Skip to content
Snippets Groups Projects
  1. Nov 12, 2010
  2. Nov 11, 2010
  3. Nov 10, 2010
  4. Oct 04, 2010
  5. Sep 28, 2010
  6. Sep 08, 2010
  7. Sep 03, 2010
    • Nick Mathewson's avatar
      Close a non-open OR connection *only* after KeepalivePeriod. · 4d2e9974
      Nick Mathewson authored
      When we introduced the code to close non-open OR connections after
      KeepalivePeriod had passed, we replaced some code that said
          if (!connection_is_open(conn)) {
           /* let it keep handshaking forever */
          } else if (do other tests here) {
            ...
      with new code that said
          if (!connection_is_open(conn) && past_keepalive) {
           /* let it keep handshaking forever */
          } else if (do other tests here) {
            ...
      
      This was a mistake, since it made all the other tests start applying
      to non-open connections, thus causing bug 1840, where non-open
      connections get closed way early.
      
      Fixes bug 1840.  Bugfix on 0.2.1.26 (commit 67b38d50).
      4d2e9974
  8. Aug 26, 2010
  9. Aug 18, 2010
  10. Aug 17, 2010
    • Nick Mathewson's avatar
      fc66a2ad
    • Nick Mathewson's avatar
      Scale CONSENSUS_MIN_SECONDS_BEFORE_CACHING by voting interval · 6f584813
      Nick Mathewson authored
      If the voting interval was short enough, the two-minutes delay
      of CONSENSUS_MIN_SECONDS_BEFORE_CACHING would confuse bridges
      to the point where they would assert before downloading a consensus.
      It it was even shorter (<4 minutes, I think), caches would
      assert too.  This patch fixes that by having replacing the
      two-minutes value with MIN(2 minutes, interval/16).
      
      Bugfix for 1141; the cache bug could occur since 0.2.0.8-alpha, so
      I'm calling this a bugfix on that.  Robert Hogan diagnosed this.
      Done as a patch against maint-0.2.1, since it makes it hard to
      run some kinds of testing networks.
      6f584813
  11. Aug 04, 2010
    • Nick Mathewson's avatar
      Remove the debian directory from the main git repository · e7d2a9b6
      Nick Mathewson authored
      Once upon a time it made sense to keep all the Debian files in the
      main Tor distribution, since repeatedly merging them back in was hard.
      Now that we're on git, that's no longer so.
      
      Peter's debian repository at debian/tor.git on our git server has the
      most recent version of the tor-on-debian packaging stuff, and the versions
      in our own repository have gotten out of date.
      
      Resolves bug #1735.
      e7d2a9b6
  12. Aug 03, 2010
  13. Jun 13, 2010
  14. Jun 11, 2010
  15. Jun 07, 2010
  16. May 06, 2010
  17. May 05, 2010
  18. Apr 24, 2010
  19. Apr 23, 2010
  20. Apr 13, 2010
    • Nick Mathewson's avatar
      Fix renegotiation on OpenSSL versions that backport RFC5746. · 6ad09cc6
      Nick Mathewson authored
      Our code assumed that any version of OpenSSL before 0.9.8l could not
      possibly require SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION.  This is
      so... except that many vendors have backported the flag from later
      versions of openssl when they backported the RFC5476 renegotiation
      feature.
      
      The new behavior is particularly annoying to detect.  Previously,
      leaving SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION unset meant that
      clients would fail to renegotiate.  People noticed that one fast!
      Now, OpenSSL's RFC5476 support means that clients will happily talk to
      any servers there are, but servers won't accept renegotiation requests
      from unpatched clients unless SSL_OP_ALLOW_etc is set.  More fun:
      servers send back a "no renegotiation for you!" error, which unpatched
      clients respond to by stalling, and generally producing no useful
      error message.
      
      This might not be _the_ cause of bug 1346, but it is quite likely _a_
      cause for bug 1346.
      6ad09cc6
  21. Apr 12, 2010
  22. Apr 04, 2010
  23. Mar 16, 2010
  24. Mar 15, 2010
  25. Mar 07, 2010
  26. Mar 04, 2010
    • Nick Mathewson's avatar
      Apply Roger's bug 1269 fix. · 3ff09239
      Nick Mathewson authored
      From http://archives.seul.org/tor/relays/Mar-2010/msg00006.html :
      
         As I understand it, the bug should show up on relays that don't set
         Address to an IP address (so they need to resolve their Address
         line or their hostname to guess their IP address), and their
         hostname or Address line fails to resolve -- at that point they'll
         pick a random 4 bytes out of memory and call that their address. At
         the same time, relays that *do* successfully resolve their address
         will ignore the result, and only come up with a useful address if
         their interface address happens to be a public IP address.
      3ff09239
  27. Mar 02, 2010
  28. Feb 27, 2010
  29. Feb 26, 2010
    • Sebastian Hahn's avatar
      Proper NULL checking in circuit_list_path_impl() · 86828e20
      Sebastian Hahn authored
      Another dereference-then-NULL-check sequence. No reports of this bug
      triggered in the wild. Fixes bugreport 1256.
      
      Thanks to ekir for discovering and reporting this bug.
      86828e20
    • Sebastian Hahn's avatar
      Proper NULL checking for hsdesc publication · f36c36f4
      Sebastian Hahn authored
      Fix a dereference-then-NULL-check sequence. This bug wasn't triggered
      in the wild, but we should fix it anyways in case it ever happens.
      Also make sure users get a note about this being a bug when they
      see it in their log.
      
      Thanks to ekir for discovering and reporting this bug.
      f36c36f4
Loading