-
Notifications
You must be signed in to change notification settings - Fork 729
Comparing changes
Open a pull request
base repository: tinyproxy/tinyproxy
base: 1.11.1
head repository: tinyproxy/tinyproxy
compare: 1.11.2
- 20 commits
- 11 files changed
- 6 contributors
Commits on May 30, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 8b373f8 - Browse repository at this point
Copy the full SHA 8b373f8View commit details
Commits on Jul 15, 2022
-
echo http protocol version on CONNECT request response
while at it, the function doing it was renamed from the misleading ssl name to what it actually does. also inlined the strings that were previously defined as macros. addressing #152
Configuration menu - View commit details
-
Copy full SHA for 121be4a - Browse repository at this point
Copy the full SHA 121be4aView commit details
Commits on Aug 20, 2022
-
fix reversepath directive using https url giving misleading error
it's not possible to use a https url in a ReversePath directive, without removing the security provided by https, and would require adding a dependency on a TLS library like openssl and a lot of code complexity to fetch the requested resource via https and relay it back to the client. in case the reversepath directive kicked in, but the protocol wasn't recognized, and support for transparent proxying built-in, the code wrongfully tried to turn the request into a trans request, leading to a bogus rewritten url like http://localhost:8888https://www.endpoint.com and an error message that we're trying to connect to the machine the proxy runs on. now instead use the generic code that signals an invalid protocol/url was used. closes #419
Configuration menu - View commit details
-
Copy full SHA for 84f203f - Browse repository at this point
Copy the full SHA 84f203fView commit details
Commits on Sep 8, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 3764b85 - Browse repository at this point
Copy the full SHA 3764b85View commit details
Commits on Feb 1, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 6ffd9af - Browse repository at this point
Copy the full SHA 6ffd9afView commit details -
Configuration menu - View commit details
-
Copy full SHA for 470cc08 - Browse repository at this point
Copy the full SHA 470cc08View commit details -
tinyproxy.conf.5: update text for bind directive
the existing text was sort of misleading as it was written in a pre-HTTPS era. addressing #475
Configuration menu - View commit details
-
Copy full SHA for 31339cb - Browse repository at this point
Copy the full SHA 31339cbView commit details
Commits on Mar 20, 2023
-
Configuration menu - View commit details
-
Copy full SHA for ef60434 - Browse repository at this point
Copy the full SHA ef60434View commit details
Commits on May 23, 2023
-
Allow configuring IPv6 address for upstream proxy (#492)
* Added support to configure IPv6 upstream proxy servers using bracket syntax. * Added regular expression for IPv6 scope identifier to re for IPv6 address.
Configuration menu - View commit details
-
Copy full SHA for 2bec15e - Browse repository at this point
Copy the full SHA 2bec15eView commit details
Commits on May 24, 2023
-
tinyproxy.conf.5: document config strings that require double quotes (#…
…493) * tinyproxy.conf.5: document config strings that require double quotes String config values matched by the STR regex must be enclosed in double quotes Edit descriptions for brevity conf.c: move boolean arguments comment before BOOL group addresses #491 * Revert conf.c: move boolean arguments comment before BOOL group
Configuration menu - View commit details
-
Copy full SHA for 1e615e6 - Browse repository at this point
Copy the full SHA 1e615e6View commit details
Commits on May 25, 2023
-
Configuration menu - View commit details
-
Copy full SHA for d7c20e6 - Browse repository at this point
Copy the full SHA d7c20e6View commit details
Commits on Jun 7, 2023
-
fix omission to reset socklen parameter for accept()
since accept() uses the socklen parameter as in/out, after processing an IPv4 the socklen fed to it waiting for the next client was only the length of sockaddr_in, so if a connection from an IPv6 came in the client sockaddr was only partially filled in. this caused wrongly printed ipv6 addresses in log, and failure to match them correctly against the acl. closes #495
Configuration menu - View commit details
-
Copy full SHA for 2935519 - Browse repository at this point
Copy the full SHA 2935519View commit details
Commits on Oct 13, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 1289d8a - Browse repository at this point
Copy the full SHA 1289d8aView commit details
Commits on Oct 15, 2023
-
Configuration menu - View commit details
-
Copy full SHA for c834073 - Browse repository at this point
Copy the full SHA c834073View commit details
Commits on Nov 2, 2023
-
BasicAuth: Accept special chars in username and password (#516)
Co-authored-by: Victor Kislov <[email protected]>
Configuration menu - View commit details
-
Copy full SHA for 84285b6 - Browse repository at this point
Copy the full SHA 84285b6View commit details
Commits on Nov 12, 2023
-
Configuration menu - View commit details
-
Copy full SHA for c4df45b - Browse repository at this point
Copy the full SHA c4df45bView commit details
Commits on May 1, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 92289d5 - Browse repository at this point
Copy the full SHA 92289d5View commit details
Commits on May 5, 2024
-
fix potential UAF in header handling (CVE-2023-49606)
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889 this bug was brought to my attention today by the debian tinyproxy package maintainer. the above link states that the issue was known since last year and that maintainers have been contacted, but if that is even true then it probably was done via a private email to a potentially outdated email address of one of the maintainers, not through the channels described clearly on the tinyproxy homepage: > Feel free to report a new bug or suggest features via github issues. > Tinyproxy developers hang out in #tinyproxy on irc.libera.chat. no github issue was filed, and nobody mentioned a vulnerability on the mentioned IRC chat. if the issue had been reported on github or IRC, the bug would have been fixed within a day.
Configuration menu - View commit details
-
Copy full SHA for 12a8484 - Browse repository at this point
Copy the full SHA 12a8484View commit details -
given the catastrophic way TALOS Intelligence "communicated" with upstream (i.e. by probably sending a single mail to an unused email address), it's probably best to explicitly document how to approach upstream when a security issue is discovered.
Configuration menu - View commit details
-
Copy full SHA for e69788b - Browse repository at this point
Copy the full SHA e69788bView commit details
Commits on May 8, 2024
-
Configuration menu - View commit details
-
Copy full SHA for dd49e97 - Browse repository at this point
Copy the full SHA dd49e97View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff 1.11.1...1.11.2