mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
parent
298dc95dfd
commit
20883f5e83
@ -29,14 +29,6 @@ Changes in version 0.2.1.16-?? - 2009-??-??
|
|||||||
- Avoid crashing when we have a policy specified in a DirPolicy or
|
- Avoid crashing when we have a policy specified in a DirPolicy or
|
||||||
SocksPolicy or ReachableAddresses option with ports set on it, and we
|
SocksPolicy or ReachableAddresses option with ports set on it, and we
|
||||||
re-load the policy. May fix bug 996.
|
re-load the policy. May fix bug 996.
|
||||||
- Hidden service clients didn't use a cached service descriptor that
|
|
||||||
was older than 15 minutes, but wouldn't fetch a new one either. Now,
|
|
||||||
use a cached descriptor no matter how old it is and only fetch a new
|
|
||||||
one when all introduction points fail. Fix for bug 997. Patch from
|
|
||||||
Marcus Griep.
|
|
||||||
- Fix refetching of hidden service descriptors when all introduction
|
|
||||||
points have turned out to not work. Fixes more of bug 997.
|
|
||||||
|
|
||||||
|
|
||||||
o Minor bugfixes (on 0.2.1.x):
|
o Minor bugfixes (on 0.2.1.x):
|
||||||
- When switching back and forth between bridge mode, do not start
|
- When switching back and forth between bridge mode, do not start
|
||||||
|
@ -1683,12 +1683,27 @@ connection_ap_handshake_rewrite_and_attach(edge_connection_t *conn,
|
|||||||
if (conn->rend_data->auth_type == REND_NO_AUTH)
|
if (conn->rend_data->auth_type == REND_NO_AUTH)
|
||||||
rend_client_refetch_renddesc(conn->rend_data->onion_address);
|
rend_client_refetch_renddesc(conn->rend_data->onion_address);
|
||||||
} else { /* r > 0 */
|
} else { /* r > 0 */
|
||||||
conn->_base.state = AP_CONN_STATE_CIRCUIT_WAIT;
|
/** How long after we receive a hidden service descriptor do we consider
|
||||||
log_info(LD_REND, "Descriptor is here and fresh enough. Great.");
|
* it valid? */
|
||||||
if (connection_ap_handshake_attach_circuit(conn) < 0) {
|
#define NUM_SECONDS_BEFORE_HS_REFETCH (60*15)
|
||||||
if (!conn->_base.marked_for_close)
|
if (now - entry->received < NUM_SECONDS_BEFORE_HS_REFETCH) {
|
||||||
connection_mark_unattached_ap(conn, END_STREAM_REASON_CANT_ATTACH);
|
conn->_base.state = AP_CONN_STATE_CIRCUIT_WAIT;
|
||||||
return -1;
|
log_info(LD_REND, "Descriptor is here and fresh enough. Great.");
|
||||||
|
if (connection_ap_handshake_attach_circuit(conn) < 0) {
|
||||||
|
if (!conn->_base.marked_for_close)
|
||||||
|
connection_mark_unattached_ap(conn, END_STREAM_REASON_CANT_ATTACH);
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
conn->_base.state = AP_CONN_STATE_RENDDESC_WAIT;
|
||||||
|
log_info(LD_REND, "Stale descriptor %s. Re-fetching.",
|
||||||
|
safe_str(conn->rend_data->onion_address));
|
||||||
|
/* Fetch both, v0 and v2 rend descriptors in parallel. Use whichever
|
||||||
|
* arrives first. Exception: When using client authorization, only
|
||||||
|
* fetch v2 descriptors.*/
|
||||||
|
rend_client_refetch_v2_renddesc(conn->rend_data);
|
||||||
|
if (conn->rend_data->auth_type == REND_NO_AUTH)
|
||||||
|
rend_client_refetch_renddesc(conn->rend_data->onion_address);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -473,9 +473,10 @@ rend_client_refetch_renddesc(const char *query)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Unless we already have a descriptor for <b>rend_query</b> with at least
|
/** Start a connection to a hidden service directory to fetch a v2
|
||||||
* one (possibly) working introduction point in it, start a connection to a
|
* rendezvous service descriptor for the base32-encoded service ID
|
||||||
* hidden service directory to fetch a v2 rendezvous service descriptor. */
|
* <b>query</b>.
|
||||||
|
*/
|
||||||
void
|
void
|
||||||
rend_client_refetch_v2_renddesc(const rend_data_t *rend_query)
|
rend_client_refetch_v2_renddesc(const rend_data_t *rend_query)
|
||||||
{
|
{
|
||||||
|
@ -966,11 +966,6 @@ rend_cache_lookup_entry(const char *query, int version, rend_cache_entry_t **e)
|
|||||||
}
|
}
|
||||||
if (!*e)
|
if (!*e)
|
||||||
return 0;
|
return 0;
|
||||||
tor_assert((*e)->parsed && (*e)->parsed->intro_nodes);
|
|
||||||
/* XXX022 hack for now, to return "not found" if there are no intro
|
|
||||||
* points remaining. See bug 997. */
|
|
||||||
if (smartlist_len((*e)->parsed->intro_nodes) == 0)
|
|
||||||
return 0;
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user