- Oct 02, 2013
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
- Oct 01, 2013
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Nick Mathewson authored
Now that we no longer build it from torify.in, we need to list it manually.
-
Nick Mathewson authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Sep 30, 2013
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Sep 29, 2013
-
-
-
Nick Mathewson authored
-
Since torify has been removed from tsocks, it doesn't need to be preprocessed. Closes #5505.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Sep 27, 2013
-
-
Roger Dingledine authored
-
- Sep 25, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
To fix #6033, we disabled TLS 1.1 and 1.2. Eventually, OpenSSL fixed the bug behind #6033. I've considered alternate implementations that do more testing to see if there's secretly an OpenSSL 1.0.1c or something that secretly has a backport of the OpenSSL 1.0.1e fix, and decided against it on the grounds of complexity.
-
- Sep 24, 2013
-
-
Nick Mathewson authored
-
-
- Sep 23, 2013
-
-
Nick Mathewson authored
Makes mingw64 a bit happier.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Sep 21, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This avoids skew warnings as authorities test reachability. Fix 9798; fix not on any released Tor.
-
Roger Dingledine authored
-
Roger Dingledine authored
this was causing directory authorities to send a time of 0 on all connections they generated themselves, which means everybody reachability test caused a time skew warning in the log for that relay. (i didn't just revert, because the changes file has been modified by other later commits.)
-
- Sep 20, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Implements part of proposal 222. We can do this safely, since REND_CACHE_MAX_SKEW is 24 hours.
-
Nick Mathewson authored
This isn't actually much of an issue, since only relays send AUTHENTICATE cells, but while we're removing timestamps, we might as well do this too. Part of proposal 222. I didn't take the approach in the proposal of using a time-based HMAC, since that was a bad-prng-mitigation hack from SSL3, and in real life, if you don't have a good RNG, you're hopeless as a Tor server.
-
Nick Mathewson authored
For now, round down to the nearest 10 minutes. Later, eliminate entirely by setting a consensus parameter. (This rounding is safe because, in 0.2.2, where the timestamp mattered, REND_REPLAY_TIME_INTERVAL was a nice generous 60 minutes.)
-
Nick Mathewson authored
Implements part of proposal 222.
-
Nick Mathewson authored
a9910d89 added trickery to make us work with interned strings and seccomp; it requires libevent 2. Fix for 9785; bug not in any released tor.
-
- Sep 19, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-