- 23 May, 2017 1 commit
-
-
teor authored
No code changes needed: in the places where we actually check the return value of these functions, we handle it correctly.
-
- 25 Apr, 2017 1 commit
-
-
Nick Mathewson authored
Also, fix two instances of runaway LCOV_EXCL_START lines.
-
- 15 Mar, 2017 1 commit
-
-
Nick Mathewson authored
-
- 03 Jan, 2017 1 commit
-
-
Nick Mathewson authored
-
- 23 Dec, 2016 1 commit
-
-
Nick Mathewson authored
-
- 16 Dec, 2016 1 commit
-
-
Nick Mathewson authored
This includes: * making bridge_info_t exposed but opaque * allowing guards where we don't know an identity * making it possible to learn the identity of a guard * creating a guard that lacks a node_t * remembering a guard's address and port. * Looking up a guard by address and port. * Only enforcing the rule that we need a live consensus to update the "listed" status for guards when we are not using bridges.
-
- 04 Dec, 2016 1 commit
-
-
J. Ryan Stinnett authored
Fixes #17070.
-
- 11 Oct, 2016 1 commit
-
-
Nick Mathewson authored
Switch from "AF_UNIX is always equal" to "always unequal" to avoid wacky bugs. See discussion on 20261
-
- 10 Oct, 2016 1 commit
-
-
Yawning Angel authored
This is a kludge to deal with the fact that `tor_addr_t` doesn't contain `sun_path`. This currently ONLY happens when circuit isolation is being checked, for an isolation mode that is force disabled anyway, so the kludge is "ugly but adequate", but realistically, making `tor_addr_t` and the AF_UNIX SocksPort code do the right thing is probably the better option.
-
- 03 Oct, 2016 1 commit
-
-
When deleting unsuitable addresses in get_interface_address6_list(), to avoid reordering IPv6 interface addresses and keep the order returned by the OS, use SMARTLIST_DEL_CURRENT_KEEPORDER() instead of SMARTLIST_DEL_CURRENT(). This issue was reported by René Mayrhofer. [Closes ticket 20163; changes file written by teor. This paragraph added by nickm]
-
- 28 Jul, 2016 1 commit
-
-
Nick Mathewson authored
In nearly all cases, this is a matter of making sure that we include orconfig.h before we include any standard c headers.
-
- 15 Jun, 2016 1 commit
-
-
Nick Mathewson authored
I audited this to make sure I was only marking ones that really should be unreachable.
-
- 11 Jun, 2016 1 commit
-
-
Nick Mathewson authored
This warning, IIUC, means that the compiler doesn't like it when it sees a NULL check _after_ we've already dereferenced the variable. In such cases, it considers itself free to eliminate the NULL check. There are a couple of tricky cases: One was the case related to the fact that tor_addr_to_in6() can return NULL if it gets a non-AF_INET6 address. The fix was to create a variant which asserts on the address type, and never returns NULL.
-
- 30 May, 2016 1 commit
-
-
Nick Mathewson authored
So, back long ago, XXX012 meant, "before Tor 0.1.2 is released, we had better revisit this comment and fix it!" But we have a huge pile of such comments accumulated for a large number of released versions! Not cool. So, here's what I tried to do: * 0.2.9 and 0.2.8 are retained, since those are not yet released. * XXX+ or XXX++ or XXX++++ or whatever means, "This one looks quite important!" * The others, after one-by-one examination, are downgraded to plain old XXX. Which doesn't mean they aren't a problem -- just that they cannot possibly be a release-blocking problem.
-
- 28 Mar, 2016 1 commit
-
-
Nick Mathewson authored
Patch from icanhasaccount; closes 18462.
-
- 04 Mar, 2016 2 commits
-
-
teor (Tim Wilson-Brown) authored
-
teor (Tim Wilson-Brown) authored
-
- 27 Feb, 2016 1 commit
-
-
Nick Mathewson authored
-
- 06 Feb, 2016 1 commit
-
-
Nick Mathewson authored
-
- 28 Jan, 2016 1 commit
-
-
teor (Tim Wilson-Brown) authored
node_get_all_orports and router_get_all_orports incorrectly used or_port with IPv6 addresses. They now use ipv6_orport. Also refactor and remove duplicated code.
-
- 09 Jan, 2016 1 commit
-
-
rl1987 authored
-
- 06 Jan, 2016 2 commits
-
-
rl1987 authored
When _list() is called with AF_UNSPEC family and fails to enumerate network interfaces using platform specific API, have it call _hack() twice to find out IPv4 and/or IPv6 address of a machine Tor instance is running on. This is correct way to handle this case because _hack() can only be called with AF_INET and AF_INET6 and does not support any other address family.
-
rl1987 authored
-
- 03 Jan, 2016 2 commits
-
-
rl1987 authored
-
teor (Tim Wilson-Brown) authored
-
- 15 Dec, 2015 1 commit
-
-
teor (Tim Wilson-Brown) authored
-
- 07 Dec, 2015 1 commit
-
-
teor (Tim Wilson-Brown) authored
Consistently ignore multicast addresses when automatically generating reject private exit policies. Closes ticket 17763. Bug fix on 10a6390d, not in any released version of Tor. Patch by "teor".
-
- 18 Nov, 2015 2 commits
-
-
teor (Tim Wilson-Brown) authored
Comment-only change noting platforms that can return IPv6 addresses from SIOCGIFCONF (or SIOCGLIFCONF).
-
teor (Tim Wilson-Brown) authored
Comment-only change noting platforms that can return IPv6 addresses from SIOCGIFCONF (or SIOCGLIFCONF).
-
- 29 Sep, 2015 2 commits
-
-
Ensure that either a valid address is returned in address pointers, or that the address data is zeroed on error. Ensure that free_interface_address6_list handles NULL lists. Add unit tests for get_interface_address* failure cases. Fixes bug #17173. Patch by fk/teor, not in any released version of tor.
-
... that was removed by 31eb486c which first appeared in 0.2.7.3-rc. If tor is running in a ElectroBSD (or FreeBSD) jail it can't get any IP addresses that aren't assigned to the jail by looking at the interfaces and (by design) the get_interface_address6_via_udp_socket_hack() fallback doesn't work either. The missing return code check resulted in tor_addr_is_internal() complaining about a "non-IP address of type 49", due to reading uninitialised memory. Fixes #17173.
-
- 15 Sep, 2015 4 commits
-
-
teor (Tim Wilson-Brown) authored
ExitPolicyRejectPrivate now rejects more local addresses by default: * the relay's published IPv6 address (if any), and * any publicly routable IPv4 or IPv6 addresses on any local interfaces. This resolves a security issue for IPv6 Exits and multihomed Exits that trust connections originating from localhost. Resolves ticket 17027. Patch by "teor". Patch on 42b8fb5a (11 Nov 2007), released in 0.2.0.11-alpha.
-
teor (Tim Wilson-Brown) authored
In previous versions of Tor, ExitPolicy accept6/reject6 * produced policy entries for IPv4 and IPv6 wildcard addresses. To reduce operator confusion, change accept6/reject6 * to only produce an IPv6 wildcard address. Resolves bug #16069. Patch on 2eb7eafc and a96c0aff (25 Oct 2012), released in 0.2.4.7-alpha.
-
teor (Tim Wilson-Brown) authored
When parsing torrc ExitPolicies, we now warn if: * an IPv4 address is used on an accept6 or reject6 line. The line is ignored, but the rest of the policy items in the list are used. (accept/reject continue to allow both IPv4 and IPv6 addresses in torrcs.) * a "private" address alias is used on an accept6 or reject6 line. The line filters both IPv4 and IPv6 private addresses, disregarding the 6 in accept6/reject6. When parsing torrc ExitPolicies, we now issue an info-level message: * when expanding an accept/reject * line to include both IPv4 and IPv6 wildcard addresses. In each instance, usage advice is provided to avoid the message. Partial fix for ticket 16069. Patch by "teor". Patch on 2eb7eafc and a96c0aff (25 Oct 2012), released in 0.2.4.7-alpha.
-
teor (Tim Wilson-Brown) authored
Add get_interface_address[6]_list by refactoring get_interface_address6. Add unit tests for new and existing functions. Preparation for ticket 17027. Patch by "teor". Patch on 42b8fb5a (11 Nov 2007), released in 0.2.0.11-alpha.
-
- 31 Jul, 2015 1 commit
-
-
Nick Mathewson authored
The base64 and base32 functions used to be in crypto.c; crypto_format.h had no header; some general-purpose functions were in crypto_curve25519.c. This patch makes a {crypto,util}_format.[ch], and puts more functions there. Small modules are beautiful!
-
- 29 Jun, 2015 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 31 Mar, 2015 2 commits
-
-
Also, fix some whitespace mishaps.
-
-