tor/changes
teor f80a43d16f Stop ignoring hidden service key anonymity when first starting tor
Instead, refuse to start tor if any hidden service key has been used in
a different hidden service anonymity mode.

Fixes bug 20638; bugfix on 17178 in 0.2.9.3-alpha; reported by ahf.

The original single onion service poisoning code checked poisoning state
in options_validate, and poisoned in options_act. This was problematic,
because the global array of hidden services had not been populated in
options_validate (and there were ordrering issues with hidden service
directory creation).

This patch fixes this issue in rend_service_check_dir_and_add, which:
* creates the directory, or checks permissions on an existing directory, then
* checks the poisoning state of the directory, then
* poisons the directory.

When validating, only the permissions checks and the poisoning state checks
are perfomed (the directory is not modified).
2016-12-01 09:44:53 -05:00
..
.dummy Add a .dummy file in the changes directory to stop git from removing it 2015-05-11 11:41:48 -04:00
20460 Make new changes files pass lintchanges 2016-11-07 16:19:05 -05:00
bug19869 Avoid tor_fragile_assert() failure with DNSPort on RESOLVED_TYPE_ERROR 2016-10-26 14:16:40 -04:00
bug19968 Actually clamp the number of detected CPUs to 16. 2016-10-31 14:19:39 -04:00
bug19969 Fix warnings from lintChanges.py 2016-11-06 16:39:46 -05:00
bug20085 In torrc.sample.in, note that bandwidth must be >=75 KB. 2016-11-08 19:23:49 -05:00
bug20306_029 policy_is_reject_star(): 2016-10-31 15:05:56 -04:00
bug20401 Actually free the worker_state_t object when we do an update with it 2016-10-31 15:20:25 -04:00
bug20472 Fix warnings from lintChanges.py 2016-11-06 16:39:46 -05:00
bug20484 Create single-onion-service directory before poisoning it, if needed 2016-10-31 14:54:20 -04:00
bug20487 Add a sentence to the manpage about nonanonymous=>Socksport 0. 2016-10-31 15:13:27 -04:00
bug20529 Check every hidden service directory's permissions when configuring 2016-11-02 14:32:04 +11:00
bug20533 When downloading certificates, check for related failures 2016-11-08 00:01:20 +11:00
bug20534 Adjust download schedules per teor's #20534 recommendataions 2016-11-07 11:01:20 -05:00
bug20536 Do not apply 'max_failures' to random-exponential schedules. 2016-11-06 20:08:11 -05:00
bug20551 Fix warnings from lintChanges.py 2016-11-06 16:39:46 -05:00
bug20553 Work around a behavior change in openssl's BUF_MEM code 2016-11-03 10:51:10 -04:00
bug20560 Use va_copy() in pure-windows version of tor_asprintf(). 2016-11-08 18:44:06 -05:00
bug20587 Make new changes files pass lintchanges 2016-11-07 16:19:05 -05:00
bug20588 Make new changes files pass lintchanges 2016-11-07 16:19:05 -05:00
bug20591 Ensure relays don't make multiple connections during bootstrap 2016-11-07 23:05:55 +11:00
bug20593 Count HTTP 503 as a download failure. 2016-11-07 11:01:21 -05:00
bug20597 When using exponential backoff in test networks, use a lower exponent 2016-11-08 16:42:26 +11:00
bug20613 Stop logging single onion and Tor2web long-term one-hop circuits 2016-11-09 11:23:51 +11:00
bug20634 Changes file for bug 20634 2016-11-16 13:14:03 +11:00
bug20638 Stop ignoring hidden service key anonymity when first starting tor 2016-12-01 09:44:53 -05:00
geoip-november2016 Make new changes files pass lintchanges 2016-11-07 16:19:05 -05:00
more_module_docs changes file for module docs 2016-10-18 19:35:10 -04:00