- Feb 21, 2018
-
-
Nick Mathewson authored
Closes most of #25323.
-
- Feb 16, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" merge to avoid conflicts with the cherry-picked fix for 24898.
-
since all it does is produce false positives this commit should get merged into 0.2.9 and 0.3.0 *and* 0.3.1, even though the code in the previous commit is already present in 0.3.1. sorry for the mess. [Cherry-picked]
-
since all it does is produce false positives this commit should get merged into 0.2.9 and 0.3.0 *and* 0.3.1, even though the code in the previous commit is already present in 0.3.1. sorry for the mess.
-
This commit takes a piece of commit af8cadf3 and a piece of commit 46fe353f25, with the goal of making channel_is_client() be based on what sort of connection handshake the other side used, rather than seeing whether the other side ever sent a create_fast cell to us.
-
- Feb 13, 2018
-
-
Nick Mathewson authored
-
Taylor Yu authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Fixes #25236 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Never allow the function to set a bucket value above the allowed circuit burst. Closes #25202 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We had this safeguard around dos_init() but not when the consensus changes which can modify consensus parameters and possibly enable the DoS mitigation even if tor wasn't a public relay. Fixes #25223 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Explicitly inform the operator of the rejected relay to set a valid email address in the ContactInfo field and contact bad-relays@ mailing list. Fixes #25170 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Feb 12, 2018
-
-
We don't expect this to come up very much, but we may as well make sure that the value isn't predictable (as we do for the other addresses) in case the issue ever comes up. Spotted by teor.
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Feb 11, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Feb 10, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Feb 09, 2018
-
-
David Goulet authored
Part of #25193 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This is to avoid positively identifying Exit relays if tor client connection comes from them that is reentering the network. One thing to note is that this is done only in the DoS subsystem but we'll still add it to the geoip cache as a "client" seen. This is done that way so to avoid as much as possible changing the current behavior of the geoip client cache since this is being backported. Closes #25193 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Feb 08, 2018
-
-
David Goulet authored
-
David Goulet authored
This also adds one that tests the integration with the nodelist. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
This set is rebuilt whenever a consensus arrives. In between consensuses, it is add-only.
-
This is a convenience function, so callers don't need to wrap the IPv4 address.
-
We're going to need this to make our anti-DoS code (see 24902) more robust.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Feb 06, 2018
-
-
- Feb 05, 2018
-
-
David Goulet authored
The HT_FOREACH() is insanely heavy on the CPU and this is part of the fast path so make it return the nice memory size counter we added in 4d812e29. Fixes #25148 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-