- Sep 04, 2012
-
-
Linus Nordberg authored
-
Linus Nordberg authored
-
-
Generate and store all supported microdescriptor formats. Generate votes with one "m" line for each format. Only "m" lines with version info matching chosen consensus method will be voted upon. An optimisation would be to combine "m" lines with identical hashes, i.e. instead of "m 1,2,3 H1" and "m 4,5 H1", say "m 1,2,3,4,5 H1".
-
Define new new consensus method 14 adding "a" lines to vote and consensus documents. From proposal 186: As with other data in the vote derived from the descriptor, the consensus will include whichever set of "a" lines are given by the most authorities who voted for the descriptor digest that will be used for the router. This patch implements this.
-
Nick Mathewson authored
This is the preferred filename to use with Autoconf 2.50 and later.
-
Roger Dingledine authored
-
Roger Dingledine authored
specifically, specify what sort of routers we're fetching.
-
- Sep 03, 2012
-
-
Roger Dingledine authored
Reserve it for when new directory information arrives in response to a fetch. Resolves ticket 6760.
-
Roger Dingledine authored
Addresses bug 6759.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Aug 27, 2012
-
-
Nick Mathewson authored
Fix for #6251
-
Nick Mathewson authored
We've had over two months to fix them, and didn't. Now we need 0.2.3.x stable. Yes, it would be cool to get this working in 0.2.3.x, but not at the expense of delaying every other feature that _does_ work in 0.2.3.x. We can do a real fix in 0.2.4.
-
Nick Mathewson authored
This can create a remote crash opportunity for/against directory authorities.
-
Nick Mathewson authored
This is important, since otherwise an attacker can use timing info to probe the internal network. Also, add an option (ExtendAllowPrivateAddresses) so that TestingTorNetwork won't break. Fix for bug 6710; bugfix on all released versions of Tor.
-
Nick Mathewson authored
-
-
- Aug 24, 2012
-
-
Nick Mathewson authored
This comes at the cost of making its failure message a little less friendly, but since when do assertion failures count as user-friendly?
-
Nick Mathewson authored
-
Mike Perry authored
We were effectively resetting our counts, and the rounding error leads to incorrect log messages.
-
Mike Perry authored
Also make a couple of them less scary. We'll do a separate, additional commit on 0.2.4.x to bump them back up again.
-
Mike Perry authored
This should eliminate a lot of notices for Directory Authorities and other situations where circuits built without using guard nodes.
-
- Aug 23, 2012
-
-
Linus Nordberg authored
Move extend_info_from_router() from circuitbuild.c to router.c and make it static. Add get_configured_bridge_by_orports_digest() and have get_configured_bridge_by_routerinfo() and node_is_a_configured_bridge() use it. We now consider all OR ports of a bridge when looking for it. Move node_get_*_orport to nodelist.c. Fix a cut'n'paste error in header of nodelist.h. Add node_assert_ok(). Add router_get_all_orports(). It's duplicating code from node_get_all_orports(). Worth fixing at the cost of complicating the API slightly?
-
Nick Mathewson authored
-
- Aug 21, 2012
-
-
Linus Nordberg authored
The my_apparent_addr is still unused, apart from now being logged in the "Got good NETINFO cell" info message.
-
Nick Mathewson authored
There was some code in the "err:" block that would always log a warning, reporting an "unknown error" if we hadn't set err_msg. But there were also plenty of "goto err" blocks that did their own logging, and never set err_msg at all. Now we should only log when we have an error message to log. This fixes bug 6638, from no released Tor version.
-
- Aug 20, 2012
-
-
Linus Nordberg authored
Closes #6364.
-
- Aug 19, 2012
-
-
Linus Nordberg authored
Closes #6362.
-
- Aug 17, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Failure to do this would lead to double-free cases and similar, especially when the exit's DNS was broken. See bug 6472 for full details; this is a fix for 6472. Anonymous patch from "cypherpunks" on trac.
-
Nick Mathewson authored
Long ago, before we had cell queues, it was necessary to maybe call connection_handle_write() from connectino_write_to_buf_impl() on OR connections, so that we wouldn't get into a loop of reading infinite amounts of data and queueing it all on an outbuf before bothering to write any data. If that doesn't sounds like what our code does now, you're right: right now, we won't stick more than OR_CONN_HIGHWATER bytes of cells on an outbuf, and we won't suck more than CELL_QUEUE_HIGHWATER_SIZE cells off any edge connection. So, there's no more call for that code. Removing this code will simplify our data flow, and that should be something we can all get behind.
-
Closes #6423.
-
Nick Mathewson authored
Apparently, (void)writev is not enough to suppress the "you are ignoring the return value!" warnings on Linux. Instead, remove the whole warning/error logic when compiling openbsd_malloc for Tor: we can't use it.
-
Nick Mathewson authored
-
Linus Nordberg authored
Resolves #6621.
-
- Aug 16, 2012
-
-
Mike Perry authored
Also promote log messages to notice and rate-limit them.
-
Mike Perry authored
This is done to avoid spurious warns. Additional log lines are also added to try to track down the codepaths where we are somehow overcounting success counts.
-
- Aug 15, 2012
-
-
Nick Mathewson authored
The warning fixes are: - Only define issetugid if it's missing. - Explicitly ignore the return value of writev. - Explicitly cast the retval of readlink() to int. The 64-bit problems are related to just storing a size_t in an int. Not cool! Use a size_t instead. Fix for bug 6379. Bugfix on 0.2.0.20-rc, which introduced openbsd-malloc.
-
Nick Mathewson authored
Apparently, we weren't actually detecting wildcardedness when parsing them: whoops! bug 6244. Bugfix on 0.2.3.9-alpha
-