- Jan 25, 2011
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Jan 24, 2011
-
-
Roger Dingledine authored
-
Nick Mathewson authored
Our regular DH parameters that we use for circuit and rendezvous crypto are unchanged. This is yet another small step on the path of protocol fingerprinting resistance.
-
- Jan 20, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Robert Ransom authored
Found by piebeer.
-
- Jan 19, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This patch imposes (very long) limits on the length of a line in a directory document, and on the length of a certificate. I don't think it should actually be possible to overrun these remotely, since we already impose a maximum size on any directory object we're downloading, but a little defensive programming never hurt anybody. Roger emailed me that doorss reported these on IRC, but nobody seems to have put them on the bugtracker.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Jan 16, 2011
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
- Jan 15, 2011
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Nick Mathewson authored
-
Nick Mathewson authored
we need to do more hunting, but this fixes the ones mentioned in 2385.
-
Nick Mathewson authored
Found by cypherpunks; fixes bug 2384.
-
Sebastian Hahn authored
-
Sebastian Hahn authored
Based on discussion in bug 2317, these values seem to be sane.
-
Sebastian Hahn authored
This addresses Nick's concern about doing non-constant bounds checking inside networkstatus_get_param().
-
Sebastian Hahn authored
-
Sebastian Hahn authored
We need to make sure that the worst thing that a weird consensus param can do to us is to break our Tor (and only if the other Tors are reliably broken in the same way) so that the majority of directory authorities can't pull any attacks that are worse than the DoS that they can trigger by simply shutting down. One of these worse things was the cbtnummodes parameter, which could lead to heap corruption on some systems if the value was sufficiently large. This commit fixes this particular issue and also introduces sanity checking for all consensus parameters.
-
Sebastian Hahn authored
This prepares for making the accessor method for consensus parameters safer in the next commit.
-
Nick Mathewson authored
Conflicts: src/or/routerparse.c src/or/test.c
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This is checked elsewhere too, but let's be RFC-conformant.
-
Nick Mathewson authored
-
Nick Mathewson authored
-