- 11 Jun, 2016 1 commit
-
-
Nick Mathewson authored
This warning, IIUC, means that the compiler doesn't like it when it sees a NULL check _after_ we've already dereferenced the variable. In such cases, it considers itself free to eliminate the NULL check. There are a couple of tricky cases: One was the case related to the fact that tor_addr_to_in6() can return NULL if it gets a non-AF_INET6 address. The fix was to create a variant which asserts on the address type, and never returns NULL.
-
- 28 Mar, 2016 1 commit
-
-
Nick Mathewson authored
Patch from icanhasaccount; closes 18462.
-
- 04 Mar, 2016 2 commits
-
-
teor (Tim Wilson-Brown) authored
-
teor (Tim Wilson-Brown) authored
-
- 27 Feb, 2016 1 commit
-
-
Nick Mathewson authored
-
- 06 Feb, 2016 1 commit
-
-
Nick Mathewson authored
-
- 28 Jan, 2016 1 commit
-
-
teor (Tim Wilson-Brown) authored
node_get_all_orports and router_get_all_orports incorrectly used or_port with IPv6 addresses. They now use ipv6_orport. Also refactor and remove duplicated code.
-
- 09 Jan, 2016 1 commit
-
-
rl1987 authored
-
- 06 Jan, 2016 2 commits
-
-
rl1987 authored
When _list() is called with AF_UNSPEC family and fails to enumerate network interfaces using platform specific API, have it call _hack() twice to find out IPv4 and/or IPv6 address of a machine Tor instance is running on. This is correct way to handle this case because _hack() can only be called with AF_INET and AF_INET6 and does not support any other address family.
-
rl1987 authored
-
- 03 Jan, 2016 2 commits
-
-
rl1987 authored
-
teor (Tim Wilson-Brown) authored
-
- 15 Dec, 2015 1 commit
-
-
teor (Tim Wilson-Brown) authored
-
- 07 Dec, 2015 1 commit
-
-
teor (Tim Wilson-Brown) authored
Consistently ignore multicast addresses when automatically generating reject private exit policies. Closes ticket 17763. Bug fix on 10a6390d, not in any released version of Tor. Patch by "teor".
-
- 18 Nov, 2015 2 commits
-
-
teor (Tim Wilson-Brown) authored
Comment-only change noting platforms that can return IPv6 addresses from SIOCGIFCONF (or SIOCGLIFCONF).
-
teor (Tim Wilson-Brown) authored
Comment-only change noting platforms that can return IPv6 addresses from SIOCGIFCONF (or SIOCGLIFCONF).
-
- 29 Sep, 2015 2 commits
-
-
Ensure that either a valid address is returned in address pointers, or that the address data is zeroed on error. Ensure that free_interface_address6_list handles NULL lists. Add unit tests for get_interface_address* failure cases. Fixes bug #17173. Patch by fk/teor, not in any released version of tor.
-
... that was removed by 31eb486c which first appeared in 0.2.7.3-rc. If tor is running in a ElectroBSD (or FreeBSD) jail it can't get any IP addresses that aren't assigned to the jail by looking at the interfaces and (by design) the get_interface_address6_via_udp_socket_hack() fallback doesn't work either. The missing return code check resulted in tor_addr_is_internal() complaining about a "non-IP address of type 49", due to reading uninitialised memory. Fixes #17173.
-
- 15 Sep, 2015 4 commits
-
-
teor (Tim Wilson-Brown) authored
ExitPolicyRejectPrivate now rejects more local addresses by default: * the relay's published IPv6 address (if any), and * any publicly routable IPv4 or IPv6 addresses on any local interfaces. This resolves a security issue for IPv6 Exits and multihomed Exits that trust connections originating from localhost. Resolves ticket 17027. Patch by "teor". Patch on 42b8fb5a (11 Nov 2007), released in 0.2.0.11-alpha.
-
teor (Tim Wilson-Brown) authored
In previous versions of Tor, ExitPolicy accept6/reject6 * produced policy entries for IPv4 and IPv6 wildcard addresses. To reduce operator confusion, change accept6/reject6 * to only produce an IPv6 wildcard address. Resolves bug #16069. Patch on 2eb7eafc and a96c0aff (25 Oct 2012), released in 0.2.4.7-alpha.
-
teor (Tim Wilson-Brown) authored
When parsing torrc ExitPolicies, we now warn if: * an IPv4 address is used on an accept6 or reject6 line. The line is ignored, but the rest of the policy items in the list are used. (accept/reject continue to allow both IPv4 and IPv6 addresses in torrcs.) * a "private" address alias is used on an accept6 or reject6 line. The line filters both IPv4 and IPv6 private addresses, disregarding the 6 in accept6/reject6. When parsing torrc ExitPolicies, we now issue an info-level message: * when expanding an accept/reject * line to include both IPv4 and IPv6 wildcard addresses. In each instance, usage advice is provided to avoid the message. Partial fix for ticket 16069. Patch by "teor". Patch on 2eb7eafc and a96c0aff (25 Oct 2012), released in 0.2.4.7-alpha.
-
teor (Tim Wilson-Brown) authored
Add get_interface_address[6]_list by refactoring get_interface_address6. Add unit tests for new and existing functions. Preparation for ticket 17027. Patch by "teor". Patch on 42b8fb5a (11 Nov 2007), released in 0.2.0.11-alpha.
-
- 31 Jul, 2015 1 commit
-
-
Nick Mathewson authored
The base64 and base32 functions used to be in crypto.c; crypto_format.h had no header; some general-purpose functions were in crypto_curve25519.c. This patch makes a {crypto,util}_format.[ch], and puts more functions there. Small modules are beautiful!
-
- 29 Jun, 2015 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 31 Mar, 2015 3 commits
-
-
Also, fix some whitespace mishaps.
-
-
-
- 16 Feb, 2015 2 commits
-
-
Nick Mathewson authored
CID 1268070
-
Nick Mathewson authored
-
- 12 Feb, 2015 2 commits
-
-
Sebastian Hahn authored
This could trigger where _SIZEOF_ADDR_IFREQ() might not return a multiple of sizeof(void *). Fixes bug 14875; not in any released version of Tor.
-
Sebastian Hahn authored
If we guessed a buffer size too small, we never increased the buffer and tried again Also simplify the interface of ifreq_to_smartlist a little
-
- 23 Jan, 2015 1 commit
-
-
Now the code has separate implementation and examination functions, uses smartlists sanely, and has relatively decent test coverage.
-
- 07 Jan, 2015 1 commit
-
-
Signed-off-by:
Andrea Shepard <andrea@torproject.org>
-
- 02 Jan, 2015 1 commit
-
-
Nick Mathewson authored
-
- 30 Dec, 2014 1 commit
-
-
Nick Mathewson authored
-
- 29 Dec, 2014 2 commits
-
-
Nick Mathewson authored
Otherwise we risk a subsequent memdup or memcpy copying uninitialized RAM into some other place that might eventually expose it. Let's make sure that doesn't happen. Closes ticket 14041
-
Also, improve comments on resolve_my_address to explain what it actually does.
-
- 21 Dec, 2014 1 commit
-
-
- 20 Dec, 2014 1 commit
-
-
teor authored
The address of an array in the middle of a structure will always be non-NULL. clang recognises this and complains. Disable the tautologous and redundant check to silence this warning. A comment about an IPv6 address string incorrectly refers to an IPv4 address format. A log buffer is sized 10024 rather than 10240. Fixes bug 14001.
-