- Mar 08, 2011
-
-
Roger Dingledine authored
-
Nick Mathewson authored
This is based on shitlei's fix for bug2629, with extra parens removed. Fixes bug 2629, bugfix on 0.2.1.2-alpha.
-
- Mar 06, 2011
-
-
Nick Mathewson authored
We need to _REJECT_ descriptors with accept6/reject6 lines. If we let them onto the network , other un-upgraded tors will crash.
-
Nick Mathewson authored
This reverts commit b3918b3b.
-
Nick Mathewson authored
-
Sebastian Hahn authored
This fixes a remotely triggerable assert on directory authorities, who don't handle descriptors with ipv6 contents well yet. We will want to revert this once we're ready to handle ipv6. Issue raised by lorth on #tor, who wasn't able to use Tor anymore. Analyzed with help from Christian Fromme. Fix suggested by arma. Bugfix on 0.2.1.3-alpha.
-
- Mar 05, 2011
-
-
Sebastian Hahn authored
We want to use the discard port correctly, so a htons() was missing. Also we need to set it correctly depending on address family. Review provided by danieldg
-
Sebastian Hahn authored
The third argument for connect should be dependent on the address family. Issue spotted by piebeer who also wrote the patch.
-
- Mar 04, 2011
-
-
Nick Mathewson authored
-
- Mar 01, 2011
-
-
Nick Mathewson authored
This should fix a bug that special ran into, where if your state file didn't record period maxima, it would never decide that it had successfully parsed itself unless you got lucky with your uninitialized-variable values. This patch also tries to improve error messags in the case where a maximum value legitimately doesn't parse.
-
Sebastian Hahn authored
Rename the _UsingTestingTorNetwork hidden option to _UsingTestNetworkDefaults (thanks Nick for the suggestion) and added a changes file.
-
- Feb 26, 2011
-
-
Sebastian Hahn authored
also log about running changes, even on a bridge authority.
-
Sebastian Hahn authored
In private networks, the defaults for some options are changed. This means that in options_validate(), where we're testing that the defaults are what we think they are, we fail. Use a workaround by setting a hidden configuration option _UsingTestingTorNetwork when we have altered the configuration this way, so that options_validate() can do the right thing. Fixes bug 2250, bugfix on 0.2.1.2-alpha (the version introducing private network options).
-
- Feb 24, 2011
-
-
Karsten Loesing authored
-
- Feb 22, 2011
-
-
Roger Dingledine authored
-
Nick Mathewson authored
Patch from "postman" on trac. Fixes bg 2366. Bug on 0.1.2.5-alpha.
-
Nick Mathewson authored
-
- Feb 16, 2011
-
-
Robert Ransom authored
Fixes bug 2572.
-
- Feb 11, 2011
-
-
Sebastian Hahn authored
Once again spotted by mobmix Also add a changes file for the fix
-
- Feb 10, 2011
-
-
Roger Dingledine authored
-
Nick Mathewson authored
Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance. (Backport from 0.2.2's 5ed73e38)
-
- Feb 09, 2011
-
-
Robert Ransom authored
Fixes #2408.
-
- Feb 08, 2011
-
-
Sebastian Hahn authored
Patch our implementation of tor_lockfile_lock() to handle this case correctly. Also add a note that blocking behaviour differs from windows to *nix. Fixes bug 2504, issue pointed out by mobmix.
-
Roger Dingledine authored
-
Roger Dingledine authored
fixes bug 2470
-
-
- Feb 07, 2011
-
-
Sebastian Hahn authored
rransom noticed that a change of ORPort is just as bad as a change of IP address from a client's perspective, because both mean that the relay is not available to them while the new information hasn't propagated. Change the bug1035 fix accordingly. Also make sure we don't log a bridge's IP address (which might happen when we are the bridge authority).
-
Nick Mathewson authored
-
Sebastian Hahn authored
both noticed by rransom
-
- Feb 04, 2011
-
-
Robert Ransom authored
-
- Feb 03, 2011
-
-
Fix for #2358
-
- Jan 26, 2011
-
-
Nick Mathewson authored
Suggested by rransom. Probably necessary for testing network mode.
-
Nick Mathewson authored
When calling circuit_build_times_shuffle_and_store_array, we were passing a uint32_t as an int. arma is pretty sure that this can't actually cause a bug, because of checks elsewhere in the code, but it's best not to pass a uint32_t as an int anyway. Found by doorss; fix on 0.2.2.4-alpha.
-
Nick Mathewson authored
We detect and reject said attempts if there is no chosen exit node or circuit: connecting to a private addr via a randomly chosen exit node will usually fail (if all exits reject private addresses), is always ill-defined (you're not asking for any particular host or service), and usually an error (you've configured all requests to go over Tor when you really wanted to configure all _remote_ requests to go over Tor). This can also help detect forwarding loop requests. Found as part of bug2279.
-
Nick Mathewson authored
Fixes part of bug 2279. Bugfix on 0.1.2.1-alpha.
-
- Jan 25, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This bug was noticed by cypherpunks; fixes bug 2378. Bugfix on svn commit r110.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-