- 04 Apr, 2017 3 commits
-
-
Nick Mathewson authored
I'm doing this to storagedir to used config_line_t.
-
Nick Mathewson authored
-
In order to avoid src/or/hs_service.o to contain no symbols and thus making clang throw a warning, the functions are now exposed not just to unit tests. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 03 Apr, 2017 11 commits
-
-
Taylor Yu authored
Capture the warning for the unhandled circuit purpose test case, both to clean up the test log and to confirm that it gets logged.
-
Nick Mathewson authored
-
Check that route_len_for_purpose() (helper for new_route_len()) correctly fails a non-fatal bug assertion if it encounters an unhandled circuit purpose when it is called with exit node info.
-
Add a new helper function route_len_for_purpose(), which explicitly lists all of the known circuit purposes for a circuit with a chosen exit node (unlike previously, where the default route length for a chosen exit was DEFAULT_ROUTE_LEN + 1 except for two purposes). Add a non-fatal assertion for unhandled purposes that conservatively returns DEFAULT_ROUTE_LEN + 1. Add copious comments documenting which circuits need an extra hop and why. Thanks to nickm and dgoulet for providing background information.
-
-
Sebastian Hahn authored
In an effort to better communicate with our users that they might need to take certain actions when upgrading, we should extract from the changelog the items that require some action (example: the new version automatically generates keys, if you want them to be offline - make sure to create them before upgrading).
-
Nick Mathewson authored
("Ours" merge to avoid version bump.)
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 29 Mar, 2017 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 28 Mar, 2017 5 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
The old implementation had duplicated code in a bunch of places, and it interspersed spool-management with resource management. The new implementation should make it easier to add new resource types and maintain the spooling code. Closing ticket 21651.
-
- 27 Mar, 2017 7 commits
-
-
Nick Mathewson authored
-
When calculating max sampled size, Tor would only count the number of bridges in torrc, without considering that our state file might already have sampled bridges in it. This caused problems when people swap bridges, since the following error would trigger: [warn] Not expanding the guard sample any further; just hit the maximum sample threshold of 1
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This prevents an i386 compilation warning and fixes bug 21828. Bug not in any released Tor.
-
- 26 Mar, 2017 4 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 23 Mar, 2017 1 commit
-
-
Nick Mathewson authored
Fixes bug21799.
-
- 20 Mar, 2017 1 commit
-
-
Jigsaw52 authored
Leak caused by clean_up_backtrace_handler not being called on shutdown.
-
- 17 Mar, 2017 6 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
This patch changes the way we decide when to check for whether it's time to rotate and/or expiry our onion keys. Due to proposal #274 we can now have the keys rotate at different frequencies than before and we thus do the check once an hour when our Tor daemon is running in server mode. This should allow us to quickly notice if the network consensus parameter have changed while we are running instead of having to wait until the current parameters timeout value have passed. See: See: https://bugs.torproject.org/21641
-
This patch adds a new timer that is executed when it is time to expire our current set of old onion keys. Because of proposal #274 this can no longer be assumed to be at the same time we rotate our onion keys since they will be updated less frequently. See: https://bugs.torproject.org/21641
-
This patch adds an API to get the current grace period, in days, defined as the consensus parameter "onion-key-grace-period-days". As per proposal #274 the values for "onion-key-grace-period-days" is a default value of 7 days, a minimum value of 1 day, and a maximum value defined by other consensus parameter "onion-key-rotation-days" also defined in days. See: https://bugs.torproject.org/21641
-
This patch turns `MIN_ONION_KEY_LIFETIME` into a new function `get_onion_key_lifetime()` which gets its value from a network consensus parameter named "onion-key-rotation-days". This allows us to tune the value at a later point in time with no code modifications. We also bump the default onion key lifetime from 7 to 28 days as per proposal #274. See: https://bugs.torproject.org/21641
-