- Sep 22, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Conflicts: src/test/test_policy.c
-
Roger Dingledine authored
-
-
-
-
-
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Roger Dingledine authored
Allow clients to use optimistic data when connecting to a hidden service, which should cut out the initial round-trip for client-side programs including Tor Browser. (Now that Tor 0.2.2.x is obsolete, all hidden services should support server-side optimistic data.) See proposal 181 for details. Implements ticket 13211.
-
- Sep 21, 2014
-
-
Roger Dingledine authored
I think we should know the routerstatus for our exit relay, since we built a circuit to it. So I think this is just a code simplication.
-
Roger Dingledine authored
Clients are now willing to send optimistic circuit data (before they receive a 'connected' cell) to relays of any version. We used to only do it for relays running 0.2.3.1-alpha or later, but now all relays are new enough. Resolves ticket 13153.
-
Roger Dingledine authored
-
Roger Dingledine authored
Return an error when the second or later arguments of the "setevents" controller command are invalid events. Previously we would return success while silently skipping invalid events. Fixes bug 13205; bugfix on 0.2.3.2-alpha. Reported by "fpxnns".
-
- Sep 20, 2014
-
-
Roger Dingledine authored
-
Roger Dingledine authored
Conflicts: src/or/config.c
-
Roger Dingledine authored
-
-
- Sep 19, 2014
-
-
intrigeri authored
Note that this will likely need to be folded with the changes file for #12751, as this change is a mere fixup on top of the changes introduced for #12751.
-
intrigeri authored
For some strange reason, this was not needed with systemd v208. But it's needed with systemd v215 on current Debian sid, and entirely makes sense.
-
- Sep 18, 2014
-
-
Nick Mathewson authored
-
Stop modifying the value of our DirReqStatistics torrc option just because we're not a bridge or relay. This bug was causing Tor Browser users to write "DirReqStatistics 0" in their torrc files as if they had chosen to change the config. Fixes bug 4244; bugfix on 0.2.3.1-alpha.
-
Nick Mathewson authored
Bugfix on ed8f020e; bug not in any released version of Tor. Found by Coverity; this is CID 1239290.
-
Nick Mathewson authored
Fixes bug 11679; bugfix on 0.2.2.6-alpha
-
Nick Mathewson authored
Patch from teor; ticket 13177.
-
- Sep 17, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Sep 16, 2014
-
-
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Clients now send the correct address for their chosen rendezvous point when trying to access a hidden service. They used to send the wrong address, which would still work some of the time because they also sent the identity digest of the rendezvous point, and if the hidden service happened to try connecting to the rendezvous point from a relay that already had a connection open to it, the relay would reuse that connection. Now connections to hidden services should be more robust and faster. Also, this bug meant that clients were leaking to the hidden service whether they were on a little-endian (common) or big-endian (rare) system, which for some users might have reduced their anonymity. Fixes bug 13151; bugfix on 0.2.1.5-alpha.
-