1. 19 Oct, 2014 1 commit
  2. 16 Oct, 2014 1 commit
  3. 15 Oct, 2014 1 commit
  4. 20 Sep, 2014 1 commit
  5. 13 Aug, 2014 1 commit
  6. 18 Jul, 2014 1 commit
  7. 10 Jun, 2014 1 commit
  8. 01 May, 2014 2 commits
  9. 29 Apr, 2014 1 commit
    • Nick Mathewson's avatar
      Stop leaking memory in error cases of md parsing · 65575b07
      Nick Mathewson authored
      When clearing a list of tokens, it's important to do token_clear()
      on them first, or else any keys they contain will leak.  This didn't
      leak memory on any of the successful microdescriptor parsing paths,
      but it does leak on some failing paths when the failure happens
      during tokenization.
      
      Fixes bug 11618; bugfix on 0.2.2.6-alpha.
      65575b07
  10. 25 Apr, 2014 1 commit
  11. 16 Apr, 2014 2 commits
  12. 15 Apr, 2014 2 commits
  13. 14 Apr, 2014 4 commits
  14. 25 Feb, 2014 1 commit
    • Karsten Loesing's avatar
      Fix geoip by falling back to registered countries. · 2658e70d
      Karsten Loesing authored
      See 1d2179bc in master for details.
      
      """
      Fall back to registered country if necessary.
      
      When extracting geoip and geoip6 files from MaxMind's GeoLite2 Country
      database, we only look at country->iso_code which is the two-character ISO
      3166-1 country code of the country where MaxMind believes the end user is
      located.
      
      But if MaxMind thinks a range belongs to anonymous proxies, they don't put
      anything there.  Hence, we omit those ranges and resolve them all to '??'.
      That's not what we want.
      
      What we should do is first try country->iso_code, and if there's no such
      key, try registered_country->iso_code which is the country in which the
      ISP has registered the IP address.
      
      In short: let's fill all A1 entries with what ARIN et. al think.
      """
      2658e70d
  15. 15 Feb, 2014 1 commit
  16. 08 Feb, 2014 1 commit
  17. 15 Nov, 2013 1 commit
  18. 07 Nov, 2013 1 commit
    • Nick Mathewson's avatar
      Improved circuit queue out-of-memory handler · 1b8ceb83
      Nick Mathewson authored
      Previously, when we ran low on memory, we'd close whichever circuits
      had the most queued cells. Now, we close those that have the
      *oldest* queued cells, on the theory that those are most responsible
      for us running low on memory, and that those are the least likely to
      actually drain on their own if we wait a little longer.
      
      Based on analysis from a forthcoming paper by Jansen, Tschorsch,
      Johnson, and Scheuermann. Fixes bug 9093.
      1b8ceb83
  19. 11 Oct, 2013 2 commits
  20. 10 Oct, 2013 2 commits
  21. 08 Oct, 2013 2 commits
  22. 18 Sep, 2013 1 commit
    • Nick Mathewson's avatar
      Fix an assert when disabling ORPort with accounting disabled. · dece40fd
      Nick Mathewson authored
      The problem was that the server_identity_key_is_set() function could
      return true under conditions where we don't really have an identity
      key -- specifically, where we used to have one, but we stopped being a
      server.
      
      This is a fix for 6979; bugfix on 0.2.2.18-alpha where we added that
      assertion to get_server_identity_key().
      dece40fd
  23. 16 Sep, 2013 1 commit
  24. 10 Sep, 2013 1 commit
  25. 04 Sep, 2013 2 commits
  26. 25 Aug, 2013 1 commit
  27. 23 Aug, 2013 1 commit
  28. 22 Aug, 2013 1 commit
  29. 21 Aug, 2013 2 commits
    • Nick Mathewson's avatar
      Make bridges send AUTH_CHALLENGE cells · 940cef33
      Nick Mathewson authored
      The spec requires them to do so, and not doing so creates a situation
      where they can't send-test because relays won't extend to them because
      of the other part of bug 9546.
      
      Fixes bug 9546; bugfix on 0.2.3.6-alpha.
      940cef33
    • Nick Mathewson's avatar
      Send NETINFO on receiving a NETINFO if we have not yet sent one. · 0daa26a4
      Nick Mathewson authored
      (Backport to Tor 0.2.3)
      
      Relays previously, when initiating a connection, would only send a
      NETINFO after sending an AUTHENTICATE.  But bridges, when receiving a
      connection, would never send AUTH_CHALLENGE.  So relays wouldn't
      AUTHENTICATE, and wouldn't NETINFO, and then bridges would be
      surprised to be receiving CREATE cells on a non-open circuit.
      
      Fixes bug 9546.
      0daa26a4