Nick Mathewson
b1567cf500
Three more fuzzers: consensus, hsdesc, intro points
2017-01-30 08:37:24 -05:00
Nick Mathewson
83e9918107
Tools for working with directories of fuzzed stuff.
2017-01-30 08:37:24 -05:00
Nick Mathewson
301eff0e90
fuzzing: Add copyright notices and whitespace fixes
2017-01-30 08:37:24 -05:00
Nick Mathewson
4afb155db2
Add microdesc format fuzzer.
2017-01-30 08:37:24 -05:00
Nick Mathewson
3c74855934
Addition to test cases: make sure fuzzer binaries allow known cases
...
This isn't fuzzing per se, so much as replaying the highlights of
past fuzzer runs.
2017-01-30 08:37:24 -05:00
Nick Mathewson
81e44c2257
Add extrainfo fuzzer
2017-01-30 08:37:24 -05:00
Nick Mathewson
44fa14c0e2
Try to tweak fuzzing.md to correspond to my changes
2017-01-30 08:37:24 -05:00
teor
0fb1156e9f
Add a script for running multiple fuzzing sessions on multiple cores
2017-01-30 08:37:23 -05:00
teor
416e2f6b28
Guide fuzzing by adding standard tor GET and POST testcases
2017-01-30 08:37:23 -05:00
Nick Mathewson
56b61d1831
Add more tweaks from teor's http fuzzing code.
...
Move option-manipulation code to fuzzing_common.
2017-01-30 08:37:23 -05:00
teor
584d723e04
Restrict fuzzing to the directory headers
2017-01-30 08:37:23 -05:00
Nick Mathewson
949e9827d6
Add a descriptor fuzzing dictionary.
2017-01-30 08:37:23 -05:00
Nick Mathewson
ca657074b9
Fuzzing: initialize siphash key, don't init_logging twice.
2017-01-30 08:37:23 -05:00
Nick Mathewson
0666928c5c
Replace signature-checking and digest-checking while fuzzing
2017-01-30 08:37:22 -05:00
Nick Mathewson
e2aeaeb76c
Make a bunch of signature/digest-checking functions mockable
2017-01-30 08:37:22 -05:00
Nick Mathewson
60769e710f
Port fuzz_http to use fuzzing_common.
...
Move common logic from fuzz_http to fuzzing_common.
2016-12-19 15:34:56 -05:00
teor
a967d568dc
Add a fuzzer for the http used in our directory protocol
...
(Teor wrote the code, nick extracted it. It won't compile yet.)
2016-12-19 15:34:56 -05:00
Nick Mathewson
b96c70d668
Fuzzing: Add an initial fuzzing tool, for descriptors.
...
This will need some refactoring and mocking.
2016-12-19 15:34:55 -05:00
teor
fca91a7793
for fuzzing: Add a function to make a buf with given contents
...
(Teor wrote the code, nick extracted it into a smaller patch.)
2016-12-19 15:02:08 -05:00
teor
02068c6391
For fuzzing: Expose directory_handle_command.
...
(Nick extracted this patch from a larger patch by Teor.)
2016-12-19 15:02:08 -05:00
Nick Mathewson
9bf89f80ce
bump to 0.3.0.1-alpha-dev
2016-12-19 14:24:38 -05:00
Nick Mathewson
6a7cb21e13
Bump to 0.3.0.1-alpha
2016-12-19 13:14:24 -05:00
Nick Mathewson
c468df3961
Don't warn about absent guard state when none expected.
...
Self-testing circuits don't use guards, and nobody uses guards when
UseEntryGuards is disabled.
Fixes bug 21007; bug not in any released Tor.
2016-12-19 12:24:30 -05:00
Nick Mathewson
f9f1e3c94b
Merge branch 'maint-0.2.9'
2016-12-19 08:03:17 -05:00
Nick Mathewson
de65647461
Merge branch 'maint-0.2.8' into maint-0.2.9
2016-12-19 07:58:43 -05:00
Nick Mathewson
c11de4c45f
Merge branch 'bug21018_024' into maint-0.2.8
2016-12-19 07:58:21 -05:00
Nick Mathewson
2dc5226644
Merge branch 'maint-0.2.9'
2016-12-19 07:31:19 -05:00
Nick Mathewson
169a93fff2
Merge branch 'maint-0.2.8' into maint-0.2.9
2016-12-19 07:30:42 -05:00
Nick Mathewson
e0306320b5
Merge remote-tracking branch 'teor/new-fallbacks-028-20161219' into maint-0.2.8
2016-12-19 07:27:39 -05:00
teor
4181e812c7
Update the fallback directory mirror list in December 2016
...
Replace the 81 remaining fallbacks of the 100 originally introduced
in Tor 0.2.8.3-alpha in March 2016, with a list of 177 fallbacks
(123 new, 54 existing, 27 removed) generated in December 2016.
Resolves ticket 20170.
2016-12-19 15:44:20 +11:00
Nick Mathewson
0fb3058ece
Make log message warn about detected attempts to exploit 21018.
2016-12-18 20:17:28 -05:00
Nick Mathewson
d978216dea
Fix parsing bug with unecognized token at EOS
...
In get_token(), we could read one byte past the end of the
region. This is only a big problem in the case where the region
itself is (a) potentially hostile, and (b) not explicitly
nul-terminated.
This patch fixes the underlying bug, and also makes sure that the
one remaining case of not-NUL-terminated potentially hostile data
gets NUL-terminated.
Fix for bug 21018, TROVE-2016-12-002, and CVE-2016-1254
2016-12-18 20:17:24 -05:00
Nick Mathewson
ae89d9745d
Revert ticket 20982 changes.
...
They broke stem, and breaking application compatibility is usually a
bad idea.
This reverts commit 6e10130e18
,
commit 78a13df158
, and
commit 62f52a888a
.
We might re-apply this later, if all the downstream tools can handle
it, and it turns out to be useful for some reason.
2016-12-18 10:04:36 -05:00
Roger Dingledine
51ee549a90
fix typos and trivial syntax problems
2016-12-18 04:06:02 -05:00
Roger Dingledine
f3d056ab16
clarify debug-level log while initializing entropy
...
I got confused when I saw my Tor saying it was opening a file
that doesn't exist. It turns out it isn't opening it, it's just
calling open() on it and then moving on when it's not there.
2016-12-18 03:48:31 -05:00
Nick Mathewson
ff08be56ac
Fix another pointless stack-protector warning.
...
This is the same as we fixed in 39f4554687
.
2016-12-16 14:06:25 -05:00
Nick Mathewson
762b799545
Rename 'remove' -> 'rmv' to avoid shadowing a libc global
2016-12-16 14:04:57 -05:00
Nick Mathewson
698ed75e1a
Resolve some coverity complaints in test_entrynodes.c
2016-12-16 12:23:46 -05:00
Nick Mathewson
23c09b6bc2
Resolve a division-by-zero complaint from coverity. CID 1397272
2016-12-16 12:21:02 -05:00
Nick Mathewson
2a00110e5b
Revert "Stop checking whether environ is declared."
...
This reverts commit 954eeda619
.
Apparently, OpenBSD is what expects you to declare environ
yourself. So 19142 is a wontfix.
2016-12-16 12:16:52 -05:00
Nick Mathewson
79a24750ba
Fix broken entrynodes/retry_unreachable test
...
I broke this with 20292ec497
when I
changed the primary guard retry schedule.
2016-12-16 11:49:07 -05:00
Nick Mathewson
c52c47ae6f
Disable the legacy guard algorithm. Code isn't removed yet.
...
(Keeping the code around in case I broke Tor in some unexpected
way.)
2016-12-16 11:42:34 -05:00
Nick Mathewson
990a863d7c
Merge branch 'ticket20831_v2'
2016-12-16 11:40:19 -05:00
Nick Mathewson
506bd6d47c
Make NumDirectoryGuards work with the new guard algorithm.
...
Now that we support NumEntryGuards, NumDirectoryGuards is pretty
easy to put back in.
2016-12-16 11:34:31 -05:00
Nick Mathewson
d9200d853d
Make NumEntryGuards work as expected again.
...
Further, add a "guard-n-primary-guards-to-use" parameter, defaulting
to 1, for NumEntryGuards to override.
2016-12-16 11:34:31 -05:00
Nick Mathewson
deb8bcadce
271: Algorithm tweak to allow multiple entry guards.
...
Previously, we had NumEntryGuards kind of hardwired to 1. Now we
have the code (but not the configuarability) to choose randomly from
among the first N primary guards that would work, where N defaults
to 1.
Part of 20831 support for making NumEntryGuards work again.
2016-12-16 11:34:31 -05:00
Nick Mathewson
385602e982
Respect GuardLifetime in prop271 code.
...
It overrides both the GUARD_LIFETIME and the
GUARD_CONFIRMED_MIN_LIFETIME options.
2016-12-16 11:34:31 -05:00
Nick Mathewson
3902a18a69
Remove UseDirectoryGuards
...
It is obsoleted in an always-on direction by prop271.
2016-12-16 11:32:51 -05:00
Nick Mathewson
988b0afbd6
Merge branch 'ticket20826_v2'
2016-12-16 11:29:02 -05:00
Nick Mathewson
e044b4f8ce
Support restrictive ENTRYNODES configurations correctly.
...
Since we already had a separate function for getting the universe of
possible guards, all we had to do was tweak it to handle very the
GS_TYPE_RESTRICTED case.
2016-12-16 11:28:27 -05:00