- Apr 29, 2020
-
-
teor authored
Split "can extend over IPv6" and "has advertised IPv6 ORPort" into separate functions. They currently have the same result, but this may change in 33818 with ExtendAllowIPv6Addresses. Part of 33817.
-
teor authored
Refactor channel_matches_target_addr_for_extend() to return a boolean result. Part of 33817.
-
teor authored
Rename the function, and give it a boolean return value. No behaviour change. Part of 33817.
-
teor authored
Part of 33817.
-
teor authored
This is an automated commit, generated by this command: ./scripts/maint/rename_c_identifier.py \ tor_addr_get_ipv6_bytes tor_addr_copy_ipv6_bytes
-
teor authored
-
teor authored
Flatten the logic in circuit_choose_ip_ap_for_extend(). Part of 33817.
-
teor authored
Part of 33817.
-
teor authored
Refactor circuit_open_connection_for_extend(), splitting out the IP address choice code into a new function. Adds unit tests. No behaviour changes in tor. Part of 33817.
-
teor authored
Add IPv4-only and IPv6-only tests for circuit_open_connection_for_extend(). Part of 33817.
-
teor authored
When an EXTEND2 cell has an IPv4 and an IPv6 address, choose one of them uniformly at random. Part of 33817.
-
teor authored
Re-use the newly created extend_info to launch the connection in circuit_open_connection_for_extend(). No behaviour change. Part of 33817.
-
teor authored
Some tests use IF_BUG_ONCE(), which is fatal when ALL_BUGS_ARE_FATAL, after the fixes in 33917. Also run "make autostyle" on these changes. Part of 33817.
-
teor authored
... and DISABLE_ASSERTS_IN_UNIT_TESTS. Make all of tor's assertion macros support the ALL_BUGS_ARE_FATAL and DISABLE_ASSERTS_IN_UNIT_TESTS debugging modes. Implements these modes for IF_BUG_ONCE(). (It used to log a non-fatal warning, regardless of the debugging mode.) Fixes bug 33917; bugfix on 0.2.9.1-alpha.
-
teor authored
Search for existing connections using the remote IPv4 and IPv6 addresses. Part of 33817.
-
teor authored
Part of 33817.
-
teor authored
It isn't used outside channel.c. Part of 33817.
-
teor authored
Allow extend cells with IPv6-only link specifiers. Warn and fail if both IPv4 and IPv6 are invalid. Also warn if the IPv4 or IPv6 addresses are unexpectedly internal, but continue with the valid address. Part of 33817.
-
teor authored
Disable SafeLogging for some extend tests, so we can check the actual addresses. Part of 33817.
-
teor authored
Always log the address family in extend protocol warnings. If SafeLogging is 0, also log the address and port. Diagnostics for 33817.
-
teor authored
Add fmt_addrport_ap(), a macro that takes a tor_addr_port_t, and uses it to call fmt_addrport(). Add fmt_addr_family(), a function that returns a string constant describing the address family. Utility functions for 33817.
-
teor authored
-
teor authored
No behaviour change. Part of 33817.
-
teor authored
tor_addr_port_is_valid_ap(ap, 0) checks if the address or port are zero, exactly like the previous code. Preparation for 33817.
-
teor authored
Check for invalid zero IPv4 addresses and ports, when sending and receiving extend cells. Fixes bug 33900; bugfix on 0.2.4.8-alpha.
-
teor authored
Part of 33901.
-
teor authored
Allow clients and relays to send dual-stack and IPv6-only EXTEND2 cells. Parse dual-stack and IPv6-only EXTEND2 cells on relays. Relays do not make connections or extend circuits via IPv6: that's the next step. Closes ticket 33901.
-
teor authored
-
teor authored
-
teor authored
Part of 33817.
-
- Apr 28, 2020
-
-
teor authored
Clarify the comments in channel_tls_matches_target_method(), and make it clear that the attack is a covert attack.
-
- Apr 24, 2020
-
-
Nick Mathewson authored
-
- Apr 21, 2020
-
-
Nick Mathewson authored
-
Stop truncating IPv6 addresses and ports in channel and connection logs. Fixes bug 33918; bugfix on 0.2.4.4-alpha.
-
- Apr 15, 2020
-
-
teor authored
-
- Apr 14, 2020
-
-
Nick Mathewson authored
-
teor authored
Lock-in improvements. Accept some small function size increases. Allow a small amount of extra file size increase.
-
teor authored
Fix a typo, and say "v3 (and later) handshake". Comment-only change.
-
teor authored
Log IPv6 addresses on connections where this relay is the responder. Previously, responding relays would replace the remote IPv6 address with the IPv4 address from the consensus. (The port is replaced with the IPv6 ORPort from the consensus, we will resolve this issue in 33898.) Fixes bug 33899; bugfix on 0.3.1.1-alpha.
-
teor authored
Consider IPv6 addresses when checking if a connection is canonical. In 17604, relays assumed that a remote relay could consider an IPv6 connection canonical, but did not set the canonical flag on their side of the connection. Fixes bug 33899; bugfix on 0.3.1.1-alpha.
-