- Aug 03, 2012
-
-
Nick Mathewson authored
I don't personally agree that this is likely to be easy to exploit, and some initial experimention I've done suggests that cache-miss times are just plain too fast to get useful info out of when they're mixed up with the rest of Tor's timing noise. Nevertheless, I'm leaving Robert's initial changelog entry in the git history so that he can be the voice of reason if I'm wrong. :)
-
Tor's and OpenSSL's current design guarantee that there are other leaks, but this one is likely to be more easily exploitable, and is easy to fix.
-
Nick Mathewson authored
-
Nick Mathewson authored
Fix for 6530; fix on 0.2.2.6-alpha.
-
- Jul 06, 2012
-
-
Roger Dingledine authored
The June 2012 db marks too many relays as country "A1". Addresses bug 6334.
-
- Jun 13, 2012
-
-
Karsten Loesing authored
Manually removed range 0.116.0.0 to 0.119.255.255 which Maxmind says is assigned to AT. This is very likely a bug in their database, because 0.0.0.0/8 is a reserved range.
-
- Jun 07, 2012
-
-
Robert Ransom authored
Fixes bug 6094; bugfix on commit 3a9351b5.
-
- Jun 04, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This fixes a DoS issue where a client could send so much data in 5 minutes that they exhausted the server's RAM. Fix for bug 5934 and 6007. Bugfix on 0.2.0.20-rc, which enabled the v2 handshake.
-
- Jun 03, 2012
-
-
Nick Mathewson authored
It appears that when OpenSSL negotiates a 1.1 or 1.2 connection, and it decides to renegotiate, the client will send a record with version "1.0" rather than with the current TLS version. This would cause the connection to fail whenever both sides had OpenSSL 1.0.1, and the v2 Tor handshake was in use. As a workaround, disable TLS 1.1 and TLS 1.2. When a later version of OpenSSL is released, we can make this conditional on running a fixed version of OpenSSL. Alternatively, we could disable TLS 1.1 and TLS 1.2 only on the client side. But doing it this way for now means that we not only fix TLS with patched clients; we also fix TLS when the server has this patch and the client does not. That could be important to keep the network running well. Fixes bug 6033.
-
- May 31, 2012
-
-
I called it a bugfix on 0.2.0.10-alpha, since git commit e5885dea is where we introduced anonymized begin_dir connections.
-
Nick Mathewson authored
This solves bug 5283, where client traffic could get sent over the same circuit as an anonymized connection to a directory, even if that circuit used an exit node unsuitable for clients. By marking the directory connection as needs_internal, we ensure that the (non-internal!) client-traffic connection won't be sent over the same circuit.
-
Nick Mathewson authored
-
- May 30, 2012
-
-
Nick Mathewson authored
It turns out that if you set the third argument of __attribute__(format) to 0, GCC and Clang will check the format argument without expecting to find variadic arguments. This is the correct behavior for vsnprintf, vasprintf, and vscanf. I'm hoping this will fix bug 5969 (a clang warning) by telling clang that the format argument to tor_vasprintf is indeed a format string.
-
- May 16, 2012
-
-
Nick Mathewson authored
(When the correct answer is given in terms of seconds since the epoch, it's hard to be sure that it really is the right answer just by reading the code.)
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
* It seems parse_http_time wasn't parsing correctly any date with commas (RFCs 1123 and 850). Fix that. * It seems parse_http_time was reporting the wrong month (they start at 0, not 1). Fix that. * Add some tests for parse_http_time, covering all three formats.
-
Nick Mathewson authored
The original code updated some variables, but forgot to remove a replaced old-routerdesc from rl->old_routers. Related to bug 1776.
-
- May 15, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- May 10, 2012
-
-
Roger Dingledine authored
-
Nick Mathewson authored
-
Ravi Chandra Padmala authored
-
Ravi Chandra Padmala authored
Fix #5760
-
- May 07, 2012
-
-
Nick Mathewson authored
The underlying strtoX functions handle overflow by saturating and setting errno to ERANGE. If the min/max arguments to the tor_parse_* functions are equal to the minimum/maximum of the underlying type, then with the old approach, we wouldn't treat a too-large value as genuinely broken. Found this while looking at bug 5786; bugfix on 19da1f36 (in Tor 0.0.9), which introduced these functions.
-
Karsten Loesing authored
-
- Apr 19, 2012
-
-
Nick Mathewson authored
Fix for 5647; bugfix on 0.2.1.5-alpha.
-
(Cherry-picked from 6ba13e4 by nickm)
-
- Apr 11, 2012
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Apr 10, 2012
-
-
Nick Mathewson authored
Bugfix on 0.2.2.1-alpha, which added the orginal HTTP proxy authentication code. Fix for bug 5593.
-
- Apr 05, 2012
-
-
Nick Mathewson authored
-
- Apr 04, 2012
-
-
Sebastian Hahn authored
As per ticket 5569
-