- Mar 01, 2017
- Feb 28, 2017
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This is an "ours" merge to avoid a version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
This is an "ours" merge to avoid taking a version bump
-
Nick Mathewson authored
This is an "ours" merge to avoid taking a version bump, and to avoid replaying the post-0.2.7.6 history of "maint-0.2.7-redux" onto maint-0.2.8, which already included the relevant changes.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" merge to avoid version bumps
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" merge to avoid version bumps
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" merge to avoid bumping version
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Previously I'd made a bad assumption in the implementation of prop271 in 0.3.0.1-alpha: I'd assumed that there couldn't be two guards with the same identity. That's true for non-bridges, but in the bridge case, we allow two bridges to have the same ID if they have different addr:port combinations -- in order to have the same bridge ID running multiple PTs. Fortunately, this assumption wasn't deeply ingrained: we stop enforcing the "one guard per ID" rule in the bridge case, and instead enforce "one guard per <id,addr,port>". We also needed to tweak our implementation of get_bridge_info_for_guard, since it made the same incorrect assumption. Fixes bug 21027; bugfix on 0.3.0.1-alpha.
-
- Feb 27, 2017
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Since 0.2.4.11-alpha (in 01966479) we've tried to randomize the start time to up to some time in the past. But unfortunately we allowed the start time to be in the future as well, which isn't really legit. The new behavior lets the start time be be up to MAX(cert_lifetime-2days, 0) in the past, but never in the future. Fixes bug 21420; bugfix on 0.2.4.11-alpha.
-
Nick Mathewson authored
-
teor authored
This ensures we reliably call chutney's newer tools/test-network.sh when available. Fixes bug 21562; bugfix on tor-0.2.9.1-alpha.
-
teor authored
Part of 21570.
-
teor authored
Requires the chutney changes from 21572. (Otherwise, asks users to upgrade their chutney.) Implements 21570.
-
Nick Mathewson authored
Teor thinks that this connection_dirserv_add_dir_bytes_to_outbuf() might be the problem, if the "remaining" calculation underflows. So I'm adding a couple of checks there, and improving the casts.
-
Nick Mathewson authored
Possible fix or diagnostic for 21369.
-
teor authored
Requires the equivalent chutney changes in 21571. Part of 21570.
-
Nick Mathewson authored
-
- Feb 24, 2017
-
-
Nick Mathewson authored
-
When encoding a legacy ESTABLISH_INTRO cell, we were using the sizeof() on a pointer instead of using the real size of the destination buffer leading to an overflow passing an enormous value to the signing digest function. Fortunately, that value was only used to make sure the destination buffer length was big enough for the key size and in this case it always was because of the overflow. Fixes #21553 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
Fixes a case of 21007; bugfix on 0.3.0.1-alpha when prop271 was implemented. Found by toralf.
-
Nick Mathewson authored
-
- Feb 17, 2017
-
-
Nick Mathewson authored
-
Nick Mathewson authored
scan-build found that we we checking UseEntryGuards twice. Fixes bug 21492.
-
Nick Mathewson authored
-
Nick Mathewson authored
Bug found with clang scan-build. Fixes bug on f63e06d3. Bug not present in any released Tor.
-
- Feb 15, 2017
-
-
David Goulet authored
Instead of returning 404 error code, this led to a NULL pointer being used and thus a crash of tor. Fixes #21471 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-