Peter Palfrader
aa4f86dafa
postinst: Remove the check that requires the debian-tor user to have a uid
...
between 100 and 999. There is no good reason to require this. If the local
admin moves the system users/uid-space to some other range then they probably
have a good reason for that.
svn:r13205
2008-01-21 14:44:56 +00:00
Roger Dingledine
ff62154ba3
New config options WarnPlaintextPorts and RejectPlaintextPorts so
...
Tor can warn and/or refuse connections to ports commonly used with
vulnerable-plaintext protocols.
We still need to figure out some good defaults for them.
svn:r13198
2008-01-20 05:54:15 +00:00
Roger Dingledine
a1f2817307
minor cleanups
...
svn:r13190
2008-01-19 20:00:53 +00:00
Roger Dingledine
250590b9e7
and add blurbs for 0.2.0.1[67]-alpha
...
svn:r13189
2008-01-19 18:05:19 +00:00
Roger Dingledine
1ee96aa48c
and forward-port those
...
svn:r13188
2008-01-19 17:58:09 +00:00
Roger Dingledine
7dde7b02a2
try to grow a convention about where we put the time_to_foo and
...
FOO_INTERVAL declarations.
svn:r13177
2008-01-18 05:00:35 +00:00
Roger Dingledine
43dce232ad
If we've gone 12 hours since our last bandwidth check, and we
...
estimate we have less than 50KB bandwidth capacity but we could
handle more, do another bandwidth test.
svn:r13176
2008-01-18 04:58:40 +00:00
Roger Dingledine
3d3663a123
Don't answer "/tor/networkstatus-bridges" directory requests if
...
the request isn't encrypted.
svn:r13175
2008-01-18 04:51:12 +00:00
Roger Dingledine
6228213647
minor typo
...
svn:r13174
2008-01-18 04:50:15 +00:00
Roger Dingledine
4682e5f924
when we're counting how many descriptors to not download, be a
...
little bit more accurate
svn:r13173
2008-01-18 04:47:03 +00:00
Roger Dingledine
06047bcec9
Avoid going directly to the directory authorities even if you're a
...
relay, if you haven't found yourself reachable yet or if you've
decided not to advertise your dirport yet. Addresses bug 556.
svn:r13172
2008-01-18 04:42:22 +00:00
Roger Dingledine
200ce2030c
bump to 0.2.0.17-alpha-dev
...
svn:r13171
2008-01-18 04:27:16 +00:00
Peter Palfrader
272428727e
New upstream version
...
svn:r13168
2008-01-17 21:15:07 +00:00
Peter Palfrader
92e4cfdeb4
Merge in 0.1.2.1[89]-1 changelog
...
svn:r13166
2008-01-17 20:36:29 +00:00
Roger Dingledine
b4b3472b9f
Make the tor-gencert man page get included correctly in the tarball.
...
svn:r13163
2008-01-17 20:32:37 +00:00
Roger Dingledine
60a3df5a09
bump to 0.2.0.16-alpha
...
svn:r13160
2008-01-17 19:56:33 +00:00
Roger Dingledine
fe2f9a29f8
muck with the 0.2.0.16-alpha some more
...
svn:r13159
2008-01-17 19:56:21 +00:00
Roger Dingledine
8e601e0ae5
explain a bit about router descriptor purposes
...
svn:r13154
2008-01-17 05:47:44 +00:00
Roger Dingledine
55e052b0a5
Assert error introduced in r11957:
...
Fix an assert if we post a general-purpose descriptor via the
control port but that descriptor isn't mentioned in our current
network consensus. Bug reported by Jon McLachlan; bugfix on
0.2.0.9-alpha.
svn:r13153
2008-01-17 05:25:21 +00:00
Nick Mathewson
4a3b7496f0
r17639@catbus: nickm | 2008-01-15 19:09:21 -0500
...
Fix some hard to trigger but nonetheless real memory leaks spotted by an anonymous contributor. Needs review. Partial backport candidate.
svn:r13147
2008-01-16 05:27:19 +00:00
Nick Mathewson
24aae484c9
r17624@catbus: nickm | 2008-01-15 00:42:01 -0500
...
Fixes to more anonymously-reported typos and logic errors.
svn:r13136
2008-01-15 05:57:19 +00:00
Nick Mathewson
a984011814
r17623@catbus: nickm | 2008-01-15 00:22:04 -0500
...
bulletproof option_get_canonical_name()
svn:r13135
2008-01-15 05:57:14 +00:00
Nick Mathewson
89dfec02d8
r17614@catbus: nickm | 2008-01-14 13:55:25 -0500
...
Add a missing "goto err" when parsing v2 ns docs
svn:r13133
2008-01-14 19:00:33 +00:00
Nick Mathewson
d7fb8a34ac
r17613@catbus: nickm | 2008-01-14 13:52:44 -0500
...
Do not segfault if symetric key generation somehow fails in crypto_hybrid_encrypt.
svn:r13132
2008-01-14 19:00:28 +00:00
Nick Mathewson
581ba51c5c
r17612@catbus: nickm | 2008-01-14 13:46:04 -0500
...
Oops; fix compile
svn:r13131
2008-01-14 19:00:26 +00:00
Nick Mathewson
3b8f76aa51
r17611@catbus: nickm | 2008-01-14 13:44:16 -0500
...
add some missing checks for failing return values.
svn:r13130
2008-01-14 19:00:23 +00:00
Nick Mathewson
e49229caf8
r17610@catbus: nickm | 2008-01-14 13:20:49 -0500
...
Fix a bogus free() call on a base64 failure in router_append_dirobj_signature().
svn:r13129
2008-01-14 19:00:19 +00:00
Nick Mathewson
e1c9775517
r17584@catbus: nickm | 2008-01-12 18:52:01 -0500
...
Fix output of "tor-gencert --help"
svn:r13128
2008-01-14 19:00:13 +00:00
Peter Palfrader
af78168413
Fix error induced by timezone offset
...
svn:r13124
2008-01-13 00:26:44 +00:00
Peter Palfrader
388b2f6221
And fix the exit code for OK
...
svn:r13123
2008-01-13 00:21:08 +00:00
Nick Mathewson
edf5e70784
r15891@tombo: nickm | 2008-01-12 19:20:24 -0500
...
Basic hacks to get TLS handshakes working: remove dead code; fix post-handshake logic; keep servers from writing while the client is supposed to be renegotiating. This may work. Needs testing.
svn:r13122
2008-01-13 00:20:47 +00:00
Nick Mathewson
ae6df065ed
r15890@tombo: nickm | 2008-01-12 17:19:51 -0500
...
Add a --disable-buffer-freelists configure argument to build without buffer RAM chunk freelists, so we can benchmark the impact of this.
svn:r13121
2008-01-13 00:20:44 +00:00
Nick Mathewson
1b4ef78f6a
r15889@tombo: nickm | 2008-01-12 17:18:29 -0500
...
Stop trying to mess with version in tor-mingw.nsi.in when we reconfigure. This is a relic of our pre-mingw days, when we didn't use autoconf on windows.
svn:r13120
2008-01-13 00:20:41 +00:00
Peter Palfrader
1a07250730
nagios-check-tor-authority-cert - check certificate expiry time
...
svn:r13119
2008-01-13 00:15:08 +00:00
Nick Mathewson
cbf26037cb
r17584@catbus: nickm | 2008-01-12 18:52:01 -0500
...
Fix output of "tor-gencert --help"
svn:r13118
2008-01-12 23:52:05 +00:00
Roger Dingledine
a03d0e16e4
minor tweaks of the v2-conn-protocol text
...
svn:r13117
2008-01-12 19:50:52 +00:00
Nick Mathewson
01df4856f7
r17581@catbus: nickm | 2008-01-12 00:52:35 -0500
...
Actually write up what I'm implementing for the v2 connection protocol
svn:r13113
2008-01-12 05:53:03 +00:00
Nick Mathewson
705b4670d3
r17580@catbus: nickm | 2008-01-11 20:40:30 -0500
...
Fix policies.c build on gcc 4.2 with warnings.
svn:r13112
2008-01-12 05:52:59 +00:00
Andrew Lewman
d6b5301007
fix things to make nsis happy
...
svn:r13110
2008-01-11 15:24:54 +00:00
Andrew Lewman
6ee5328ac5
Update makefile for panther, update polipo version where needed.
...
svn:r13107
2008-01-11 14:25:49 +00:00
Roger Dingledine
23a891bf4d
add in a pdf so it'll be in our svn
...
svn:r13103
2008-01-11 03:18:56 +00:00
Roger Dingledine
134924482f
0.2.0.15-alpha blurb
...
svn:r13102
2008-01-11 02:31:19 +00:00
Roger Dingledine
4cf1b35a23
start to flesh out the issues; and add some more
...
svn:r13101
2008-01-11 02:23:33 +00:00
Roger Dingledine
4e9a701d4b
fix unit tests after r13092
...
svn:r13100
2008-01-10 23:11:13 +00:00
Roger Dingledine
8435de3c78
add an outline for a new roadmap
...
svn:r13099
2008-01-10 19:08:07 +00:00
Nick Mathewson
b84955285a
r17564@catbus: nickm | 2008-01-10 13:19:59 -0500
...
Fix bug in r13094: be sure to set the purpose and send_unencrypted fields correctly in our own routerinfo and extrainfo.
svn:r13098
2008-01-10 18:20:04 +00:00
Nick Mathewson
10d86f7615
r17558@catbus: nickm | 2008-01-10 13:07:41 -0500
...
If we do not serve v2 directory info, and our cached v2 networkstatus files are very old, remove them. If the directory is old, remove that too. (We already did this for obsolete routers files.)
svn:r13096
2008-01-10 18:08:42 +00:00
Roger Dingledine
2ac1e36248
minor cleanups
...
svn:r13095
2008-01-10 17:54:24 +00:00
Nick Mathewson
04263648c4
r17554@catbus: nickm | 2008-01-10 12:48:29 -0500
...
Do not send bridge descriptors over unencrypted connections.
svn:r13094
2008-01-10 17:48:40 +00:00
Nick Mathewson
29b0f51a73
r17553@catbus: nickm | 2008-01-10 12:18:27 -0500
...
Add connection_dir_is_encrypted() so that we can refrain from sending bridge descriptors over an unencrypted link.
svn:r13093
2008-01-10 17:48:36 +00:00