- Nov 25, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Nov 24, 2015
-
-
Damian Johnson authored
I'm adding Stem test coverage for tor's man page and in doing so ran into quite a few issues. All of them are pretty minor (worst was misnaming a couple config options), but still good things to fix. :P
-
Damian Johnson authored
These options were removed from tor in July. Time to axe them from our man page. :P https://gitweb.torproject.org/tor.git/commit/?id=2f8cf524ba4e565ab613504a4c41fd724d32facc
-
George Tankersley authored
-
Damian Johnson authored
The slop testing options are the only spot where we try to enumerate multiple options on the same line. Changing them to each be on their own line as we do elsewhere.
-
George Tankersley authored
-
Damian Johnson authored
Simple typo - we were missing a letter.
-
Damian Johnson authored
A 'RecommendedPackageVersions' option doesn't exist in tor. However, it *does* have RecommendedPackages... feature: https://gitweb.torproject.org/tor.git/commit/?id=c83d8381 man addition: https://gitweb.torproject.org/tor.git/commit/?id=ddfdeb56
-
George Tankersley authored
-
Damian Johnson authored
When applying changes from proposal 171 Nick renamed SocksPort to SOCKSPort, and SocksListenAddress to SOCKSListenAddress... https://gitweb.torproject.org/tor.git/commit/?id=891ccd3cd0690e83f1dc4dde7698c3bd9d7fe98d However, this didn't change the option itself in tor (it's still SocksPort), and wasn't even uniform in the man page. Functionally this doesn't matter (tor's config options are case insensitive) but this is a pretty clear regression.
-
Damian Johnson authored
In addition to inviting users to tell us about bugs, lets say where.
-
Damian Johnson authored
Minor formatting issue with our ControlPort entry. The part about flags wasn't indented with the rest of its description.
-
Damian Johnson authored
Minor formatting issue with our ExtORPort that caused its description to be on the same line as the option (munging the two together).
-
- Nov 23, 2015
-
-
teor (Tim Wilson-Brown) authored
This migrates away from SHA1, and provides further hash flooding protection on top of the randomised siphash implementation. Add unit tests to make sure that different inputs don't have the same hash.
-
David Goulet authored
The wrong list was used when looking up expired intro points in a rend service object causing what we think could be reachability issues and triggering a BUG log. Fixes #16702 Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
Roger Dingledine authored
-
- Nov 20, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
exit-policy/reject-private lists the reject rules added by ExitPolicyRejectPrivate. This makes it easier for stem to display exit policies. Add unit tests for getinfo exit-policy/*. Completes ticket #17183. Patch by "teor".
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Nov 19, 2015
-
-
teor (Tim Wilson-Brown) authored
Split out policy_dump_to_string to use it in getinfo_helper_policies.
-
teor (Tim Wilson-Brown) authored
-
teor (Tim Wilson-Brown) authored
ExitPolicyRejectPrivate now rejects addresses configured via OutboundBindAddress and any port options, such as ORPort and DirPort.
-
teor (Tim Wilson-Brown) authored
Modify policies_parse_exit_policy_reject_private so it also blocks the addresses configured for OutboundBindAddressIPv4_ and OutboundBindAddressIPv6_, and any publicly routable port addresses on exit relays. Add and update unit tests for these functions.
-
teor (Tim Wilson-Brown) authored
Test that policies_parse_exit_policy_reject_private rejects supplied IPv4 and IPv6 relay addresses, and the addresses of local interfaces.
-
teor (Tim Wilson-Brown) authored
Move the code that rejects publicly routable exit relay addresses to policies_parse_exit_policy_reject_private. Add addr_policy_append_reject_addr_list and use it to reject interface addresses. This removes the duplicate reject checks on local_address and ipv6_local_address, but duplicates will be removed by exit_policy_remove_redundancies at the end of the function. This also removes the info-level logging on rejected interface addresses. Instead, log a debug-level message in addr_policy_append_reject_addr. This simplifies policies_parse_exit_policy_internal and prepares for reporting these addresses over the control port in #17183.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
teor (Tim Wilson-Brown) authored
In my testing, an IPv6-only FreeBSD jail without ::1 returned EINVAL from tor_ersatz_socketpair. Let's not fail the unit test because of this - it would only ever use tor_socketpair() anyway.
-
teor (Tim Wilson-Brown) authored
(But it won't work on some systems without IPv4/IPv6 localhost (some BSD jails) by design, to avoid creating sockets on routable IP addresses. However, those systems likely have the AF_UNIX socketpair, which tor prefers.) Fixes bug #17638; bugfix on a very early tor version, earlier than 22dba27d (23 Nov 2004) / svn:r2943. Patch by "teor".
-
- Nov 18, 2015
-
-
Nick Mathewson authored
-
teor (Tim Wilson-Brown) authored
Comment-only change noting platforms that can return IPv6 addresses from SIOCGIFCONF (or SIOCGLIFCONF).
-
teor (Tim Wilson-Brown) authored
Make unit tests pass on IPv6-only systems, and systems without localhost addresses (like some FreeBSD jails). Fixes: * get_if_addrs_ifaddrs: systems without localhost * get_if_addrs_ioctl: only works on IPv4 systems * socket: check IPv4 and IPv6, skip on EPROTONOSUPPORT * socketpair_ersatz: uses IPv4, skip on EPROTONOSUPPORT Fixes bug #17632; bugfix on unit tests in 0.2.7.3-rc. c464a367 was a partial fix for this issue in #17255; it was released in unit tests in 0.2.7.4-rc. Patch by "teor".
-