- Sep 21, 2013
-
-
Roger Dingledine authored
this was causing directory authorities to send a time of 0 on all connections they generated themselves, which means everybody reachability test caused a time skew warning in the log for that relay. (i didn't just revert, because the changes file has been modified by other later commits.)
-
- Sep 20, 2013
-
-
Nick Mathewson authored
Implements part of proposal 222. We can do this safely, since REND_CACHE_MAX_SKEW is 24 hours.
-
Nick Mathewson authored
This isn't actually much of an issue, since only relays send AUTHENTICATE cells, but while we're removing timestamps, we might as well do this too. Part of proposal 222. I didn't take the approach in the proposal of using a time-based HMAC, since that was a bad-prng-mitigation hack from SSL3, and in real life, if you don't have a good RNG, you're hopeless as a Tor server.
-
Nick Mathewson authored
For now, round down to the nearest 10 minutes. Later, eliminate entirely by setting a consensus parameter. (This rounding is safe because, in 0.2.2, where the timestamp mattered, REND_REPLAY_TIME_INTERVAL was a nice generous 60 minutes.)
-
Nick Mathewson authored
Implements part of proposal 222.
-
- Sep 10, 2013
-
-
Karsten Loesing authored
-
- Sep 05, 2013
-
-
Roger Dingledine authored
we skip onionskins that came from non-relays, so we're less likely to run into privacy troubles. starts to implement ticket 9658.
-
Roger Dingledine authored
Now we explicitly check for overflow. This approach seemed smarter than a cascade of "change int to unsigned int and hope nothing breaks right before the release". Nick, feel free to fix in a better way, maybe in master.
-
Roger Dingledine authored
with commit c6f1668d we let it grow arbitrarily large. it can still overflow, but the damage is very small now.
-
Roger Dingledine authored
-
Roger Dingledine authored
Now we consider the TAP cells we'll process while draining the NTor queue, and vice versa.
-
Roger Dingledine authored
-
Roger Dingledine authored
that way tap won't starve entirely, but we'll still handle ntor requests quicker.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
Now we prioritize ntor create cells over tap create cells. Starts to address ticket 9574.
-
- Sep 04, 2013
-
-
Nick Mathewson authored
This would make us do testing circuits "even when cbt is disabled by consensus, or when we're a directory authority, or when we've failed to write cbt history to our state file lately." (Roger's words.) This is a fix for 9671 and an improvement in our fix for 5049. The original misbehavior was in 0.2.2.14-alpha; the incomplete fix was in 0.2.3.17-beta.
-
- Sep 03, 2013
-
-
Nick Mathewson authored
Fix for bug 9400, spotted by coverity. Bug introduced in revision 2cb4f7a4 (subversion revision r389).
-
- Aug 22, 2013
-
-
Nick Mathewson authored
Fix for bug 9564; bugfix on 0.2.3.14-alpha.
-
- Aug 21, 2013
-
-
Nick Mathewson authored
Fix for bug 9543.
-
Nick Mathewson authored
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
-
Nick Mathewson authored
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
-
Nick Mathewson authored
(Backport to Tor 0.2.3) Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
-
- Aug 20, 2013
-
-
Nick Mathewson authored
Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
-
- Aug 12, 2013
-
-
Karsten Loesing authored
-
- Aug 10, 2013
-
-
Fortunately, later checks mean that uninitialized data can't get sent to the network by this bug. Unfortunately, reading uninitialized heap *can* (in some cases, with some allocators) cause a crash if you get unlucky and go off the end of a page. Found by asn. Bugfix on 0.2.4.1-alpha.
-
- Aug 06, 2013
-
-
Nick Mathewson authored
-
- Aug 05, 2013
-
-
Nick Mathewson authored
Fix for bug #9366
-
- Jul 31, 2013
-
-
- Jul 30, 2013
-
-
Roger Dingledine authored
Now a user who changes only NumEntryGuards will get the behavior she expects. Fixes bug 9354; bugfix on 0.2.4.8-alpha.
-
- Jul 26, 2013
-
-
Nick Mathewson authored
Fixes bug 9337; bugfix on 0.2.4.7-alpha.
-
- Jul 23, 2013
-
-
Nick Mathewson authored
When we moved channel_matches_target_addr_for_extend() into a separate function, its sense was inverted from what one might expect, and we didn't have a ! in one place where we should have. Found by skruffy.
-
- Jul 19, 2013
-
-
Nick Mathewson authored
-
- Jul 16, 2013
-
-
Nick Mathewson authored
Fix for #9254. Bugfix on 0.2.4.14-alpha. This is not actually a bug in the Tor code.
-
- Jul 08, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Jul 03, 2013
-
-
Nick Mathewson authored
Fix a bug in the voting algorithm that could yield incorrect results when a non-naming authority declared too many flags. Fixes bug 9200; bugfix on 0.2.0.3-alpha. Found by coverity scan.
-
- Jun 29, 2013
-
-
Nick Mathewson authored
Ticket 9147.
-
- Jun 24, 2013
-
-
Nick Mathewson authored
(This caused a crash that was reported as bug 9122, but the underlying behavior has been wrong for a while.) Fix on 0.2.3.9-alpha.
-