2011 16:29:20 +0000 (12:29 -0400)] 
Ouch: correctly tabify the micro-revision.i target in Makefile.am (0.2.1 only)

14 years agoAdd an XXX
Robert Ransom [Mon, 18 Apr 2011 20:25:48 +0000 (13:25 -0700)] 
Add an XXX

14 years agoCorrect the warning emitted when rejecting an oversized HS desc
Robert Ransom [Mon, 11 Apr 2011 09:26:07 +0000 (02:26 -0700)] 
Correct the warning emitted when rejecting an oversized HS desc

14 years agoMerge remote-tracking branch 'public/bug2402_again' into maint-0.2.1
Nick Mathewson [Wed, 6 Apr 2011 20:13:22 +0000 (16:13 -0400)] 
Merge remote-tracking branch 'public/bug2402_again' into maint-0.2.1

14 years agoswitch to the apr 2011 geoip db
Roger Dingledine [Mon, 4 Apr 2011 07:52:58 +0000 (03:52 -0400)] 
switch to the apr 2011 geoip db

14 years agoFix configure.in zlib package names.
Erinn Clark [Tue, 15 Feb 2011 01:15:42 +0000 (02:15 +0100)] 
Fix configure.in zlib package names.

14 years agoFix a compile warning when using clang
Sebastian Hahn [Wed, 9 Mar 2011 15:39:04 +0000 (16:39 +0100)] 
Fix a compile warning when using clang

Issue noticed by Steven Murdoch; fixes bug 2689. The cast didn't do
anything, and we don't need to look at the return value of the function
here.

14 years agowe're not reachable if we don't have a routerinfo yet
Roger Dingledine [Sun, 13 Mar 2011 19:47:59 +0000 (15:47 -0400)] 
we're not reachable if we don't have a routerinfo yet

14 years agoput the 0.2.1.30 changes into releasenotes
Roger Dingledine [Fri, 11 Mar 2011 22:38:55 +0000 (17:38 -0500)] 
put the 0.2.1.30 changes into releasenotes

14 years agoBackport: Generate version tags using Git, not (broken) svn revisions.
Nick Mathewson [Tue, 25 Jan 2011 19:01:04 +0000 (14:01 -0500)] 
Backport: Generate version tags using Git, not (broken) svn revisions.

Partial backport of daa0326aaaa85a760be94ee2360cfa61a9fb5be2 .
Resolves bug 2402.  Bugfix on 0.2.1.15 (for the part where we switched to
git) and on 0.2.1.30 (for the part where we dumped micro-revisions.)

14 years agoRevert "Simplest fix to bug2402: do not include SVN versions"
Nick Mathewson [Fri, 11 Mar 2011 15:47:25 +0000 (10:47 -0500)] 
Revert "Simplest fix to bug2402: do not include SVN versions"

This reverts commit a1073ee956021ead19d30c2151510dbaced416a8.

Apparently, we totally misunderstood how the debian packages were using
microrevisions.  Better fix that!

14 years agomove to march 2011 geoip file
Roger Dingledine [Tue, 8 Mar 2011 23:15:17 +0000 (18:15 -0500)] 
move to march 2011 geoip file

14 years agoAvoid crash in any_pending_bridge_descriptor_fetches
Nick Mathewson [Tue, 8 Mar 2011 20:17:41 +0000 (15:17 -0500)] 
Avoid crash in any_pending_bridge_descriptor_fetches

This is based on shitlei's fix for bug2629, with extra parens removed.
Fixes bug 2629, bugfix on 0.2.1.2-alpha.

14 years agoMerge branch 'real_ipv6_fix' into maint-0.2.1
Nick Mathewson [Sun, 6 Mar 2011 18:42:05 +0000 (13:42 -0500)] 
Merge branch 'real_ipv6_fix' into maint-0.2.1

14 years agoOops, here's the *REAL* fix for the ipv6 issue
Nick Mathewson [Sun, 6 Mar 2011 18:31:06 +0000 (13:31 -0500)] 
Oops, here's the *REAL* fix for the ipv6 issue

We need to _REJECT_ descriptors with accept6/reject6 lines.  If we
let them onto the network , other un-upgraded tors will crash.

14 years agoMerge branch 'careful_with_all_descs' into maint-0.2.1
Nick Mathewson [Sun, 6 Mar 2011 18:35:42 +0000 (13:35 -0500)] 
Merge branch 'careful_with_all_descs' into maint-0.2.1

14 years agochanges file for careful_with_all_descs
Nick Mathewson [Sun, 6 Mar 2011 18:35:24 +0000 (13:35 -0500)] 
changes file for careful_with_all_descs

14 years agoRevert "Disallow reject6 and accept6 lines in descriptors"
Nick Mathewson [Sun, 6 Mar 2011 18:26:38 +0000 (13:26 -0500)] 
Revert "Disallow reject6 and accept6 lines in descriptors"

This reverts commit b3918b3bbbfa9097246d63746c8b540eff2ec8e8.

14 years agoexit_policy_is_general_exit is IPv4 only; it should admit it.
Nick Mathewson [Sun, 6 Mar 2011 18:16:53 +0000 (13:16 -0500)] 
exit_policy_is_general_exit is IPv4 only; it should admit it.

14 years agoChanges file for ipv6 parsing issue
Nick Mathewson [Sun, 6 Mar 2011 18:15:32 +0000 (13:15 -0500)] 
Changes file for ipv6 parsing issue

14 years agoDisallow reject6 and accept6 lines in descriptors
Sebastian Hahn [Sun, 6 Mar 2011 17:20:28 +0000 (18:20 +0100)] 
Disallow reject6 and accept6 lines in descriptors

This fixes a remotely triggerable assert on directory authorities, who
don't handle descriptors with ipv6 contents well yet. We will want to
revert this once we're ready to handle ipv6.

Issue raised by lorth on #tor, who wasn't able to use Tor anymore.
Analyzed with help from Christian Fromme. Fix suggested by arma. Bugfix
on 0.2.1.3-alpha.

14 years agoDo not serve encrypt-only descriptors with the "all" request. Reported by piebeer
Nick Mathewson [Fri, 4 Mar 2011 04:51:07 +0000 (23:51 -0500)] 
Do not serve encrypt-only descriptors with the "all" request. Reported by piebeer

14 years agoRemove doc/spec/Makefile.in from list of generated files
Nick Mathewson [Tue, 22 Feb 2011 22:51:03 +0000 (17:51 -0500)] 
Remove doc/spec/Makefile.in from list of generated files

14 years agoMerge remote branch 'public/bug1859_021' into maint-0.2.1
Nick Mathewson [Tue, 22 Feb 2011 22:19:41 +0000 (17:19 -0500)] 
Merge remote branch 'public/bug1859_021' into maint-0.2.1

14 years agoMerge remote branch 'public/bug2402_nothing' into maint-0.2.1
Nick Mathewson [Tue, 22 Feb 2011 20:54:13 +0000 (15:54 -0500)] 
Merge remote branch 'public/bug2402_nothing' into maint-0.2.1

14 years agochanges file for removing torspec from the tarball
Roger Dingledine [Tue, 22 Feb 2011 19:50:00 +0000 (14:50 -0500)] 
changes file for removing torspec from the tarball

14 years agoprefer https urls
Roger Dingledine [Tue, 22 Feb 2011 19:39:09 +0000 (14:39 -0500)] 
prefer https urls