Skip to content
Snippets Groups Projects
  1. Apr 03, 2015
  2. Feb 24, 2015
  3. Feb 16, 2015
  4. Jan 23, 2015
  5. Jan 22, 2015
  6. Jan 08, 2015
  7. Nov 24, 2014
  8. Nov 19, 2014
  9. Nov 12, 2014
  10. Oct 20, 2014
  11. Oct 19, 2014
  12. Oct 16, 2014
  13. Oct 15, 2014
  14. Sep 20, 2014
  15. Sep 16, 2014
    • Roger Dingledine's avatar
      clients now send correct address for rendezvous point · 0c3b3650
      Roger Dingledine authored and Nick Mathewson's avatar Nick Mathewson committed
      Clients now send the correct address for their chosen rendezvous point
      when trying to access a hidden service. They used to send the wrong
      address, which would still work some of the time because they also
      sent the identity digest of the rendezvous point, and if the hidden
      service happened to try connecting to the rendezvous point from a relay
      that already had a connection open to it, the relay would reuse that
      connection. Now connections to hidden services should be more robust
      and faster. Also, this bug meant that clients were leaking to the hidden
      service whether they were on a little-endian (common) or big-endian (rare)
      system, which for some users might have reduced their anonymity.
      
      Fixes bug 13151; bugfix on 0.2.1.5-alpha.
      0c3b3650
  16. Aug 13, 2014
  17. Aug 09, 2014
  18. Jul 28, 2014
  19. Jul 27, 2014
  20. Jul 25, 2014
  21. Jul 24, 2014
    • Nick Mathewson's avatar
      Avoid illegal read off end of an array in prune_v2_cipher_list · 1b551823
      Nick Mathewson authored and Roger Dingledine's avatar Roger Dingledine committed
      This function is supposed to construct a list of all the ciphers in
      the "v2 link protocol cipher list" that are supported by Tor's
      openssl.  It does this by invoking ssl23_get_cipher_by_char on each
      two-byte ciphersuite ID to see which ones give a match.  But when
      ssl23_get_cipher_by_char cannot find a match for a two-byte SSL3/TLS
      ciphersuite ID, it checks to see whether it has a match for a
      three-byte SSL2 ciphersuite ID.  This was causing a read off the end
      of the 'cipherid' array.
      
      This was probably harmless in practice, but we shouldn't be having
      any uninitialized reads.
      
      (Using ssl23_get_cipher_by_char in this way is a kludge, but then
      again the entire existence of the v2 link protocol is kind of a
      kludge.  Once Tor 0.2.2 clients are all gone, we can drop this code
      entirely.)
      
      Found by starlight. Fix on 0.2.4.8-alpha. Fixes bug 12227.
      1b551823
    • Roger Dingledine's avatar
Loading