- Sep 17, 2009
-
-
Nick Mathewson authored
-
- Sep 16, 2009
-
-
Sebastian Hahn authored
To further attempt to fix bug 1090, make sure connection_ap_can_use_exit always returns 0 when the chosen exit router is excluded. This should fix bug1090.
-
- Sep 15, 2009
-
-
Sebastian Hahn authored
When we excluded some Exits, we were sometimes warning the user that we were going to use the node regardless. Many of those warnings were in fact bogus, because the relay in question was not used to connect to the outside world. Based on patch by Rotor, thanks!
-
- Sep 14, 2009
-
-
Sebastian Hahn authored
Adding the same vote to a networkstatus consensus leads to a memory leak on the client side. Fix that by only using the first vote from any given voter, and ignoring the others. Problem found by Rotor, who also helped writing the patch. Thanks!
-
- Sep 03, 2009
-
-
Roger Dingledine authored
Fix an obscure bug where hidden services on 64-bit big-endian systems might mis-read the timestamp in v3 introduce cells, and refuse to connect back to the client. Discovered by "rotor". Bugfix on 0.2.1.6-alpha.
-
- Sep 02, 2009
-
-
Roger Dingledine authored
-
- Sep 01, 2009
-
-
- Aug 31, 2009
-
-
Roger Dingledine authored
Add a "getinfo status/accepted-server-descriptor" controller command, which is the recommended way for controllers to learn whether our server descriptor has been successfully received by at least on directory authority. Un-recommend good-server-descriptor getinfo and status events until we have a better design for them.
-
Roger Dingledine authored
We were telling the controller about CHECKING_REACHABILITY and REACHABILITY_FAILED status events whenever we launch a testing circuit or notice that one has failed. Instead, only tell the controller when we want to inform the user of overall success or overall failure. Bugfix on 0.1.2.6-alpha. Fixes bug 1075. Reported by SwissTorExit.
-
- Aug 29, 2009
-
-
Karsten Loesing authored
-
- Aug 28, 2009
-
-
Roger Dingledine authored
We were triggering a CLOCK_SKEW controller status event whenever we connect via the v2 connection protocol to any relay that has a wrong clock. Instead, we should only inform the controller when it's a trusted authority that claims our clock is wrong. Bugfix on 0.2.0.20-rc; starts to fix bug 1074. Reported by SwissTorExit.
-
Roger Dingledine authored
-
- Aug 26, 2009
-
-
Roger Dingledine authored
-
- Aug 20, 2009
-
-
Nick Mathewson authored
Once we had called log_free_all(), anything that tried to log a message (like a failed tor_assert()) would fail like this: 1. The logging call eventually invokes the _log() function. 2. _log() calls tor_mutex_lock(log_mutex). 3. tor_mutex_lock(m) calls tor_assert(m). 4. Since we freed the log_mutex, tor_assert() fails, and tries to log its failure. 5. GOTO 1. Now we allocate the mutex statically, and never destroy it on shutdown. Bugfix on 0.2.0.16-alpha, which introduced the log mutex. This bug was found by Matt Edman.
-
- Aug 11, 2009
-
-
Karsten Loesing authored
The more verbose logs that were added in ee58153b also include a string that might not have been initialized. This can lead to segfaults, e.g., when setting up private Tor networks. Initialize this string with NULL.
-
- Aug 10, 2009
-
-
Roger Dingledine authored
Send circuit or stream sendme cells when our window has decreased by 100 cells, not when it has decreased by 101 cells. Bug uncovered by Karsten when testing the "reduce circuit window" performance patch. Bugfix on the 54th commit on Tor -- from July 2002, before the release of Tor 0.0.0. This is the new winner of the oldest-bug prize.
-
Roger Dingledine authored
-
- Jul 29, 2009
-
-
Roger Dingledine authored
also bring the release notes up to date
-
- Jul 28, 2009
-
-
Roger Dingledine authored
-
Relays no longer publish a new server descriptor if they change their MaxAdvertisedBandwidth config option but it doesn't end up changing their advertised bandwidth numbers. Bugfix on 0.2.0.28-rc; fixes bug 1026. Patch from Sebastian.
-
Roger Dingledine authored
Now it will look like the fingerprints in our bridges documentation, and confuse fewer users.
-
Roger Dingledine authored
Specifically, every time we get a create cell but we have so many already queued that we refuse it. Bugfix on 0.2.0.19-alpha; fixes bug 1034. Reported by BarkerJr.
-
Roger Dingledine authored
The problem is that clients and hidden services are receiving relay_early cells, and they tear down the circuit. Hack #1 is for rendezvous points to rewrite relay_early cells to relay cells. That way there are never any incoming relay_early cells. Hack #2 is for clients and hidden services to never send a relay_early cell on an established rendezvous circuit. That works around rendezvous points that haven't upgraded yet. Hack #3 is for clients and hidden services to not tear down the circuit when they receive an inbound relay_early cell. We already refuse extend cells at clients.
-
- Jul 24, 2009
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Jul 07, 2009
-
-
Nick Mathewson authored
Patch by Roger; fixes bug 1027.
-
- Jul 02, 2009
-
-
-
The internal error "could not find intro key" occurs when we want to send an INTRODUCE1 cell over a recently finished introduction circuit and think we built the introduction circuit with a v2 hidden service descriptor, but cannot find the introduction key in our descriptor. My first guess how we can end up in this situation is that we are wrong in thinking that we built the introduction circuit based on a v2 hidden service descriptor. This patch checks if we have a v0 descriptor, too, and uses that instead.
-
- Jun 30, 2009
-
-
- Jun 25, 2009
-
-
but continue capping bandwidths we see in local server descriptors, if we have no consensus weights for them.
-
- Jun 24, 2009
-
-
Marcus Griep authored
-
- Jun 22, 2009
-
-
-
Nick Mathewson authored
arma's rationale: "I think this is a bug, since people intentionally set DirPortFrontPage, so they really do want their relay to serve that page when it's asked for. Having it appear only sometimes (or roughly never in Sebastian's case) makes it way less useful." Fixes bug 1013; bugfix on 0.2.1.8-alpha.
-
- Jun 20, 2009
-
- Jun 19, 2009
-
-
-
Karsten Loesing authored
-
Karsten Loesing authored
This reverts commit 3847f549.
-
- Jun 18, 2009
-
-
Nick Mathewson authored
If the Tor is running with AutomapHostsOnResolve set, it _is_ reasonable to do a DNS lookup on a .onion address. So instead we make tor-resolve willing to try to resolve anything. Only if Tor refuses to resolve it do we suggest to the user that resolving a .onion address may not work. Fix for bug 1005.
-
- Jun 16, 2009