- Aug 05, 2014
-
-
Nick Mathewson authored
Fixes bug 12728; bugfix on 0.2.1.7-alpha when the SPLIT_IGNORE_SPACE option was added.
-
- Jul 28, 2014
-
-
Roger Dingledine authored
-
Roger Dingledine authored
Those used to be normal to receive on hidden service circuits due to bug 1038, but the buggy Tor versions are long gone from the network so we can afford to resume watching for them. Resolves the rest of bug 1038; bugfix on 0.2.1.19.
-
- Jul 27, 2014
-
-
Roger Dingledine authored
-
-
- Jul 25, 2014
-
-
Roger spotted this on tor-dev in his comments on proposal 221. (Actually, detect DESTROY vs everything else, since arma likes network timeout indicating failure but not overload indicating failure.)
-
This makes FastFirstHopPK an AUTOBOOL; makes the default "auto"; and makes the behavior of "auto" be "look at the consensus."
-
- Jul 24, 2014
-
-
This function is supposed to construct a list of all the ciphers in the "v2 link protocol cipher list" that are supported by Tor's openssl. It does this by invoking ssl23_get_cipher_by_char on each two-byte ciphersuite ID to see which ones give a match. But when ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS ciphersuite ID, it checks to see whether it has a match for a three-byte SSL2 ciphersuite ID. This was causing a read off the end of the 'cipherid' array. This was probably harmless in practice, but we shouldn't be having any uninitialized reads. (Using ssl23_get_cipher_by_char in this way is a kludge, but then again the entire existence of the v2 link protocol is kind of a kludge. Once Tor 0.2.2 clients are all gone, we can drop this code entirely.) Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
When specified, it overrides our default of 3 entry guards. (By default, it overrides the number of directory guards too.) Implements ticket 12688.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jul 21, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jul 18, 2014
-
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Jul 15, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jun 11, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jun 10, 2014
-
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- May 16, 2014
-
-
Nick Mathewson authored
(See discussion on #9553)
-
- May 08, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- May 01, 2014
-
-
Nick Mathewson authored
Conflicts: src/or/microdesc.c
-
Nick Mathewson authored
The 0.2.5.x warning is the one that might help us track this down; the warnings in stable are just annoying users over and over and over.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Apr 30, 2014
-
-
Nick Mathewson authored
on #9686, gmorehose reports that the 500 MB lower limit is too high for raspberry pi users. This is a backport of 64724872 to 0.2.4. Note that in 0.2.4, the option is called MaxMemInCellQueues.
-
- Apr 29, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
When clearing a list of tokens, it's important to do token_clear() on them first, or else any keys they contain will leak. This didn't leak memory on any of the successful microdescriptor parsing paths, but it does leak on some failing paths when the failure happens during tokenization. Fixes bug 11618; bugfix on 0.2.2.6-alpha.
-
- Apr 25, 2014
-
-
Nick Mathewson authored
Fixes bug 10849; bugfix on 0.2.1.1-alpha (I believe)
-
- Apr 23, 2014
-
-
Nick Mathewson authored
-
- Apr 18, 2014
-
-
Nick Mathewson authored
Fixes the surface behavior of #11553
-
- Apr 17, 2014
-
-
Nick Mathewson authored
The server cipher list is (thanks to #11513) chosen systematically to put the best choices for Tor first. The client cipher list is chosen to resemble a browser. So let's set SSL_OP_CIPHER_SERVER_PREFERENCE to have the servers pick according to their own preference order.
-