Commit Graph

2012 Commits

Author SHA1 Message Date
Nick Mathewson 663913e5ca Increment version in master to 0.2.3.10-alpha-dev 2011-12-16 12:09:42 -05:00
Nick Mathewson a7b5e72463 Changelog and blurb for 0.2.3.10-alpha 2011-12-15 11:59:09 -05:00
Nick Mathewson 960f62bd82 Start a section for the 0.2.3.10-alpha changelog 2011-12-14 16:03:58 -05:00
Roger Dingledine e44205ee6c give 0.2.3.9-alpha a blurb 2011-12-08 15:52:36 -05:00
Roger Dingledine 06b10ccdc4 fold in changes files 2011-12-08 04:38:37 -05:00
Nick Mathewson 00fae9a500 Remove 4312 from the changelog. 2011-12-07 21:12:26 -05:00
Roger Dingledine 58d1aa4402 fold in changes files so far 2011-11-25 19:24:42 -05:00
Roger Dingledine 947c3de520 add a blurb for 0.2.3.8-alpha 2011-11-22 18:29:34 -05:00
Roger Dingledine 03c416a3d7 fold in more changes files 2011-11-21 19:34:12 -05:00
Roger Dingledine c9f24edb13 fold in more changes entries 2011-11-21 18:04:01 -05:00
Roger Dingledine 5d8597ee71 further cleanups 2011-11-21 16:33:18 -05:00
Roger Dingledine f3452b58ba fold in more changes entries 2011-11-21 16:33:18 -05:00
Roger Dingledine e26f5553ec fold in changes files 2011-11-07 15:22:23 -05:00
Nick Mathewson 5613b9b9f2 Fix a proposal number in the changelog. 2011-11-03 09:37:12 -04:00
Roger Dingledine c2d03beb65 blurb and version bump for 0.2.3.7-alpha 2011-10-30 18:39:49 -04:00
Roger Dingledine 46296b3fa4 there will be a new alpha release today (oct 30) 2011-10-30 01:58:05 -04:00
Roger Dingledine c03b4fa826 amend the changelog entry for 4299
it doesn't have to do with small cells. rather, it has to do with
using cells to decide whether to mark the connection for close.
2011-10-29 16:24:59 -04:00
Roger Dingledine cbdefc70fc fold in changes entries 2011-10-29 15:10:37 -04:00
Roger Dingledine 6258013e41 find all those stanzas in master too 2011-10-27 20:15:50 -04:00
Roger Dingledine 47dff61061 a little blurb for 0.2.3.6-alpha 2011-10-26 20:54:15 -04:00
Roger Dingledine 821f59b4df forward-port the stable releases notes 2011-10-26 20:41:51 -04:00
Roger Dingledine 0eaebebffa fold in changes entries 2011-10-26 20:31:49 -04:00
Roger Dingledine c21c8daaaf closer to a changelog for the next alpha 2011-10-26 16:13:53 -04:00
Roger Dingledine d5bb0d7789 checkpoint: fold in changes files 2011-10-24 02:56:35 -04:00
Roger Dingledine cff4e6765b give 0.2.3.5-alpha a blurb 2011-09-28 18:25:09 -04:00
Roger Dingledine 25f786f7ec fold in recent changes entries 2011-09-28 15:41:29 -04:00
Roger Dingledine 458cc9d351 start preparing the 0.2.3.5-alpha changelog 2011-09-28 15:12:16 -04:00
Roger Dingledine 5f4f727d58 slight tweak to unify things 2011-09-13 20:26:32 -04:00
Roger Dingledine c133d71bdd a blurb for 0.2.3.4-alpha 2011-09-13 19:56:59 -04:00
Roger Dingledine befaa435bd forward-port the 0.2.2.33 changelog 2011-09-13 19:19:38 -04:00
Roger Dingledine ae2856b6f6 start an 0.2.3.4-alpha changelog 2011-09-09 13:51:15 -04:00
Roger Dingledine 01357d6b16 merge in one more 2011-09-02 07:24:25 -04:00
Roger Dingledine 589ed3f771 fold in last changes item 2011-09-01 20:49:21 -04:00
Roger Dingledine a500389904 clean 0.2.3.3-alpha changelog
ready when you are, nick
2011-09-01 02:43:11 -04:00
Nick Mathewson 38ee959ea9 First draft of an 0.2.3.3-alpha changelog 2011-08-31 01:02:51 -04:00
Roger Dingledine 0f38feaf89 update punctuation now that we've seen the source text 2011-08-27 15:06:32 -04:00
Roger Dingledine 709e315520 update changelog/release notes from release-0.2.2 2011-08-26 19:14:07 -04:00
Roger Dingledine 870c55b6fd manually forward-port 2871dd8bef 2011-08-25 15:51:24 -04:00
Roger Dingledine 478785a762 put the 0.2.1.30 stanza in the master changelog too 2011-08-01 16:14:17 -04:00
Roger Dingledine 843796495b reach back in time and correct two changelog entries 2011-08-01 15:53:13 -04:00
Roger Dingledine bceb136840 finish the changelog 2011-07-18 13:39:01 -04:00
Roger Dingledine 25ad13ed9c start folding in the 0.2.3.2-alpha changelog entries 2011-07-18 13:18:46 -04:00
Roger Dingledine 976027210b forward-port the 0.2.2.30-rc changelog 2011-07-18 12:16:11 -04:00
Roger Dingledine 694cd7ade9 reach back in time and name a config option correctly 2011-06-23 23:54:34 -04:00
Roger Dingledine 37ff37a890 forward-port the 0.2.2.29-beta changelog entry 2011-06-21 01:18:58 -04:00
Nick Mathewson 74239f61d2 Move errant doc/nodefamily_routerset into 0.2.3.1-alpha ChangeLog. Fix bug 3373 2011-06-10 01:04:12 -04:00
Roger Dingledine bc607bee3f port-forward the 0.2.2.28-beta changelog stanza 2011-06-05 01:46:13 -04:00
Roger Dingledine c90d3a11b7 put the changelog stanzas in time order 2011-06-05 01:45:42 -04:00
Roger Dingledine eecf8835fd add 0.2.2.27-beta changelog to master
also clean up the 0.2.3.1-alpha changelog headers
2011-05-19 21:39:09 -04:00
Roger Dingledine e98e1c8361 copy the 0.2.2.26-beta changelog to master too 2011-05-17 21:26:13 -04:00
Nick Mathewson 5cabdc8f67 more changelog tweaks, mostly from sebastian 2011-05-05 14:57:34 -04:00
Nick Mathewson 3b0140b811 Tweak 0.2.3.1-alpha changelog, add more entries. 2011-05-05 13:43:15 -04:00
Nick Mathewson 5ee5103f63 Initial draft changelog for 0.2.3.1-alpha 2011-05-03 21:33:10 -04:00
Nick Mathewson daede6f97b Add 0.2.2.25-alpha changelog on master 2011-04-28 23:31:42 -04:00
Roger Dingledine c4bf7f59d8 forward-port the 0.2.2.24-alpha changelog 2011-04-11 23:26:27 -04:00
Roger Dingledine b5f2b449ee forward-port the 0.2.2.23-alpha changelog 2011-03-08 18:59:48 -05:00
Roger Dingledine 32796bbe82 forward-port the 0.2.2.22-alpha changelog 2011-02-07 22:29:19 -05:00
Roger Dingledine 670ff24788 fix 0.2.2 changelog to match 0.2.1 2011-01-18 19:15:31 -05:00
Roger Dingledine c947db7f4b forward-port that part of the changelog 2011-01-15 22:42:14 -05:00
Roger Dingledine 8e9b25e6c7 some changelog entries for master too 2011-01-15 20:59:25 -05:00
Roger Dingledine 601b6a8099 remove duplicate (wrong) changelog entry 2010-12-20 09:14:11 -05:00
Roger Dingledine 539814e0c9 forward-port the two recent changelog entries 2010-12-20 07:49:22 -05:00
Roger Dingledine e57cb6b976 pick a more accurate release date 2010-11-22 22:44:20 -05:00
Roger Dingledine f54e75a2c6 prepare for our emergency openssl fix release 2010-11-21 16:59:42 -05:00
Roger Dingledine 910de7dfac final touchups 2010-11-16 01:12:32 -05:00
Roger Dingledine a08a7e0fc6 warn more about AllowSingleHopExits 2010-11-16 00:13:25 -05:00
Roger Dingledine e0b922b7e6 merge in more changelog entries 2010-11-15 23:54:20 -05:00
Roger Dingledine 6b4db953c9 fold the changes files into a changelog 2010-11-09 21:50:30 -05:00
Roger Dingledine dd68c07dc3 retroactively declare the cbt fixes to be major
also put in release blurbs
2010-10-01 04:53:23 -04:00
Roger Dingledine a3f488a887 bump to 0.2.2.17-alpha 2010-09-30 17:49:11 -04:00
Roger Dingledine d62a2d6ee5 write up a changelog file 2010-09-30 17:32:17 -04:00
Roger Dingledine 85cad94221 bump to 0.2.2.16-alpha-dev 2010-09-17 05:07:59 -04:00
Roger Dingledine 61e0079ab2 best tor ever! 2010-09-17 02:06:34 -04:00
Roger Dingledine 80b631844b fold in the recent changes files 2010-09-16 13:45:54 -04:00
Roger Dingledine 1bc20f9c1a merge changes files for upcoming release 2010-09-13 05:51:49 -04:00
Roger Dingledine 1f81474b2e bump to 0.2.2.15-alpha 2010-08-18 19:16:02 -04:00
Roger Dingledine f6734103e1 fold in even more changelog entries 2010-08-18 16:42:15 -04:00
Roger Dingledine e7956d4a73 explain the non-fix for bug 1776 2010-08-18 16:11:55 -04:00
Roger Dingledine 8c87319f3c bug 1776 isn't fixed. save its changelog entry for next time. 2010-08-18 15:51:47 -04:00
Nick Mathewson d72edc4b78 Edit the changelog to reflect the fact that we are backing off on ending NOROUTE for now 2010-08-18 13:50:47 -04:00
Roger Dingledine 2ede14c2ca fold in the next set of changelog entries 2010-08-16 02:02:11 -04:00
Roger Dingledine a1686d867e fold in the makefile.am changes entry 2010-08-13 17:19:04 -04:00
Roger Dingledine 863b6c439e changelog entry for f060b18e6c 2010-08-11 02:11:05 -04:00
Roger Dingledine 267c976405 fold in most of the changes/foo files 2010-08-11 01:51:41 -04:00
Roger Dingledine a80ffbb6cc partial changelog for 0.2.2.15-alpha 2010-07-21 09:28:34 -04:00
Roger Dingledine 4fc230b305 0.2.2.14-alpha blurb 2010-07-13 15:50:24 -04:00
Roger Dingledine 69dfd67d90 bump to 0.2.2.14-alpha-dev 2010-07-13 15:48:03 -04:00
Roger Dingledine 1ea99c6364 guh. 'git commit' did not do what i expect. 2010-07-12 16:46:28 -04:00
Roger Dingledine c3febf8660 fold in the latest changes 2010-07-09 14:07:54 -04:00
Roger Dingledine 1d5b2da3a8 start an 0.2.2.14-alpha changelog 2010-06-29 18:40:08 -04:00
Nick Mathewson 308457218a Copy the release notes from 0.2.1.26 into the master ChangeLog 2010-06-11 16:31:03 -04:00
Roger Dingledine ec3f576fbe put the blurb in 0.2.2.13-alpha 2010-05-05 03:12:26 -04:00
Roger Dingledine feb8c1b5f6 bump to 0.2.2.13-alpha 2010-04-24 05:43:43 -04:00
Roger Dingledine 8afc7d563d prepare the 0.2.2.13-alpha changelog 2010-04-23 20:59:20 -04:00
Roger Dingledine 45ab6959c9 blurbs for two recent alphas 2010-04-23 19:42:34 -04:00
Roger Dingledine 3d8879a04d merge in the bug 1364 fix 2010-04-20 03:59:23 -04:00
Roger Dingledine ea6cdafee5 prepare for 0.2.2.12-alpha 2010-04-20 03:53:07 -04:00
Roger Dingledine 84924fcd30 bump to 0.2.2.11-alpha-dev 2010-04-19 06:09:06 -04:00
Roger Dingledine 9cde5a4629 bump to 0.2.2.11-alpha 2010-04-15 11:02:31 -04:00
Roger Dingledine eafbc3caa1 gather together the 0.2.2.11-alpha changelog 2010-04-15 10:48:33 -04:00
Roger Dingledine 8aec982f91 Merge branch 'maint-0.2.1'
Conflicts:

	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2010-04-03 22:05:02 -04:00
Roger Dingledine 51d084f805 fold in the recent changelog entries 2010-04-02 15:33:38 -04:00
Roger Dingledine 6b7e5eb5f1 give us a blurb; add stanza to the releasenotes 2010-03-16 00:44:30 -04:00
Roger Dingledine 94dccce3fa bump to 0.2.1.25
it's perfect, let's ship it
2010-03-15 18:08:29 -04:00
Roger Dingledine 1108358e96 let people test the RefuseUnknownExits idea 2010-03-10 22:43:23 -05:00
Roger Dingledine 10a6b30bee blurbs for recent alphas 2010-03-08 23:09:49 -05:00
Roger Dingledine 4d7d1027ae fix the tor-exit-notice.html file (bug 1295) 2010-03-08 20:40:21 -05:00
Roger Dingledine db135e92b4 bump to 0.2.2.10-alpha-dev
now's your chance to destabilize it
2010-03-08 00:40:00 -05:00
Roger Dingledine 81b84c0b01 prepare 0.2.2.10-alpha for release 2010-03-07 00:13:12 -05:00
Roger Dingledine 407a9d4193 Merge branch 'maint-0.2.1'
Conflicts:

	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2010-03-06 22:46:39 -05:00
Roger Dingledine 841351e612 clean up the 0.2.1.25 changelog 2010-03-06 22:39:34 -05:00
Nick Mathewson 8719748767 Merge commit 'sebastian/manpage' 2010-03-04 23:30:53 -05:00
Nick Mathewson eb2e56ad3c Merge commit 'origin/maint-0.2.1'
Conflicts:
	src/or/config.c
	src/or/test.c
2010-03-04 18:44:31 -05:00
Nick Mathewson 3ff092391b Apply Roger's bug 1269 fix.
From http://archives.seul.org/tor/relays/Mar-2010/msg00006.html :

   As I understand it, the bug should show up on relays that don't set
   Address to an IP address (so they need to resolve their Address
   line or their hostname to guess their IP address), and their
   hostname or Address line fails to resolve -- at that point they'll
   pick a random 4 bytes out of memory and call that their address. At
   the same time, relays that *do* successfully resolve their address
   will ignore the result, and only come up with a useful address if
   their interface address happens to be a public IP address.
2010-03-04 18:37:40 -05:00
Sebastian Hahn 4db5e7ae76 Add configure switch to disable use of asciidoc
Also break the build if that switch isn't used and asciidoc isn't
available.
2010-03-01 05:02:27 +01:00
Sebastian Hahn 0cd1b499b4 Simplify asciidoc-helper
We don't need sed for our string manipulation, so let's get rid of
it. Suggested by weasel.
2010-03-01 04:07:55 +01:00
Sebastian Hahn f9de12b864 Ship the asciidoc-helper file in our tarballs
Otherwise, the build process breaks when one of the .1.txt gets
a new mtime. Suggested by weasel.
2010-03-01 04:07:55 +01:00
Nick Mathewson 27a8a56e6c Fix a consensus-extension bug found by outofwords
When the bandwidth-weights branch added the "directory-footer"
token, and began parsing the directory footer at the first
occurrence of "directory-footer", it made it possible to fool the
parsing algorithm into accepting unsigned data at the end of a
consensus or vote.  This patch fixes that bug by treating the footer
as starting with the first "directory-footer" or the first
"directory-signature", whichever comes first.
2010-02-27 17:07:05 -05:00
Nick Mathewson 937b5cdd41 Merge remote branch 'origin/maint-0.2.1'
Conflicts:
	ChangeLog
	src/or/routerparse.c
2010-02-27 15:34:02 -05:00
Sebastian Hahn b67657bd95 Properly handle non-terminated strings
Treat strings returned from signed_descriptor_get_body_impl() as not
NUL-terminated. Since the length of the strings is available, this is
not a big problem.

Discovered by rieo.
2010-02-27 02:13:22 +01:00
Sebastian Hahn 86828e2004 Proper NULL checking in circuit_list_path_impl()
Another dereference-then-NULL-check sequence. No reports of this bug
triggered in the wild. Fixes bugreport 1256.

Thanks to ekir for discovering and reporting this bug.
2010-02-26 05:53:26 +01:00
Sebastian Hahn f36c36f4a8 Proper NULL checking for hsdesc publication
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered
in the wild, but we should fix it anyways in case it ever happens.
Also make sure users get a note about this being a bug when they
see it in their log.

Thanks to ekir for discovering and reporting this bug.
2010-02-26 05:49:34 +01:00
Sebastian Hahn a9802d3322 Zero a cipher completely before freeing it
We used to only zero the first ptrsize bytes of the cipher. Since
cipher is large enough, we didn't zero too many bytes. Discovered
and fixed by ekir. Fixes bug 1254.
2010-02-26 05:47:25 +01:00
Nick Mathewson 2ab3389ed6 Merge remote branch 'mikeperry/consensus-bw-weights5-merge'
Conflicts:
	ChangeLog
2010-02-25 16:22:29 -05:00
Nick Mathewson 8b93dacbcf Merge remote branch 'sebastian/manpage' 2010-02-25 14:32:22 -05:00
Sebastian Hahn 2917c0596c Restrict PerConnBWRate|Burst to INT32_MAX, update manpage
All other bandwidthrate settings are restricted to INT32_MAX, but
this check was forgotten for PerConnBWRate and PerConnBWBurst. Also
update the manpage to reflect the fact that specifying a bandwidth
in terabytes does not make sense, because that value will be too
large.
2010-02-25 12:33:15 +01:00
Sebastian Hahn f31db269a0 Update a section of the exit notice file, give it a changelog. 2010-02-23 20:11:07 +01:00
Sebastian Hahn c8f154e173 Proper NULL checking for hsdesc publication
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered
in the wild, but we should fix it anyways in case it ever happens.
Also make sure users get a note about this being a bug when they
see it in their log.

Thanks to ekir for discovering and reporting this bug.
2010-02-23 17:09:02 +01:00
Sebastian Hahn 7681e355ed Fix another coverity-spotted memleak 2010-02-23 15:05:39 +01:00
Mike Perry bce0021d96 Add a changelog entry for the bandwidth weightings. 2010-02-22 17:12:48 -08:00
Roger Dingledine 8ce1cb174d elevate a changelog entry, and get my mailto out of the man page 2010-02-22 16:19:35 -05:00
Nick Mathewson c084ae145e Merge remote branch 'sebastian/bug1254' 2010-02-22 12:45:01 -05:00
Sebastian Hahn d41030436c Expand homedirs in paths passed to tor-checkkey
This is so that coverity stops complaining about using a user-supplied
string with the open() syscall. Let's see if it works.
2010-02-22 12:13:58 +01:00
Sebastian Hahn f5112fa487 Zero a cipher completely before freeing it
We used to only zero the first ptrsize bytes of the cipher. Since
cipher is large enough, we didn't zero too many bytes. Discovered
and fixed by ekir. Fixes bug 1254.
2010-02-22 11:41:39 +01:00
Sebastian Hahn 5aa9610dd6 network-status-version must come first in a vote/consensus
Spec conformance issue: The code didn't force the network-status-version
token to be the first token in a v3 vote or consensus.

Problem discovered by Parakeep.
2010-02-22 09:16:26 +01:00
Roger Dingledine eb842c0022 Merge branch 'maint-0.2.1' into new
Conflicts:

	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2010-02-22 00:24:33 -05:00
Roger Dingledine 5e8c611673 prepare for 0.2.2.9-alpha 2010-02-22 00:20:55 -05:00
Roger Dingledine b9696b96da bump to 0.2.1.24 2010-02-21 17:27:12 -05:00
Nick Mathewson 0eb03bc6dd Merge remote branch 'public/cbt-status'
Conflicts:
	ChangeLog
2010-02-20 18:35:19 -05:00
Nick Mathewson 391f75d792 Merge remote branch 'sebastian/bug1143' 2010-02-19 16:58:24 -05:00
Sebastian Hahn 408a828b1f Make the DNSPort option work with libevent 2.x
We need to use evdns_add_server_port_with_base() when configuring
our DNS listener, because libevent segfaults otherwise. Add a macro
in compat_libevent.h to pick the correct implementation depending
on the libevent version.

Fixes bug 1143, found by SwissTorExit
2010-02-19 22:36:53 +01:00
Nick Mathewson 061ffbd7d5 Future-proof the control protocol by ignoring unrecognized keyword args 2010-02-18 12:49:48 -05:00
Nick Mathewson 2d95e02914 Make more arguments in control.c properly case-insensitive. 2010-02-18 12:49:26 -05:00
Mike Perry 54f1f2e558 Add changelog entry for CBT testing work. 2010-02-18 09:40:15 -08:00
Nick Mathewson 715f104eeb Merge remote branch 'origin/maint-0.2.1'
Conflicts:
	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2010-02-18 12:01:56 -05:00
Nick Mathewson 428c07ea0d Add changelog for latest openssl fix 2010-02-18 11:54:26 -05:00
Roger Dingledine de0330b092 Merge commit 'sebastian/oldstuff'
Conflicts:

	ChangeLog
2010-02-16 02:34:52 -05:00
Sebastian Hahn f164a76f72 Remove legacy files from main source distribution
The AUTHORS file was pretty outdated. Its contents moved onto the
people page. Design paper and roadmaps moved to the projects
directory in svn.
2010-02-16 06:41:36 +01:00
Roger Dingledine c9a3781580 give it a blurb, update the date 2010-02-13 14:10:57 -05:00
Nick Mathewson 79bdfb63e9 Remove the --enable-iphone option as needless.
On or-talk, Marco Bonetti reports that recent iPhone SDKs build
Tor fine without it.
2010-02-12 23:06:05 -05:00
Roger Dingledine 3e6a37e61e new dannenberg address; make moria2's demise official. 2010-02-12 14:31:08 -05:00
Roger Dingledine 33f8dcae6a prepare for 0.2.1.23 2010-02-12 12:35:40 -05:00
Nick Mathewson a4ef33a3f8 Add changelog for memcpy bug, with credit for "memcpyfail" 2010-02-09 13:08:49 -05:00
Nick Mathewson a6a1b8b815 Merge remote branch 'origin/maint-0.2.1' 2010-02-09 12:58:25 -05:00
Sebastian Hahn b2b99a70c0 Don't spam controllers with TOO_MANY_CONNECTIONS events
We implemented ratelimiting for warnings going into the logfile, but didn't
rate-limit controller events. Now both log warnings and controller events
are rate-limited.
2010-02-08 16:45:36 +01:00
Sebastian Hahn a168cd2a54 Don't use gethostbyname() in resolve_my_address()
Tor has tor_lookup_hostname(), which prefers ipv4 addresses automatically.
Bug 1244 occured because gethostbyname() returned an ipv6 address, which
Tor cannot handle currently. Fixes bug 1244; bugfix on 0.0.2pre25.
Reported by Mike Mestnik.
2010-02-08 15:49:54 +01:00
Nick Mathewson 080e8f50f8 Merge commit 'origin/maint-0.2.1' 2010-02-07 22:34:08 -05:00
Sebastian Hahn dfee173289 lookup_last_hid_serv_request() could overflow and leak memory
The problem was that we didn't allocate enough memory on 32-bit
platforms with 64-bit time_t. The memory leak occured every time
we fetched a hidden service descriptor we've fetched before.
2010-02-07 06:37:35 +01:00
Nick Mathewson 7d5d4f9f03 When we've disabled .exit hostnames, actually reject them.
Previously we were treating them as decent hostnames and sending them
to the exit, which is completely wrong.
2010-02-03 15:59:15 -05:00
Sebastian Hahn 03bd98b3b1 Don't assign Exit flag incorrectly
exit_policy_is_general_exit() assumed that there are no redundancies
in the passed policy, in the sense that we actively combine entries
in the policy to really get rid of any redundancy. Since we cannot
do that without massively rewriting the policy lines the relay
operators set, fix exit_policy_is_general_exit().

Fixes bug 1238, discovered by Martin Kowalczyk.
2010-02-03 05:44:00 +01:00
Nick Mathewson c7a2efb380 Add a changelog entry for fixing bug 1237.
We don't have such an entry for 0.2.1.x, since bug 1237 never made it
into a released version of 0.2.1.x.
2010-02-02 16:22:12 -05:00
Nick Mathewson 445e95b129 Merge commit 'origin/maint-0.2.1'
Conflicts:
	src/common/tortls.c
2010-01-29 17:20:59 -05:00
Nick Mathewson 1744e447a1 Decide whether to use SSL flags based on runtime OpenSSL version.
We need to do this because Apple doesn't update its dev-tools headers
when it updates its libraries in a security patch.  On the bright
side, this might get us out of shipping a statically linked OpenSSL on
OSX.

May fix bug 1225.

[backported]
2010-01-29 17:17:47 -05:00
Nick Mathewson 8d68e5c748 Decide whether to use SSL flags based on runtime OpenSSL version.
We need to do this because Apple doesn't update its dev-tools headers
when it updates its libraries in a security patch.  On the bright
side, this might get us out of shipping a statically linked OpenSSL on
OSX.

May fix bug 1225.
2010-01-29 17:02:17 -05:00
Sebastian Hahn 2c0ad636d9 Stop shipping the design paper in the tarballs 2010-01-27 20:09:19 +01:00
Nick Mathewson 0d51a2537a Fix ChangeLog entry for asciidoc branch. 2010-01-27 13:27:53 -05:00
Sebastian Hahn f6a673490f Stop putting parts of the website into tarballs.
The website wasn't used by our packages, and most users will not know how
to open html.en files anyways.
2010-01-27 11:36:39 +01:00
Roger Dingledine ff88bc7db8 0.2.2.8-alpha is coming out today sometime 2010-01-26 13:11:58 -05:00
Karsten Loesing 7e65871ccc Fix a memory corruption bug while collecting bridge stats
We accidentally freed the internal buffer for bridge stats when we
were writing the bridge stats file or honoring a control port
request for said data. Change the interfaces for
geoip_get_bridge_stats* to prevent these problems, and remove the
offending free/add a tor_strdup.

Fixes bug 1208.
2010-01-26 11:55:43 +01:00
Roger Dingledine 2309d0caae make the 0.2.2.7-alpha changelog actually complete.
weasel makes a good point.
2010-01-20 15:39:23 -05:00
Nick Mathewson d4354b506b Don't use OutboundBindAddress to connect to localhost
The OutboundBindAddress option is useful for making sure that all of
your outbond connections use a given interface.  But when connecting
to 127.0.0.1 (or ::1 even) it's important to actually have the
connection come _from_ localhost, since lots of programs running on
localhost use the source address to authenticate that the connection
is really coming from the same host.

Our old code always bound to OutboundBindAddress, whether connecting
to localhost or not.  This would potentially break DNS servers on
localhost, and socks proxies on localhost.  This patch changes the
behavior so that we only look at OutboundBindAddress when connecting
to a non-loopback address.
2010-01-20 13:09:10 -05:00
Roger Dingledine e6fc1b94a5 note the two new fixes are in 0.2.2.7-alpha too 2010-01-19 17:55:54 -05:00
Roger Dingledine 8d84b4bfa1 Merge branch 'maint-0.2.1'
Conflicts:

	ChangeLog
2010-01-19 17:54:41 -05:00
Roger Dingledine 1fc94bfd0e spread guard rotation out throughout the month 2010-01-19 17:52:52 -05:00
Roger Dingledine 0642ab2428 weight guard choice by bandwidth; discard old guards 2010-01-19 17:30:52 -05:00
Roger Dingledine 38b2331ea9 add changelog entries for my commits from last week 2010-01-19 15:58:55 -05:00
Roger Dingledine cbf9157d20 clean 0.2.2.7-alpha changelog; add 0.2.2.6 blurb
also reorder the stable changelog entries so they're in temporal order
2010-01-19 15:20:07 -05:00
Roger Dingledine 37ca182c7e Merge branch 'maint-0.2.1' into master
Conflicts:

	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2010-01-19 14:51:39 -05:00
Roger Dingledine f43f87db5b bump to 0.2.1.22, and give it a changelog 2010-01-19 14:43:05 -05:00
Roger Dingledine adae600715 rotate keys for moria1 and gabelmoo 2010-01-19 14:12:39 -05:00
Sebastian Hahn 4728bd904f Fix build on Solaris by disabling support for DisableAllSwap
Fixes bug 1198. Solaris doesn't have RLIMIT_MEMLOCK for get/setrlimit,
so disable support because we don't know if all memory can be locked.
2010-01-19 05:04:50 +01:00
Roger Dingledine 79eaeef1cd stop bridge authorities from leaking their bridge list 2010-01-17 19:41:22 -05:00
Nick Mathewson 571c94a735 Merge remote branch 'origin/maint-0.2.1'
Conflicts:
	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2010-01-16 16:29:54 -05:00
Roger Dingledine 8cba62cc2a don't div by 0 during path selection 2010-01-02 13:13:30 -05:00
Roger Dingledine f255272f45 add separate per-conn write limiting 2009-12-29 22:25:02 -05:00
Roger Dingledine 2ef988c065 New consensus params "bwconnrate" and "bwconnburst"
...to let us
rate-limit client connections as they enter the network. It's
controlled in the consensus so we can turn it on and off for
experiments. It's starting out off. Based on proposal 163.
2009-12-23 04:56:24 -05:00
Roger Dingledine 937607056b a changelog and doc fixes for the strictnodes work 2009-12-21 04:38:49 -05:00
Roger Dingledine 5201e05fc5 bump to 0.2.1.21 so we can release 2009-12-21 03:22:49 -05:00
Nick Mathewson 05a2473b7f Merge branch 'ewma' 2009-12-18 22:33:02 -05:00
Nick Mathewson 5e2eaa37f1 Add a changelog entry for the circuit priority logic 2009-12-18 22:32:56 -05:00
Nick Mathewson 7edae58984 Merge commit 'karsten/fix-bridge-stats-master-4' 2009-12-18 14:16:41 -05:00
Karsten Loesing e1e5c1b3ab Fix bridge statistics.
Fix statistics on client numbers by country as seen by bridges that were
broken in 0.2.2.1-alpha. Also switch to reporting full 24-hour intervals
instead of variable 12-to-48-hour intervals.
2009-12-17 09:22:55 +01:00
Karsten Loesing f711bc8221 Move ChangeLog entry to the right place. 2009-12-17 09:19:04 +01:00
Karsten Loesing d38268a8c7 Remove v0 hidden service statistics code.
The HSAuthorityRecordStats option was used to track statistics of overall
hidden service usage on the version 0 hidden service authorities. With the
version 2 hidden service directories being deployed and version 0
descriptors being phased out, these statistics are not as useful anymore.

Goodbye, you fine piece of software; my first major code contribution to
Tor.
2009-12-17 09:15:06 +01:00
Nick Mathewson 62c2a5a883 Merge commit 'karsten/fix-cell-stats'
Conflicts:
	ChangeLog
2009-12-16 21:59:25 -05:00
Nick Mathewson 350181529e Merge branch 'safelogging2'
Conflicts:
	ChangeLog
2009-12-15 17:26:09 -05:00
Nick Mathewson 616cbb31c7 Merge commit 'origin/maint-0.2.1' 2009-12-15 17:11:40 -05:00
Nick Mathewson 1c87a27574 Fix bug 1173: remove an assert(unsigned >= 0). 2009-12-15 15:51:59 -05:00
Roger Dingledine f7d99b62a3 New controller command "getinfo config-text"
It returns the contents that Tor would write if you send it a SAVECONF
command, so the controller can write the file to disk itself.
2009-12-13 19:21:06 -05:00
Sebastian Hahn f258647433 Allow SafeLogging to exclude client related information 2009-12-12 02:26:11 +01:00
Nick Mathewson 4afdb79051 add changelog entry for making openssl 0.9.8m work 2009-12-04 14:32:10 -05:00
Karsten Loesing b9b430e136 Add ChangeLog entry for last fix. 2009-12-03 11:07:41 +01:00
Roger Dingledine cee9a28d1e Merge commit 'origin/maint-0.2.1' 2009-11-23 10:16:38 -05:00
Roger Dingledine a89f51c936 fix race condition that can cause crashes at client or exit relay
Avoid crashing if the client is trying to upload many bytes and the
circuit gets torn down at the same time, or if the flip side
happens on the exit relay. Bugfix on 0.2.0.1-alpha; fixes bug 1150.
2009-11-23 10:13:50 -05:00
Roger Dingledine 7f3f88bed3 New config option "CircuitStreamTimeout"
New config option "CircuitStreamTimeout" to override our internal
timeout schedule for how many seconds until we detach a stream from
a circuit and try a new circuit. If your network is particularly
slow, you might want to set this to a number like 60.
2009-11-21 23:36:36 -05:00
Roger Dingledine fdd58f3bd5 If somebody tries to overflow my dirport, don't log his IP by default.
aka Fix an instance where a Tor directory mirror might accidentally
log the IP address of a misbehaving Tor client. Bugfix on
0.1.0.1-rc.
2009-11-21 23:09:24 -05:00
Roger Dingledine 4f8b36a1e2 clobber connections with different number than we clobber circuits 2009-11-21 23:02:10 -05:00
Roger Dingledine 01a9cc0413 bump to 0.2.2.6-alpha-dev 2009-11-21 22:57:05 -05:00
Nick Mathewson 444eff6286 Fix compilation on OSX 10.3.
On this OSX version, there is a stub mlockall() function
that doesn't work, *and* the declaration for it is hidden by
an '#ifdef _P1003_1B_VISIBLE'.  This would make autoconf
successfully find the function, but our code fail to build
when no declaration was found.

This patch adds an additional test for the declaration.
2009-11-20 13:28:16 -05:00
Roger Dingledine 1ee580407c bump to 0.2.2.6-alpha 2009-11-19 14:16:11 -05:00
Roger Dingledine 55cd2fa310 Merge commit 'origin/maint-0.2.1'
Conflicts:

	debian/changelog
2009-11-17 15:39:46 -05:00
Roger Dingledine 0656c12b07 add the 0.2.1.20 changelog blurb, plus update the releasenotes 2009-11-17 15:35:14 -05:00
Roger Dingledine 2bcb90a308 clean up changelog for the 0.2.2.6-alpha release 2009-11-17 07:02:17 -05:00
Roger Dingledine 22f674fcb8 Fix a memory leak on directory authorities during voting
Fix a memory leak on directory authorities during voting that was
introduced in 0.2.2.1-alpha. Found via valgrind.
2009-11-12 01:31:26 -05:00
Nick Mathewson 2db0256372 Add changelog entry to 0.2.2.x about openssl 0.9.8l fix 2009-11-06 15:25:41 -05:00
Nick Mathewson 0a58567ce3 Merge commit 'origin/maint-0.2.1'
Conflicts:
	src/common/tortls.c
2009-11-06 15:24:52 -05:00
Nick Mathewson ce0a89e262 Make Tor work with OpenSSL 0.9.8l
To fix a major security problem related to incorrect use of
SSL/TLS renegotiation, OpenSSL has turned off renegotiation by
default.  We are not affected by this security problem, however,
since we do renegotiation right.  (Specifically, we never treat a
renegotiated credential as authenticating previous communication.)
Nevertheless, OpenSSL's new behavior requires us to explicitly
turn renegotiation back on in order to get our protocol working
again.

Amusingly, this is not so simple as "set the flag when you create
the SSL object" , since calling connect or accept seems to clear
the flags.

For belt-and-suspenders purposes, we clear the flag once the Tor
handshake is done.  There's no way to exploit a second handshake
either, but we might as well not allow it.
2009-11-05 18:13:08 -05:00
Jacob Appelbaum 2aac39a779 Implement DisableAllSwap to avoid putting secret info in page files.
This commit implements a new config option: 'DisableAllSwap'
This option probably only works properly when Tor is started as root.
We added two new functions: tor_mlockall() and tor_set_max_memlock().
tor_mlockall() attempts to mlock() all current and all future memory pages.
For tor_mlockall() to work properly we set the process rlimits for memory to
RLIM_INFINITY (and beyond) inside of tor_set_max_memlock().
We behave differently from mlockall() by only allowing tor_mlockall() to be
called one single time. All other calls will result in a return code of 1.
It is not possible to change DisableAllSwap while running.
A sample configuration item was added to the torrc.complete.in config file.
A new item in the man page for DisableAllSwap was added.
Thanks to Moxie Marlinspike and Chris Palmer for their feedback on this patch.

Please note that we make no guarantees about the quality of your OS and its
mlock/mlockall implementation. It is possible that this will do nothing at all.
It is also possible that you can ulimit the mlock properties of a given user
such that root is not required. This has not been extensively tested and is
unsupported. I have included some comments for possible ways we can handle
this on win32.
2009-10-27 04:28:40 -04:00
Karsten Loesing 56c2385157 Fix bug 1113.
Bridges do not use the default exit policy, but reject *:* by default.
2009-10-27 01:03:41 -07:00
Karsten Loesing 19ddee5582 Fix bug 1042.
If your relay can't keep up with the number of incoming create cells, it
would log one warning per failure into your logs. Limit warnings to 1 per
minute.
2009-10-26 22:49:43 -07:00
Roger Dingledine ad525685f6 Merge commit 'karsten/fix-1066-3' 2009-10-26 22:45:12 -04:00
Nick Mathewson 698aaeb178 Note coverity fixes in changelog. 2009-10-26 22:40:41 -04:00
Nick Mathewson 8519d36633 Merge commit 'origin/maint-0.2.1' 2009-10-26 22:40:24 -04:00
Nick Mathewson e50e739556 Add changelog to describe coverity fixes for 0.2.1.21 2009-10-26 22:39:42 -04:00
Karsten Loesing 4256a96461 Fix bug 1066.
If all authorities restart at once right before a consensus vote, nobody
will vote about "Running", and clients will get a consensus with no usable
relays. Instead, authorities refuse to build a consensus if this happens.
2009-10-26 19:27:54 -07:00
Nick Mathewson 071521e02f Merge commit 'origin/maint-0.2.1'
Conflicts:
	ChangeLog
2009-10-26 20:15:03 -04:00
Nick Mathewson 56048637a5 Only send the if_modified_since header for a v3 consensus.
Spotted by xmux; bugfix on 0.2.0.10-alpha.
(Bug introduced by 20b10859)
2009-10-26 20:14:11 -04:00
Roger Dingledine e0b2c84cde add a changelog entry to karsten's fix for bug 1114 2009-10-26 03:16:47 -04:00
Nick Mathewson d40a814f4f Changelog for microdescriptor branch. 2009-10-19 00:39:20 -04:00
Nick Mathewson 5ef97ddd42 Merge commit 'origin/maint-0.2.1'
Conflicts:
	ChangeLog
	configure.in
	contrib/tor-mingw.nsi.in
	src/or/config.c
	src/win32/orconfig.h
2009-10-15 12:33:22 -04:00
Roger Dingledine 16dc543851 bump to 0.2.1.20 2009-10-15 12:14:18 -04:00
Roger Dingledine 2bee297d57 Move moria1 and Tonga to alternate IP addresses. 2009-10-15 12:14:18 -04:00
Roger Dingledine 2394336426 read the "circwindow" parameter from the consensus
backport of c43859c5c1
backport of 0d13e0ed14
2009-10-14 17:07:32 -04:00
Roger Dingledine 0a9356c4b1 add blurbs for recent dev releases 2009-10-14 15:49:26 -04:00
Nick Mathewson 81eee0ecff Fix a crash when using evdns from Libevent 2.
When we tried to use the deprecated non-threadsafe evdns
interfaces in Libevent 2 without using the also-deprecated
event_init() interface, Libevent 2 would sensibly crash, since it
has no guess where to find the Libevent library.

Here we use the evdns_base_*() functions instead if they're
present, and fake them if they aren't.
2009-10-13 17:54:04 -04:00
Roger Dingledine 27db678985 move nickm's commit to the correct release 2009-10-12 15:01:10 -04:00
Nick Mathewson 6f95435f28 Move android changelog entry to now-correct Tor version. 2009-10-11 23:31:54 -04:00
Nick Mathewson da990d09c3 Merge commit 'public/android' 2009-10-11 23:30:19 -04:00
Roger Dingledine 6265b9f09d Move dizum to an alternate IP address. 2009-10-11 14:59:14 -04:00
Roger Dingledine a9e0e2f819 bump to 0.2.2.4-alpha 2009-10-10 17:29:44 -04:00
Nick Mathewson 5a6575c2d4 Don't set unreachable from dirvote unless we've been running a while.
This is a possible fix for bug 1023, where if we vote (or make a v2
consensus networkstatus) right after we come online, we can call
rep_hist_note_router_unreachable() on every router we haven't connected
to yet, and thereby make all their uptime values reset.
2009-10-10 15:23:00 -04:00
Roger Dingledine 746a19e84d remove some dead code. some of it was tickling coverity. 2009-10-10 13:39:41 -04:00
Roger Dingledine 047fdd4104 add blurbs for recent alpha releases 2009-10-10 13:33:17 -04:00
Roger Dingledine 0c70390dd7 amend changelog for recent commits, plus clean up 2009-10-07 16:18:18 -04:00
Roger Dingledine 9325b9269c Ignore one-hop circuits for circuit timeout calc
Don't count one-hop circuits when we're estimating how long it
takes circuits to build on average. Otherwise we'll set our circuit
build timeout lower than we should. Bugfix on 0.2.2.2-alpha.
2009-10-01 04:15:45 -04:00
Roger Dingledine b9e8f0a013 Move Tonga to an alternate IP address 2009-09-30 22:35:05 -04:00
Roger Dingledine 69ecc127e9 Move moria1 to a nearby IP address 2009-09-30 18:46:55 -04:00
Roger Dingledine 53a7636a05 Dir auths reject relays running < Tor 0.1.2.14
Directory authorities now reject Tor relays with versions less than
0.1.2.14. This step cuts out four relays from the current network,
none of which are very big.
2009-09-30 18:34:21 -04:00
Mike Perry f7e6e852e8 Fix 1108: Handle corrupt or large build times state.
1108 was actually just a fencepost error in an assert,
but making the state file handling code resilient is a
good idea.
2009-09-29 14:07:04 -04:00
Nick Mathewson 1707b338ee Add changelog entry for Android work. 2009-09-29 01:01:28 -04:00