1. 29 May, 2019 2 commits
    • Nick Mathewson's avatar
    • Tobias Stoeckmann's avatar
      Fixed tor_vasprintf on systems without vasprintf. · 0d5a0b4f
      Tobias Stoeckmann authored and Nick Mathewson's avatar Nick Mathewson committed
      
      
      If tor is compiled on a system with neither vasprintf nor _vscprintf,
      the fallback implementation exposes a logic flaw which prevents
      proper usage of strings longer than 127 characters:
      
      * tor_vsnprintf returns -1 if supplied buffer is not large enough,
        but tor_vasprintf uses this function to retrieve required length
      * the result of tor_vsnprintf is not properly checked for negative
        return values
      
      Both aspects together could in theory lead to exposure of uninitialized
      stack memory in the resulting string. This requires an invalid format
      string or data that exceeds integer limitations.
      
      Fortunately tor is not even able to run with this implementation because
      it runs into asserts early on during startup. Also the unit tests fail
      during a "make check" run.
      
      Signed-off-by: default avatarTobias Stoeckmann <tobias@stoeckmann.org>
      
        [backported to 0.2.9 by nickm]
      0d5a0b4f
  2. 17 May, 2019 1 commit
  3. 19 Apr, 2019 2 commits
  4. 05 Apr, 2019 3 commits
  5. 04 Apr, 2019 1 commit
    • Nick Mathewson's avatar
      Do not cache bogus results from classifying client ciphers · 1710f4bb
      Nick Mathewson authored
      When classifying a client's selection of TLS ciphers, if the client
      ciphers are not yet available, do not cache the result. Previously,
      we had cached the unavailability of the cipher list and never looked
      again, which in turn led us to assume that the client only supported
      the ancient V1 link protocol.  This, in turn, was causing Stem
      integration tests to stall in some cases.  Fixes bug 30021; bugfix
      on 0.2.4.8-alpha.
      1710f4bb
  6. 03 Apr, 2019 1 commit
  7. 01 Apr, 2019 2 commits
  8. 22 Mar, 2019 1 commit
  9. 20 Mar, 2019 2 commits
  10. 19 Mar, 2019 1 commit
  11. 18 Mar, 2019 1 commit
  12. 14 Mar, 2019 1 commit
    • Roger Dingledine's avatar
      relays shouldn't close idle rend circuits · add0f89c
      Roger Dingledine authored
      Allow connections to single onion services to remain idle without being
      disconnected.
      
      Relays acting as rendezvous points for single onion services were
      mistakenly closing idle established rendezvous circuits after 60 seconds,
      thinking that they are unused directory-fetching circuits that had served
      their purpose.
      
      Fixes bug 29665; bugfix on 0.2.1.26.
      add0f89c
  13. 13 Mar, 2019 5 commits
  14. 09 Mar, 2019 1 commit
  15. 08 Mar, 2019 1 commit
    • David Goulet's avatar
      hs-v2: Copy needed information between service on prunning · b4e44a37
      David Goulet authored
      
      
      Turns out that when reloading a tor configured with hidden service(s), we
      weren't copying all the needed information between the old service object to
      the new one.
      
      For instance, the desc_is_dirty timestamp wasn't which could lead to the
      service uploading its descriptor much later than it would need to.
      
      The replaycache wasn't also moved over and some intro point information as
      well.
      
      Fixes #23790
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      b4e44a37
  16. 06 Mar, 2019 1 commit
  17. 01 Mar, 2019 4 commits
  18. 27 Feb, 2019 1 commit
  19. 19 Feb, 2019 1 commit
  20. 12 Feb, 2019 1 commit
  21. 23 Jan, 2019 1 commit
  22. 09 Jan, 2019 1 commit
  23. 07 Jan, 2019 1 commit
  24. 04 Jan, 2019 1 commit
  25. 11 Dec, 2018 1 commit
  26. 10 Dec, 2018 1 commit
    • teor's avatar
      Fallbacks: Update the hard-coded fallback list in December 2018 · 4991b293
      teor authored
      Merge Phoul's two lists into teor's list.
      
      Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in
      January 2018 (of which ~115 were still functional), with a list of
      157 fallbacks (92 new, 65 existing, 85 removed) generated in
      December 2018.
      
      Closes ticket 24803.
      4991b293
  27. 07 Dec, 2018 1 commit
    • teor's avatar
      Fallbacks: Update the hard-coded fallback list in December 2018 · 78e177d6
      teor authored
      Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in
      January 2018 (of which ~115 were still functional), with a list of
      148 fallbacks (89 new, 59 existing, 91 removed) generated in
      December 2018.
      
      Closes ticket 24803.
      78e177d6