Nick Mathewson
9a06282546
Change the sandbox behavior on all failed opens() to EACCES
...
Previously, most disallowed open(O_RDONLY) attempts would EACCES,
but others would fail with a crash.
2018-01-26 12:18:43 -05:00
Fernando Fernandez Mancera
54783b4c22
Refactor crypto.[ch] into smaller RSA module.
...
Add two new files (crypto_rsa.c, crypto_rsa.h) as new module of crypto.[ch].
This new module includes all functions and dependencies related to RSA
operations. Those have been removed from crypto.[ch].
All new changes related to RSA operations must be done in these files.
Follows #24658
Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
2018-01-26 13:09:52 +01:00
Nick Mathewson
5b55e15707
Remove all the old max_delay logic.
...
We had tests for it, but it was always INT_MAX.
2018-01-25 16:05:20 -05:00
Nick Mathewson
cd4fd9887b
fixup! Remove the old ("deterministic") download schedule.
...
oops, fix the bug number.
2018-01-25 16:05:09 -05:00
Nick Mathewson
bf74194f57
fixup! Remove the old ("deterministic") download schedule.
...
Un-indent a block.
I'm doing this as a separate fixup commit to make review simpler.
2018-01-25 15:52:33 -05:00
Nick Mathewson
e0049ef022
Remove the old ("deterministic") download schedule.
...
We haven't meant to use it since we introduced the random
exponential schedule.
Closes ticket 23814.
2018-01-25 15:51:13 -05:00
David Goulet
93b826faaa
geoip: Add a lookup function for client map entry
...
The upcoming DoS mitigation subsytem needs to keep information on a per-IP
basis which is also what the geoip clientmap does.
For another subsystem to access that clientmap, this commit adds a lookup
function that returns the entry. For this, the clientmap_entry_t had to be
moved to the header file.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-01-25 15:44:48 -05:00
Nick Mathewson
7a74b3663f
Merge remote-tracking branch 'ahf-oniongit/bugs/25026'
2018-01-25 13:57:37 -05:00
Nick Mathewson
b1fc383bdb
Bump version to 0.3.3.1-alpha-dev
2018-01-25 13:50:55 -05:00
Nick Mathewson
de8bc9eed6
Reflow changelog
2018-01-25 13:27:49 -05:00
Nick Mathewson
e063dacc92
We do not put a colon here.
2018-01-25 11:55:49 -05:00
Nick Mathewson
25a1183fbe
bump version to 0.3.3.1-alpha
2018-01-25 11:48:42 -05:00
Nick Mathewson
e2411e76d8
Proofreading step by seborn (thx)
2018-01-25 11:37:01 -05:00
Nick Mathewson
e6de89f195
finish writing the blurb
2018-01-25 11:05:25 -05:00
Nick Mathewson
383a6fb90f
More editing on the ChangeLog
2018-01-25 11:00:30 -05:00
Alexander Færøy
162d75d587
Update HiddenServiceVersion man-page entry to only accept either 2 or 3.
...
This patch updates the HiddenServiceVersion man-page entry to only
accept either 2 or 3 as argument and not a list of multiple versions.
See: https://bugs.torproject.org/25026
2018-01-25 16:59:09 +01:00
Nick Mathewson
d592cfadd3
spellcheck the changelog
2018-01-25 10:05:51 -05:00
Nick Mathewson
40f5e65453
re-sort and re-flow the changelog
2018-01-25 10:02:52 -05:00
Nick Mathewson
6bc037ef9b
Light changelog relabeling and editing
2018-01-25 10:02:34 -05:00
Nick Mathewson
2d5bab6afb
Start on a changelog for 0.3.1.1-alpha
2018-01-24 17:08:13 -05:00
Nick Mathewson
fdc1cc9b44
Remove changes files that also appeared in 0.3.2.9
2018-01-24 17:01:44 -05:00
Nick Mathewson
7e504515b3
Always look at the subprotocol versions summary flags
...
Previously, we wouldn't do this when running with a routerinfo_t in
some cases, leading to many needless calls to the protover module.
This change also cleans up the code in nodelist.c a bit.
Fixes bug 25008; bugfix on 0.2.9.4-alpha.
2018-01-24 13:53:56 -05:00
Nick Mathewson
92496a739a
Also cache the protover summary in the routerinfo_t, if we're using that
2018-01-24 13:53:56 -05:00
Nick Mathewson
7792be2d44
Extract code to summarize protocol versions into new function
...
This will let us put this summary into routerinfo_t too.
No behavior change.
2018-01-24 13:53:55 -05:00
Nick Mathewson
d9fbd34f42
Extract protover summary flags into a new structure
...
This will let us use them on routerinfo_t as well as on
routerstatus_t, and save some time on relays.
No behavioral changes here.
2018-01-24 13:53:55 -05:00
Nick Mathewson
fd8ee1d7c3
Merge branch 'maint-0.3.2'
2018-01-24 12:09:07 -05:00
Nick Mathewson
2484d1eb35
Fix a memory leak in build_unopened_fourhop
...
This is a unit-test-only leak, but let's fix it anyway so it doesn't
hide real bugs.
Bug not in any released version of Tor.
2018-01-24 12:08:39 -05:00
Nick Mathewson
6ba2881aec
Fix a memory leak in scheduler/loop_kist
...
Fixes bug 25005.
2018-01-24 12:07:45 -05:00
Taylor Yu
37f26aa470
Add missing static keywords
...
crypto_openssl_header_version_str and crypto_openssl_version_str in
crypto_openssl_mgt.c should be static.
2018-01-23 16:01:26 -06:00
Nick Mathewson
23473f5e74
openssl_mutexes code belongs in openssl_mgt.c
2018-01-23 14:43:06 -05:00
Nick Mathewson
fa694f5af3
add a missing "compat_openssl.h"
2018-01-23 14:41:46 -05:00
Nick Mathewson
a172f02dfb
perhaps this was the missing include?
2018-01-23 14:19:25 -05:00
Nick Mathewson
a34629fa28
Add a missing include for openssl 1.0.2
2018-01-23 14:16:53 -05:00
Nick Mathewson
6f4ee6e5e7
Merge remote-tracking branch 'mikeperry/bug24946'
2018-01-23 14:08:47 -05:00
Nick Mathewson
58f4aee90b
Merge remote-tracking branch 'asn/bug24896'
2018-01-23 14:06:27 -05:00
Nick Mathewson
13a2acba3c
Merge remote-tracking branch 'ffmancera/bug24658-openssl'
2018-01-23 14:02:45 -05:00
Nick Mathewson
0dbe3ddc33
Make Tor support TLS1.3 ciphers with OpenSSL 1.1.1
...
Without this patch, not only will TLS1.3 not work with Tor, but
OpenSSL 1.1.1 with TLS1.3 enabled won't build any connections at
all: It requires that either TLS1.3 be disabled, or some TLS1.3
ciphersuites be listed.
Closes ticket 24978.
2018-01-23 09:23:21 -05:00
George Kadianakis
17daab76b8
Add onion service activity information to our heartbeat logs.
2018-01-23 12:31:06 +02:00
Fernando Fernandez Mancera
f2fca51976
Move the openssl namespace back into .c files.
...
As we're trying not to have all the other modules in Tor, we moved the openssl
namespace includes back into crypto.c and crypto_openssl_mgt.c files.
Follows #24658 .
Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
2018-01-22 16:48:33 +01:00
Mike Perry
db5b670d85
Bug 24946: Fix a warning message caused by a missed purpose check.
...
Also fix three other checks (found by inspection of all
CIRCUIT_PURPOSE_C_GENERAL occurrences).
2018-01-20 03:18:31 +00:00
Roger Dingledine
48a51c5f8b
oxford comma for-the-win
2018-01-19 18:42:53 -05:00
Nick Mathewson
ef148638a1
Add a "falls through" comment to make gcc happy.
2018-01-19 17:29:36 -05:00
Nick Mathewson
1bcbb1bb0b
Merge remote-tracking branch 'mikeperry/bug23101-mergeready-squashed'
2018-01-19 17:28:10 -05:00
Mike Perry
489628a7e4
Bug 23101: Pre-build HS-specific circuits (instead of general).
...
Prebuilt circs are 4 hops, since only server side HSDIR and intro circs
are 3 hops, and it is OK if those sometimes take longer to build.
2018-01-19 22:21:49 +00:00
Mike Perry
86ee771c28
Add new circuit purposes for hsdir activity.
...
This lets us control their path len and usage.
2018-01-19 22:21:48 +00:00
Mike Perry
20a3f61105
Implement layer 2 and layer 3 guard pinning via torrc.
...
Block circuit canibalization when HSRendezvousMiddleNodes is active.
Also make it apply to all HS circuits, not just rends.
2018-01-19 22:21:48 +00:00
Nick Mathewson
edd427a8ba
Merge branch 'disable_signal_handlers'
2018-01-19 16:35:24 -05:00
Nick Mathewson
df4d5ebb7d
Merge branch 'maint-0.3.2'
2018-01-19 16:30:53 -05:00
Nick Mathewson
129456e222
Merge branch 'maint-0.3.1' into maint-0.3.2
2018-01-19 16:30:50 -05:00
Nick Mathewson
de3cf40fa6
Merge remote-tracking branch 'dgoulet/bug24895_032_02' into maint-0.3.2
2018-01-19 16:30:44 -05:00