Skip to content
Snippets Groups Projects
  1. Jun 02, 2015
  2. May 26, 2015
    • Nick Mathewson's avatar
      Stop looking at session->ciphers when possible · 95375963
      Nick Mathewson authored
      If the OpenSSL team accepts my patch to add an
      SSL_get_client_ciphers function, this patch will make Tor use it
      when available, thereby working better with openssl 1.1.
      95375963
    • Nick Mathewson's avatar
      Remove rectify_client_ciphers as needless. · 80082b71
      Nick Mathewson authored
      We previously used this function instead of SSL_set_cipher_list() to
      set up a stack of client SSL_CIPHERs for these reasons:
      
        A) In order to force a particular order of the results.
      
        B) In order to be able to include dummy entries for ciphers that
           this build of openssl did not support, so we could impersonate
           Firefox harder.
      
      But we no longer do B, since we merged proposal 198 and stopped
      lying about what ciphers we know.
      
      And A was actually pointless, since I had misread the implementation
      of SSL_set_cipher_list().  It _does_ do some internal sorting, but
      that is pre-sorting on the master list of ciphers, not sorting on
      the user's preferred order.
      80082b71
    • Nick Mathewson's avatar
      Revert "Try using SSL_get_ciphers in place of session->ciphers" · 44259b89
      Nick Mathewson authored
      This reverts commit 67964cfa.
      
      It was the cause of #16153, and was not in any released Tor.  We need
      a better solution for getting session->ciphers.
      44259b89
  3. May 20, 2015
  4. May 13, 2015
  5. May 05, 2015
    • John Brooks's avatar
      Fix out-of-bounds read in INTRODUCE2 client auth · 2b27ce52
      John Brooks authored and Nick Mathewson's avatar Nick Mathewson committed
      The length of auth_data from an INTRODUCE2 cell is checked when the
      auth_type is recognized (1 or 2), but not for any other non-zero
      auth_type. Later, auth_data is assumed to have at least
      REND_DESC_COOKIE_LEN bytes, leading to a client-triggered out of bounds
      read.
      
      Fixed by checking auth_len before comparing the descriptor cookie
      against known clients.
      
      Fixes #15823; bugfix on 0.2.1.6-alpha.
      2b27ce52
  6. Apr 28, 2015
  7. Apr 27, 2015
  8. Apr 24, 2015
  9. Apr 06, 2015
Loading