- Aug 13, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Aug 09, 2014
-
-
Nick Mathewson authored
patch from mttp; fixes 12830
-
Roger Dingledine authored
-
- Aug 08, 2014
-
-
Nick Mathewson authored
-
- Aug 06, 2014
-
-
Roger Dingledine authored
When Tor starts with DisabledNetwork set, it would correctly conclude that it shouldn't try making circuits, but it would mistakenly cache this conclusion and continue believing it even when DisableNetwork is set to 0. Fixes the bug introduced by the fix for bug 11200; bugfix on 0.2.5.4-alpha.
-
Roger Dingledine authored
-
- Aug 03, 2014
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Jul 30, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Conflicts: contrib/dist/tor.service.in
-
Nick Mathewson authored
-
intrigeri authored
-
intrigeri authored
Our current systemd unit uses "Type = simple", so systemd does not expect tor to fork. If the user has "RunAsDaemon 1" in their torrc, then things won't work as expected. This is e.g. the case on Debian (and derivatives), since there we pass "--defaults-torrc /usr/share/tor/tor-service-defaults-torrc" (that contains "RunAsDaemon 1") by default. The only solution I could find is to explicitly pass "--RunAsDaemon 0" when starting tor from the systemd unit file, which this commit does.
-
- Jul 28, 2014
-
-
-
Roger Dingledine authored
-
Roger Dingledine authored
Conflicts: configure.ac contrib/win32build/tor-mingw.nsi.in src/win32/orconfig.h
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
Those used to be normal to receive on hidden service circuits due to bug 1038, but the buggy Tor versions are long gone from the network so we can afford to resume watching for them. Resolves the rest of bug 1038; bugfix on 0.2.1.19.
-
- Jul 27, 2014
-
-
Roger Dingledine authored
-
-
- Jul 25, 2014
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
Conflicts: src/or/or.h
-
Roger spotted this on tor-dev in his comments on proposal 221. (Actually, detect DESTROY vs everything else, since arma likes network timeout indicating failure but not overload indicating failure.)
-
This makes FastFirstHopPK an AUTOBOOL; makes the default "auto"; and makes the behavior of "auto" be "look at the consensus."
-
- Jul 24, 2014
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
This function is supposed to construct a list of all the ciphers in the "v2 link protocol cipher list" that are supported by Tor's openssl. It does this by invoking ssl23_get_cipher_by_char on each two-byte ciphersuite ID to see which ones give a match. But when ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS ciphersuite ID, it checks to see whether it has a match for a three-byte SSL2 ciphersuite ID. This was causing a read off the end of the 'cipherid' array. This was probably harmless in practice, but we shouldn't be having any uninitialized reads. (Using ssl23_get_cipher_by_char in this way is a kludge, but then again the entire existence of the v2 link protocol is kind of a kludge. Once Tor 0.2.2 clients are all gone, we can drop this code entirely.) Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.
-
Roger Dingledine authored
-
Roger Dingledine authored
-