- Mar 14, 2011
-
-
Nick Mathewson authored
This fixes bug 2757. It's a bugfix on 85da6761.
-
- Mar 13, 2011
-
-
Roger Dingledine authored
-
- Mar 12, 2011
-
-
Nick Mathewson authored
-
Roger Dingledine authored
-
- Mar 11, 2011
-
-
Sebastian Hahn authored
It is important to verify the uptime claim of a relay instead of just trusting it, otherwise it becomes too easy to blackhole a specific hidden service. rephist already has data available that we can use here. Bugfix on 0.2.0.10-alpha.
-
- Mar 09, 2011
-
-
Nick Mathewson authored
-
(changes file added by nickm)
-
- Mar 08, 2011
-
-
Roger Dingledine authored
-
Nick Mathewson authored
This is based on shitlei's fix for bug2629, with extra parens removed. Fixes bug 2629, bugfix on 0.2.1.2-alpha.
-
- Mar 06, 2011
-
-
Nick Mathewson authored
We need to _REJECT_ descriptors with accept6/reject6 lines. If we let them onto the network , other un-upgraded tors will crash.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Mar 05, 2011
-
-
Sebastian Hahn authored
We want to use the discard port correctly, so a htons() was missing. Also we need to set it correctly depending on address family. Review provided by danieldg
-
Sebastian Hahn authored
The third argument for connect should be dependent on the address family. Issue spotted by piebeer who also wrote the patch.
-
- Mar 01, 2011
-
-
Sebastian Hahn authored
Rename the _UsingTestingTorNetwork hidden option to _UsingTestNetworkDefaults (thanks Nick for the suggestion) and added a changes file.
-
- Feb 22, 2011
-
-
Roger Dingledine authored
-
-
Roger Dingledine authored
-
Nick Mathewson authored
Patch from "postman" on trac. Fixes bg 2366. Bug on 0.1.2.5-alpha.
-
- Feb 16, 2011
-
-
Robert Ransom authored
Fixes bug 2572.
-
- Feb 11, 2011
-
-
Sebastian Hahn authored
Once again spotted by mobmix Also add a changes file for the fix
-
- Feb 10, 2011
-
-
Roger Dingledine authored
-
Nick Mathewson authored
Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance. (Backport from 0.2.2's 5ed73e38)
-
- Feb 09, 2011
-
-
Robert Ransom authored
Fixes #2408.
-
- Feb 08, 2011
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
fixes bug 2470
-
-
- Feb 07, 2011
-
-
Sebastian Hahn authored
rransom noticed that a change of ORPort is just as bad as a change of IP address from a client's perspective, because both mean that the relay is not available to them while the new information hasn't propagated. Change the bug1035 fix accordingly. Also make sure we don't log a bridge's IP address (which might happen when we are the bridge authority).
-
- Feb 03, 2011
-
-
Nick Mathewson authored
-
- Jan 28, 2011
-
-
Sebastian Hahn authored
-
- Jan 26, 2011
-
-
Nick Mathewson authored
Suggested by rransom. Probably necessary for testing network mode.
-
Nick Mathewson authored
We detect and reject said attempts if there is no chosen exit node or circuit: connecting to a private addr via a randomly chosen exit node will usually fail (if all exits reject private addresses), is always ill-defined (you're not asking for any particular host or service), and usually an error (you've configured all requests to go over Tor when you really wanted to configure all _remote_ requests to go over Tor). This can also help detect forwarding loop requests. Found as part of bug2279.
-
Nick Mathewson authored
Fixes part of bug 2279. Bugfix on 0.1.2.1-alpha.
-
- Jan 25, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This bug was noticed by cypherpunks; fixes bug 2378. Bugfix on svn commit r110.
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
If we got a signed digest that was shorter than the required digest length, but longer than 20 bytes, we would accept it as long enough.... and then immediately fail when we want to check it. Fixes bug 2409; bug in 0.2.2.20-alpha; found by piebeer.
-