- Sep 24, 2015
-
-
Nick Mathewson authored
-
- Sep 22, 2015
-
-
teor (Tim Wilson-Brown) authored
Update the definition of the private exit policy in the man page and torrcs. It didn't get merged correctly into the man page, and it was incomplete in the torrcs. (Unfortunately, we only reject the primary configured IPv4 and IPv6 addresses, not all configured IPv4 and IPv6 addresses.) Also fixup msn page formatting errors from changes in tickets 16069 and 17027, mainly unescaped *s.
-
teor (Tim Wilson-Brown) authored
-
teor (Tim Wilson-Brown) authored
Advise users how to configure separate IPv4 and IPv6 exit policies in the manpage and sample torrcs. Related to fixes in ticket #16069 and #17027. Patch by "teor". Patch on 2eb7eafc and a96c0aff (25 Oct 2012), released in 0.2.4.7-alpha.
-
- Sep 15, 2015
-
-
teor (Tim Wilson-Brown) authored
ExitPolicyRejectPrivate now rejects more local addresses by default: * the relay's published IPv6 address (if any), and * any publicly routable IPv4 or IPv6 addresses on any local interfaces. This resolves a security issue for IPv6 Exits and multihomed Exits that trust connections originating from localhost. Resolves ticket 17027. Patch by "teor". Patch on 42b8fb5a (11 Nov 2007), released in 0.2.0.11-alpha.
-
teor (Tim Wilson-Brown) authored
In previous versions of Tor, ExitPolicy accept6/reject6 * produced policy entries for IPv4 and IPv6 wildcard addresses. To reduce operator confusion, change accept6/reject6 * to only produce an IPv6 wildcard address. Resolves bug #16069. Patch on 2eb7eafc and a96c0aff (25 Oct 2012), released in 0.2.4.7-alpha.
-
- Sep 08, 2015
-
-
This controls the circuit dirtyness reset behavior added for Tor Browser's user experience fix (#15482). Unlike previous iterations of this patch, the tunable actually works, and is documented.
-
- Sep 04, 2015
-
-
Nick Mathewson authored
When this is set, and Tor is running as a relay, it will not generate or load its secret identity key. You can manage the secret identity key with --keygen. Implements ticket 16944.
-
- Sep 03, 2015
-
-
Nick Mathewson authored
-
- Sep 02, 2015
-
-
David Goulet authored
HiddenServiceStatistics option is now set to "1" by default. Fixes #15254 Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Sep 01, 2015
-
-
- Aug 25, 2015
-
-
Nick Mathewson authored
-
- Aug 21, 2015
-
-
- Aug 18, 2015
-
-
teor authored
"option to prevent guard,exit,hsdir flag assignment" "A node will never receive the corresponding flag unless that node is specified in the TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of its uptime, bandwidth, exit policy, or DirPort". Patch modified by "teor": VoteOnHidServDirectoriesV2 is now obsolete, so TestingDirAuthVoteHSDir always votes on HSDirs. Closes ticket 14882. Patch by "robgjansen". Commit message and changes file by "teor" with quotes from "robgjansen".
-
teor authored
Fix an error in the manual page and comments for TestingDirAuthVoteHSDir, which suggested that a HSDir required "ORPort connectivity". While this is true, it is in no way unique to the HSDir flag. Of all the flags, only HSDirs need a DirPort configured in order for the authorities to assign that particular flag. Fixed as part of 14882. Patch by "teor". Bugfix on 0.2.6.3 (f9d57473 on 10 January 2015).
-
- Aug 05, 2015
-
-
Nick Mathewson authored
-
- Aug 03, 2015
-
-
Nick Mathewson authored
-
- Jul 24, 2015
-
-
I think this section slipped downwards when flags where added.
-
- Jul 23, 2015
-
-
Nick Mathewson authored
-
- Jul 22, 2015
-
-
Nick Mathewson authored
This should make it more clear what I meant, if you know how to read ABNF. (Thanks to rl1987 for correcting numerous issues here)
-
- Jul 20, 2015
-
-
Nick Mathewson authored
Closes ticket 2325
-
- Jun 29, 2015
-
-
David Goulet authored
This is a way to specify the amount of introduction points an hidden service can have. Maximum value is 10 and the default is 3. Fixes #4862 Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Jun 10, 2015
-
-
Andrea Shepard authored
-
- Jun 05, 2015
-
-
teor authored
Document use of coverity, clang static analyzer, and clang dynamic undefined behavior and address sanitizers in doc/HACKING. Add clang dynamic sanitizer blacklist in contrib/clang/sanitizer_blacklist.txt to exempt known undefined behavior. Include detailed usage instructions in this blacklist file. Patch by "teor".
-
- May 28, 2015
-
-
Nick Mathewson authored
-
- May 26, 2015
-
-
rl1987 authored
-
- May 20, 2015
-
-
Yawning Angel authored
When set, this limits the maximum number of simultaneous streams per rendezvous circuit on the server side of a HS, with further RELAY_BEGIN cells being silently ignored. This can be modified via "HiddenServiceMaxStreamsCloseCircuit", which if set will cause offending rendezvous circuits to be torn down instead. Addresses part of #16052.
-
- May 11, 2015
-
-
Nick Mathewson authored
-
- May 07, 2015
-
-
Nick Mathewson authored
Also, add some sample tests to be examples.
-
- Apr 22, 2015
-
-
Nick Mathewson authored
-
- Apr 08, 2015
-
-
Roger Dingledine authored
-
- Apr 07, 2015
-
-
-
Nick Mathewson authored
-
- Apr 01, 2015
-
-
Nick Mathewson authored
-
- Mar 25, 2015
-
-
Nick Mathewson authored
-
- Mar 24, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Mar 14, 2015
-
-
Fixes the following rules in out-of-tree builds; - check-spaces - check-docs - check-logs - Doxygen - coverage-html And cleans up additional directories; - coverage_html - doc/doxygen
-
- Mar 12, 2015
-
-
Linus Nordberg authored
-
- Mar 11, 2015
-
-
Nick Mathewson authored
Closes ticket 15220
-