1. 14 Dec, 2020 1 commit
    • Nick Mathewson's avatar
      Socks5: handle truncated client requests correctly · c4fe66e3
      Nick Mathewson authored
      Previously, our code would send back an error if the socks5 request
      parser said anything but DONE.  But there are other non-error cases,
      like TRUNCATED: we shouldn't send back errors for them.
      
      This patch lowers the responsibility for setting the error message
      into the parsing code, since the actual type of the error message
      will depend on what problem was encountered.
      
      Fixes bug 40190; bugfix on 0.3.5.1-alpha.
      c4fe66e3
  2. 17 Nov, 2020 1 commit
  3. 12 Nov, 2020 1 commit
  4. 09 Nov, 2020 2 commits
  5. 05 Nov, 2020 1 commit
  6. 14 Oct, 2020 1 commit
    • Nick Mathewson's avatar
      Implement proposal 318: Limit protovers to 0..63 · dd63b972
      Nick Mathewson authored
      In brief: we go through a lot of gymnastics to handle huge protover
      numbers, but after years of development we're not even close to 10
      for any of our current versions.  We also have a convenient
      workaround available in case we ever run out of protocols: if (for
      example) we someday need Link=64, we can just add Link2=0 or
      something.
      
      This patch is a minimal patch to change tor's behavior; it doesn't
      take advantage of the new restrictions.
      
      Implements #40133 and proposal 318.
      dd63b972
  7. 07 Oct, 2020 10 commits
  8. 22 Sep, 2020 1 commit
  9. 21 Sep, 2020 5 commits
  10. 18 Sep, 2020 3 commits
  11. 17 Sep, 2020 2 commits
  12. 01 Sep, 2020 1 commit
    • David Goulet's avatar
      conn: Remove assert on new listener connection when retrying · ea339227
      David Goulet authored
      
      
      Opening a new listener connection can fail in many ways like a bind()
      permission denied on a low port for instance.
      
      And thus, we should expect to handle an error when creating a new one instead
      of assert() on it.
      
      To hit the removed assert:
      
        ORPort 80
        KeepBindCapabilities 0
      
      Start tor. Then edit torrc:
      
        ORPort <some-IP>:80
      
      HUP tor and the assert is hit.
      
      Fixes #40073
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      ea339227
  13. 13 Aug, 2020 3 commits
  14. 12 Aug, 2020 5 commits
  15. 11 Aug, 2020 3 commits