- Jan 05, 2012
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Karsten Loesing authored
-
- Dec 28, 2011
-
-
Nick Mathewson authored
We used to do this as a workaround for older Tors, but now it's never the correct thing to do (especially since anything that didn't understand RELAY_EARLY is now deprecated hard).
-
- Dec 15, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
- Dec 14, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 08, 2011
-
-
Karsten Loesing authored
-
- Nov 14, 2011
-
-
Nick Mathewson authored
-
- Nov 07, 2011
-
-
Karsten Loesing authored
-
- Nov 06, 2011
-
-
Sebastian Hahn authored
-
Fixes bug 4410.
-
- Oct 28, 2011
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Oct 26, 2011
-
-
Roger Dingledine authored
anybody who's reading it to decide whether to use it should not be using it.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
-
-
Roger Dingledine authored
-
Fix suggested by Nick Mathewson.
-
-
Roger Dingledine authored
-
It used to mean "Force": it would tell tor-resolve to ask tor to resolve an address even if it ended with .onion. But when AutomapHostsOnResolve was added, automatically refusing to resolve .onion hosts stopped making sense. So in 0.2.1.16-rc (commit 298dc95d), we made tor-resolve happy to resolve anything. The -F option stayed in, though, even though it didn't do anything. Oddly, it never got documented. Found while fixing GCC 4.6 "set, unused variable" warnings.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
The patch for 3228 made us try to run init_keys() before we had loaded our state file, resulting in an assert inside init_keys. We had moved it too early in the function. Now it's later in the function, but still above the accounting calls.
-
Previously we did this nearer to the end (in the old_options && transition_affects_workers() block). But other stuff cares about keys being consistent with options... particularly anything which tries to access a key, which can die in assert_identity_keys_ok(). Fixes bug 3228; bugfix on 0.2.2.18-alpha. Conflicts: src/or/config.c
-
Fixes bug 2572.
-
Sebastian Hahn authored
When we added support for separate client tls certs on bridges in a2bb0bfd we forgot to correctly initialize this when changing from relay to bridge or vice versa while Tor is running. Fix that by always initializing keys when the state changes. Fixes bug 2433. Conflicts: src/or/config.c
-
We use a hash of the identity key to seed a prng to tell when an accounting period should end. But thanks to the bug998 changes, clients no longer have server-identity keys to use as a long-term seed in accounting calculations. In any case, their identity keys (as used in TLS) were never never fixed. So we can just set the wakeup time from a random seed instead there. Still open is whether everybody should be random. This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha. Diagnosed with help from boboper on irc.