- Oct 10, 2013
-
-
Nick Mathewson authored
Fix format_helper_exit_status to allow full HEX_ERRNO_SIZE answers, *and* increase the buffer length again.
-
Nick Mathewson authored
-
- Oct 08, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This is probably not an exploitable bug, since you would need to have errno be a large negative value in the unix pluggable-transport launcher case. Still, best avoided. Fixes bug 9928; bugfix on 0.2.3.18-rc.
-
- Sep 18, 2013
-
-
Nick Mathewson authored
The problem was that the server_identity_key_is_set() function could return true under conditions where we don't really have an identity key -- specifically, where we used to have one, but we stopped being a server. This is a fix for 6979; bugfix on 0.2.2.18-alpha where we added that assertion to get_server_identity_key().
-
- Sep 16, 2013
-
-
Nick Mathewson authored
-
- Sep 10, 2013
-
-
Karsten Loesing authored
-
- Sep 04, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This would make us do testing circuits "even when cbt is disabled by consensus, or when we're a directory authority, or when we've failed to write cbt history to our state file lately." (Roger's words.) This is a fix for 9671 and an improvement in our fix for 5049. The original misbehavior was in 0.2.2.14-alpha; the incomplete fix was in 0.2.3.17-beta.
-
- Aug 25, 2013
-
-
Nick Mathewson authored
-
- Aug 23, 2013
-
-
Nick Mathewson authored
-
- Aug 22, 2013
-
-
Nick Mathewson authored
Fix for bug 9564; bugfix on 0.2.3.14-alpha.
-
- Aug 21, 2013
-
-
Nick Mathewson authored
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
-
Nick Mathewson authored
(Backport to Tor 0.2.3) Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
-
- Aug 12, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Jul 08, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Jun 18, 2013
-
-
Nick Mathewson authored
Fixes bug 9090; bug not in any released Tor.
-
Nick Mathewson authored
-
Nick Mathewson authored
This implements "algorithm 1" from my discussion of bug #9072: on OOM, find the circuits with the longest queues, and kill them. It's also a fix for #9063 -- without the side-effects of bug #9072. The memory bounds aren't perfect here, and you need to be sure to allow some slack for the rest of Tor's usage. This isn't a perfect fix; the rest of the solutions I describe on codeable.
-
- Jun 17, 2013
-
-
Nick Mathewson authored
Fixes bug 9002; bugfix on 0.1.1.11-alpha (which introduced guard nodes), or on 0.0.6pre1 (which introduced hidden services).
-
- Jun 15, 2013
-
-
Andrea Shepard authored
-
- Jun 14, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Andrea Shepard authored
-
- Jun 10, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
There's an assertion failure that can occur if a connection has optimistic data waiting, and then the connect() call returns 0 on the first attempt (rather than -1 and EINPROGRESS). That latter behavior from connect() appears to be an (Open?)BSDism when dealing with remote addresses in some cases. (At least, I've only seen it reported with the BSDs under libevent, even when the address was 127.0.0.1. And we've only seen this problem in Tor with OpenBSD.) Fixes bug 9017; bugfix on 0.2.3.1-alpha, which first introduced optimistic data. (Although you could also argue that the commented-out connection_start_writing in 155c9b80 back in 2002 is the real source of the issue.)
-
- Jun 05, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- May 20, 2013
-
-
Nick Mathewson authored
-
- May 13, 2013
-
-
Karsten Loesing authored
-
- May 09, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This is a fix for bug 8844, where eugenis correctly notes that there's a sentinel value at the end of the list-of-freelists that's never actually checked. It's a bug since the first version of the chunked buffer code back in 0.2.0.16-alpha. This would probably be a crash bug if it ever happens, but nobody's ever reported something like this, so I'm unsure whether it can occur. It would require write_to_buf, write_to_buf_zlib, read_to_buf, or read_to_buf_tls to get an input size of more than 32K. Still, it's a good idea to fix this kind of thing!
-
- Apr 12, 2013
-
-
Nick Mathewson authored
Fix for bug 5650. Also, if we get a WANTREAD while reading while writing, make sure we're reading.
-
- Apr 08, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Mar 18, 2013
-
-
Nick Mathewson authored
-
- Mar 11, 2013
-
-
Nick Mathewson authored
-
- Mar 07, 2013
-
-
Karsten Loesing authored
-