- May 01, 2014
-
-
Nick Mathewson authored
The 0.2.5.x warning is the one that might help us track this down; the warnings in stable are just annoying users over and over and over.
-
Nick Mathewson authored
-
- Apr 29, 2014
-
-
Nick Mathewson authored
When clearing a list of tokens, it's important to do token_clear() on them first, or else any keys they contain will leak. This didn't leak memory on any of the successful microdescriptor parsing paths, but it does leak on some failing paths when the failure happens during tokenization. Fixes bug 11618; bugfix on 0.2.2.6-alpha.
-
- Apr 25, 2014
-
-
Nick Mathewson authored
Fixes bug 10849; bugfix on 0.2.1.1-alpha (I believe)
-
- Apr 16, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Now it only has dannenberg
-
- Apr 15, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Fixes bug 11519, apparently bugfix on 0.2.3.11-alpha.
-
- Apr 14, 2014
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
I used a list of certificate files from arma, and a little script, both at 11464.
-
Nick Mathewson authored
(I need a list of actual signing keys to blacklist.)
-
- Feb 25, 2014
-
-
Karsten Loesing authored
See 1d2179bc in master for details. """ Fall back to registered country if necessary. When extracting geoip and geoip6 files from MaxMind's GeoLite2 Country database, we only look at country->iso_code which is the two-character ISO 3166-1 country code of the country where MaxMind believes the end user is located. But if MaxMind thinks a range belongs to anonymous proxies, they don't put anything there. Hence, we omit those ranges and resolve them all to '??'. That's not what we want. What we should do is first try country->iso_code, and if there's no such key, try registered_country->iso_code which is the country in which the ISP has registered the IP address. In short: let's fill all A1 entries with what ARIN et. al think. """
-
- Feb 15, 2014
-
-
Nick Mathewson authored
-
- Feb 08, 2014
-
-
Karsten Loesing authored
-
- Nov 15, 2013
-
-
Nick Mathewson authored
-
- Nov 07, 2013
-
-
Nick Mathewson authored
Previously, when we ran low on memory, we'd close whichever circuits had the most queued cells. Now, we close those that have the *oldest* queued cells, on the theory that those are most responsible for us running low on memory, and that those are the least likely to actually drain on their own if we wait a little longer. Based on analysis from a forthcoming paper by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
-
- Oct 11, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Oct 10, 2013
-
-
Nick Mathewson authored
Fix format_helper_exit_status to allow full HEX_ERRNO_SIZE answers, *and* increase the buffer length again.
-
Nick Mathewson authored
-
- Oct 08, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This is probably not an exploitable bug, since you would need to have errno be a large negative value in the unix pluggable-transport launcher case. Still, best avoided. Fixes bug 9928; bugfix on 0.2.3.18-rc.
-
- Sep 18, 2013
-
-
Nick Mathewson authored
The problem was that the server_identity_key_is_set() function could return true under conditions where we don't really have an identity key -- specifically, where we used to have one, but we stopped being a server. This is a fix for 6979; bugfix on 0.2.2.18-alpha where we added that assertion to get_server_identity_key().
-
- Sep 16, 2013
-
-
Nick Mathewson authored
-
- Sep 10, 2013
-
-
Karsten Loesing authored
-
- Sep 04, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This would make us do testing circuits "even when cbt is disabled by consensus, or when we're a directory authority, or when we've failed to write cbt history to our state file lately." (Roger's words.) This is a fix for 9671 and an improvement in our fix for 5049. The original misbehavior was in 0.2.2.14-alpha; the incomplete fix was in 0.2.3.17-beta.
-
- Aug 25, 2013
-
-
Nick Mathewson authored
-
- Aug 23, 2013
-
-
Nick Mathewson authored
-
- Aug 22, 2013
-
-
Nick Mathewson authored
Fix for bug 9564; bugfix on 0.2.3.14-alpha.
-
- Aug 21, 2013
-
-
Nick Mathewson authored
The spec requires them to do so, and not doing so creates a situation where they can't send-test because relays won't extend to them because of the other part of bug 9546. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
-
Nick Mathewson authored
(Backport to Tor 0.2.3) Relays previously, when initiating a connection, would only send a NETINFO after sending an AUTHENTICATE. But bridges, when receiving a connection, would never send AUTH_CHALLENGE. So relays wouldn't AUTHENTICATE, and wouldn't NETINFO, and then bridges would be surprised to be receiving CREATE cells on a non-open circuit. Fixes bug 9546.
-
- Aug 12, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Jul 08, 2013
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Jun 18, 2013
-
-
Nick Mathewson authored
Fixes bug 9090; bug not in any released Tor.
-
Nick Mathewson authored
-
Nick Mathewson authored
This implements "algorithm 1" from my discussion of bug #9072: on OOM, find the circuits with the longest queues, and kill them. It's also a fix for #9063 -- without the side-effects of bug #9072. The memory bounds aren't perfect here, and you need to be sure to allow some slack for the rest of Tor's usage. This isn't a perfect fix; the rest of the solutions I describe on codeable.
-