]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 10 Aug 2022 17:41:22 +0000 (13:41 -0400)]
geoip: Update files from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
Roger Dingledine [Tue, 9 Aug 2022 20:39:26 +0000 (16:39 -0400)]
ignore families for L2 guard independence
mike is concerned that we would get too much exposure to adversaries,
if we enforce that none of our L2 guards can be in the same family.
this change set now essentially finishes the feature that commit
a77727cdc
was attempting to add, but strips the "_and_family" part of that plan.
Roger Dingledine [Thu, 7 Jul 2022 05:16:53 +0000 (01:16 -0400)]
make L2 vanguards actually independent
We had omitted some checks for whether our vanguards (second layer
guards from proposal 333) overlapped or came from the same family.
Now make sure to pick each of them to be independent.
Fixes bug 40639; bugfix on 0.4.7.1-alpha.
David Goulet [Mon, 8 Aug 2022 18:14:37 +0000 (14:14 -0400)]
man: Fix typo for AuthDirMiddleOnly option
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 4 Aug 2022 14:03:19 +0000 (10:03 -0400)]
dirauth: Make voting flag threshold tunable via torrc
Remove UPTIME_TO_GUARANTEE_STABLE, MTBF_TO_GUARANTEE_STABLE,
TIME_KNOWN_TO_GUARANTEE_FAMILIAR WFU_TO_GUARANTEE_GUARD and replace each
of them with a tunnable torrc option.
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 4 Aug 2022 13:39:15 +0000 (09:39 -0400)]
dirauth: Add a AuthDirVoteGuard to pin Guard flags
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Tue, 2 Aug 2022 20:13:58 +0000 (16:13 -0400)]
Merge branch 'tor-gitlab/mr/608' into maint-0.4.5
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Tue, 2 Aug 2022 19:49:03 +0000 (15:49 -0400)]
relay: Don't send DESTROY remote reason backward or forward
Fixes #40649
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Perry [Tue, 2 Aug 2022 17:33:55 +0000 (17:33 +0000)]
Changes file for bug 40644.
Mike Perry [Tue, 26 Jul 2022 22:28:02 +0000 (22:28 +0000)]
Add an underflow check to a cwnd error condition.
David Goulet [Mon, 1 Aug 2022 14:58:40 +0000 (10:58 -0400)]
conn: Notify btrack subsys on normal OR conn close
Fixes #40604
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 27 Jul 2022 15:33:16 +0000 (11:33 -0400)]
Merge branch 'tor-gitlab/mr/605' into maint-0.4.5
Nick Mathewson [Wed, 27 Jul 2022 13:16:50 +0000 (09:16 -0400)]
Fix a check, make a netflow padding function more safe.
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would
crash with an assertion failure if `low_timeout` was greater than
`high_timeout`. That wasn't possible in practice because of checks
in `channelpadding_update_padding_for_channel`, but it's better not
to have a function whose correctness is this tricky to prove.
Fixes #40645. Bugfix on 0.3.1.1-alpha.
David Goulet [Wed, 27 Jul 2022 12:32:01 +0000 (08:32 -0400)]
relay: Use remote reason when sending back a DESTROY
Fix from previous commit where a DESTROY cell is sent instead of a
TRUNCATED.
Related to #40623
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 26 Jul 2022 20:16:04 +0000 (16:16 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 26 Jul 2022 20:16:04 +0000 (16:16 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Fri, 22 Jul 2022 17:53:52 +0000 (13:53 -0400)]
relay: Send DESTROY cell instead of TRUNCATED cell
Note that with this commit, TRUNCATED cells won't be used anymore that
is client and relays won't emit them.
Fixes #40623
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Fri, 17 Jun 2022 14:23:22 +0000 (14:23 +0000)]
version: Bump version to 0.4.7.8-dev
Tor CI Release [Fri, 17 Jun 2022 14:01:09 +0000 (14:01 +0000)]
version: Bump version to 0.4.7.8
Tor CI Release [Fri, 17 Jun 2022 14:01:09 +0000 (14:01 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.7.8
Tor CI Release [Fri, 17 Jun 2022 14:00:32 +0000 (14:00 +0000)]
fallbackdir: Update list generated on June 17, 2022
Tor CI Release [Fri, 17 Jun 2022 14:00:29 +0000 (14:00 +0000)]
Update geoip files to match ipfire location db, 2022/06/17.
Mike Perry [Wed, 15 Jun 2022 21:00:44 +0000 (21:00 +0000)]
Add changes file for bug40626
Mike Perry [Tue, 14 Jun 2022 20:59:03 +0000 (20:59 +0000)]
Fix for RTT calculation hang during congestion control.
Only cache RTT on explicit stalls; Only use this cache for the
RTT decrease case. Otherwise use only local circuit RTT state for clock jump
checks.
Mike Perry [Wed, 15 Jun 2022 14:43:52 +0000 (14:43 +0000)]
Changes file for Bug 40612
Mike Perry [Wed, 15 Jun 2022 14:42:37 +0000 (14:42 +0000)]
Demote "Unexpected path length" log to info.
You win Maze; we surrender.
Mike Perry [Wed, 15 Jun 2022 14:14:03 +0000 (14:14 +0000)]
Changes file for Bug #40603.
Mike Perry [Wed, 15 Jun 2022 14:13:09 +0000 (14:13 +0000)]
Demote a warning about finding hops in path if no dir info.
Leave it at notice if we do have enough dir info.
David Goulet [Thu, 2 Jun 2022 20:09:56 +0000 (16:09 -0400)]
Merge branch 'tor-gitlab/mr/583' into maint-0.4.7
Mike Perry [Thu, 2 Jun 2022 18:54:11 +0000 (18:54 +0000)]
Bug 40620: Changes file
Mike Perry [Thu, 2 Jun 2022 18:48:14 +0000 (18:48 +0000)]
Demote log message to info.
This log is harmless, and can be common at relays if clients are sending XOFF.
Alexander Færøy [Mon, 9 May 2022 14:37:26 +0000 (14:37 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Mon, 9 May 2022 14:37:26 +0000 (14:37 +0000)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Alexander Færøy [Mon, 9 May 2022 14:35:42 +0000 (14:35 +0000)]
Add changes entry to tor!575.
See: tpo/core/tor#40601.
pmu-ipf [Sat, 30 Apr 2022 11:10:04 +0000 (11:10 +0000)]
sandbox: Permit rseq syscall as well
This was found to be necessary in conjunction with glibc 2.35 on Linux.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
David Goulet [Wed, 27 Apr 2022 15:12:38 +0000 (11:12 -0400)]
version: Bump to 0.4.7.7-dev
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 27 Apr 2022 15:06:03 +0000 (11:06 -0400)]
ci: Add 0.4.7 series to scripts and CI
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Wed, 27 Apr 2022 13:28:50 +0000 (13:28 +0000)]
version: Bump version to 0.4.7.7
Tor CI Release [Wed, 27 Apr 2022 13:28:50 +0000 (13:28 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.7.7
Tor CI Release [Wed, 27 Apr 2022 13:27:42 +0000 (13:27 +0000)]
fallbackdir: Update list generated on April 27, 2022
Tor CI Release [Wed, 27 Apr 2022 13:26:22 +0000 (13:26 +0000)]
Update geoip files to match ipfire location db, 2022/04/27.
Mike Perry [Mon, 25 Apr 2022 19:20:29 +0000 (19:20 +0000)]
Changes file for bug40598
Mike Perry [Mon, 25 Apr 2022 19:20:00 +0000 (19:20 +0000)]
Bug 40598: Demote warn log about odd path lengths with congestion control.
David Goulet [Thu, 14 Apr 2022 13:37:46 +0000 (09:37 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Thu, 14 Apr 2022 13:37:46 +0000 (09:37 -0400)]
Merge branch 'maint-0.4.6'
David Goulet [Thu, 14 Apr 2022 13:37:43 +0000 (09:37 -0400)]
Merge branch 'tor-gitlab/mr/491' into maint-0.4.5
David Goulet [Thu, 14 Apr 2022 13:34:49 +0000 (09:34 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Thu, 14 Apr 2022 13:34:49 +0000 (09:34 -0400)]
Merge branch 'maint-0.4.6'
David Goulet [Thu, 14 Apr 2022 13:34:46 +0000 (09:34 -0400)]
Merge branch 'tor-gitlab/mr/497' into maint-0.4.5
David Goulet [Thu, 14 Apr 2022 13:25:25 +0000 (09:25 -0400)]
Merge branch 'maint-0.4.6'
David Goulet [Thu, 7 Apr 2022 15:50:57 +0000 (11:50 -0400)]
doc: Minor changes to the Releasing doc
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Thu, 7 Apr 2022 13:16:03 +0000 (13:16 +0000)]
version: Bump version to 0.4.7.6-rc-dev
Tor CI Release [Thu, 7 Apr 2022 12:59:00 +0000 (12:59 +0000)]
version: Bump version to 0.4.7.6-rc
Tor CI Release [Thu, 7 Apr 2022 12:59:00 +0000 (12:59 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.7.6-rc
Tor CI Release [Thu, 7 Apr 2022 12:57:54 +0000 (12:57 +0000)]
fallbackdir: Update list generated on April 07, 2022
Tor CI Release [Thu, 7 Apr 2022 12:56:50 +0000 (12:56 +0000)]
Update geoip files to match ipfire location db, 2022/04/07.
David Goulet [Mon, 4 Apr 2022 14:11:53 +0000 (10:11 -0400)]
Merge branch 'tor-gitlab/mr/557'
Roger Dingledine [Thu, 31 Mar 2022 06:46:11 +0000 (02:46 -0400)]
document running_long_enough_to_decide_unreachable()
It came as a surprise that Serge, the bridge authority, omits the Running
flag for all bridges in its first 30 minutes after a restart:
https://bugs.torproject.org/tpo/anti-censorship/rdsys/102
The fix we're doing for now is to accept it as correct behavior in
Tor, and change all the supporting tools to be able to handle bridge
networkstatus docs that have no Running bridges.
I'm documenting it here inside Tor too so the next person might not
be so surprised.
David Goulet [Tue, 15 Mar 2022 17:28:04 +0000 (13:28 -0400)]
test: Unit tests for overload onionskin ntor
Part of #40560
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 2 Mar 2022 18:20:07 +0000 (13:20 -0500)]
rephist: Introduce a fraction and period for overload onionskin
This code was heavily reused from the previous DNS timeout work done in
ticket #40491 that was removed afterall from our code.
Closes #40560
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alex Xu (Hello71) [Mon, 28 Mar 2022 19:43:31 +0000 (15:43 -0400)]
ci: print test_network_log contents
cat will always print "cat: test_network_log: Is a directory". change it to
head -n -0, which is arguably not the perfect format but is at least somewhat
useful.
David Goulet [Mon, 28 Mar 2022 13:45:16 +0000 (09:45 -0400)]
Merge branch 'maint-0.4.6'
David Goulet [Mon, 28 Mar 2022 13:45:16 +0000 (09:45 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Mon, 28 Mar 2022 13:44:31 +0000 (09:44 -0400)]
Merge branch 'tor-gitlab/mr/556' into maint-0.4.5
Nick Mathewson [Sun, 27 Mar 2022 22:34:25 +0000 (18:34 -0400)]
Sandbox: Permit the clone3 system call
Apparently glibc-2.34 uses clone3, when previously it just used
clone.
Closes ticket #40590.
Tor CI Release [Fri, 25 Mar 2022 13:37:59 +0000 (13:37 +0000)]
version: Bump version to 0.4.7.5-alpha-dev
Tor CI Release [Fri, 25 Mar 2022 13:08:08 +0000 (13:08 +0000)]
version: Bump version to 0.4.7.5-alpha
Tor CI Release [Fri, 25 Mar 2022 13:08:07 +0000 (13:08 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.7.5-alpha
Tor CI Release [Fri, 25 Mar 2022 13:07:14 +0000 (13:07 +0000)]
fallbackdir: Update list generated on March 25, 2022
Tor CI Release [Fri, 25 Mar 2022 12:43:39 +0000 (12:43 +0000)]
Update geoip files to match ipfire location db, 2022/03/25.
Nick Mathewson [Thu, 24 Mar 2022 15:41:20 +0000 (11:41 -0400)]
Light editing to changes entries for 0.4.7.5-alpha
David Goulet [Wed, 16 Mar 2022 18:47:21 +0000 (14:47 -0400)]
Merge branch 'tor-gitlab/mr/550'
David Goulet [Wed, 16 Mar 2022 18:03:31 +0000 (14:03 -0400)]
Merge branch 'tor-gitlab/mr/548'
David Goulet [Wed, 16 Mar 2022 17:11:34 +0000 (13:11 -0400)]
hs: Helper function to setup congestion control
We had 3 callsites setting up the circuit congestion control and so this
commit consolidates all 3 calls into 1 function.
Related to #40586
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 16 Mar 2022 15:01:56 +0000 (11:01 -0400)]
hs: Transfer ccontrol from circuit to cpath
Once the cpath is finalized, e2e encryption setup, transfer the ccontrol
from the rendezvous circuit to the cpath.
This allows the congestion control subsystem to properly function for
both upload and download side of onion services.
Closes #40586
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 16 Mar 2022 17:42:42 +0000 (13:42 -0400)]
dns: Remove reachable BUG()
Fixes #40587
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 16 Mar 2022 17:35:33 +0000 (13:35 -0400)]
Merge branch 'tor-gitlab/mr/490'
David Goulet [Wed, 16 Mar 2022 17:27:31 +0000 (13:27 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 16 Mar 2022 17:27:31 +0000 (13:27 -0400)]
Merge branch 'maint-0.4.6'
David Goulet [Wed, 16 Mar 2022 17:27:27 +0000 (13:27 -0400)]
Merge branch 'tor-gitlab/mr/533' into maint-0.4.5
David Goulet [Tue, 15 Mar 2022 19:33:35 +0000 (15:33 -0400)]
relay: Reconfigure libevent options only on DNS params change
Related #40312
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 19 Jan 2022 19:37:26 +0000 (14:37 -0500)]
relay: On new consensus, reconfigure DNS nameservers
This applies only for relays. Previous commit adds two new consensus
parameters that dictate how libevent is configured with DNS resolution.
And so, with a new consensus, we now look at those values in case they
ever change.
Without this, Exit relay would have to HUP or restart to apply any new
Exit DNS consensus parameters.
Related to #40312
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 13 Dec 2021 15:56:43 +0000 (10:56 -0500)]
relay: Lower DNS Exit-side timeout
Introduces two new consensus parameter:
exit_dns_timeout: Number of seconds before libevent should consider
the DNS request a timeout.
exit_dns_num_attempts: Number of attempts that libeven should retry a
previously failing query before calling it a timeout.
Closes #40312
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 15 Mar 2022 19:16:30 +0000 (15:16 -0400)]
Merge branch 'tor-gitlab/mr/547'
David Goulet [Tue, 15 Mar 2022 18:00:00 +0000 (14:00 -0400)]
crypto: Clarifying comment for the random hostname calculation
Closes #40520
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 15 Mar 2022 17:54:05 +0000 (13:54 -0400)]
changes: Add changes file for ticket 40560
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 15 Mar 2022 17:28:04 +0000 (13:28 -0400)]
test: Unit tests for overload onionskin ntor
Part of #40560
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 2 Mar 2022 18:20:07 +0000 (13:20 -0500)]
rephist: Introduce a fraction and period for overload onionskin
This code was heavily reused from the previous DNS timeout work done in
ticket #40491 that was removed afterall from our code.
Closes #40560
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 15 Mar 2022 16:12:57 +0000 (12:12 -0400)]
dns: Wake up a dormant tor with a DNSPort request
Fixes #40577
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 14 Mar 2022 19:17:05 +0000 (15:17 -0400)]
Merge branch 'tor-gitlab/mr/546'
Mike Perry [Thu, 3 Mar 2022 21:16:07 +0000 (21:16 +0000)]
Changes file for #40568
Mike Perry [Tue, 8 Mar 2022 23:07:07 +0000 (23:07 +0000)]
Emit control port notification for XON/XOFF