]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Wed, 19 Oct 2022 19:11:11 +0000 (15:11 -0400)]
circ: Get rid of hs_circ_has_timed_out
Logic is too convoluted and we can't efficiently apply a specific
timeout depending on the purpose.
Remove it and instead rely on the right circuit cutoff instead of
keeping this flagged circuit open forever.
Part of #40694
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 19 Oct 2022 18:50:00 +0000 (14:50 -0400)]
circ: Set proper timeout cutoff for HS circuits
Explicitly set the S_CONNECT_REND purpose to a 4-hop cutoff.
As for the established rendezvous circuit waiting on the RENDEZVOUS2,
set one that is very long considering the possible waiting time for the
service to get the request and join our rendezvous.
Part of #40694
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 14 Oct 2022 13:12:23 +0000 (09:12 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Fri, 14 Oct 2022 13:12:23 +0000 (09:12 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.7
Nick Mathewson [Thu, 13 Oct 2022 17:40:10 +0000 (13:40 -0400)]
Fix a completely wrong calculation in mach monotime_init_internal()
Bug 1: We were purporting to calculate milliseconds per tick, when we
*should* have been computing ticks per millisecond.
Bug 2: Instead of computing either one of those, we were _actually_
computing femtoseconds per tick.
These two bugs covered for one another on x86 hardware, where 1 tick
== 1 nanosecond. But on M1 OSX, 1 tick is about 41 nanoseconds,
causing surprising results.
Fixes bug 40684; bugfix on 0.3.3.1-alpha.
David Goulet [Wed, 12 Oct 2022 19:52:04 +0000 (15:52 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Wed, 12 Oct 2022 13:25:01 +0000 (09:25 -0400)]
relay: Add number of rejected connections to MetricsPort
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Oct 2022 18:03:38 +0000 (14:03 -0400)]
relay: Add connection stats to MetricsPort
This adds the number of created and opened connections to the
MetricsPort for a relay for each connection type and direction.
Output looks like:
# HELP tor_relay_connections Connections metrics of this relay
# TYPE tor_relay_connections counter
tor_relay_connections{type="OR listener",direction="initiated",state="created"} 0
tor_relay_connections{type="OR listener",direction="received",state="created"} 0
tor_relay_connections{type="OR listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="OR listener",direction="received",state="opened"} 0
tor_relay_connections{type="OR",direction="initiated",state="created"} 5
tor_relay_connections{type="OR",direction="received",state="created"} 0
tor_relay_connections{type="OR",direction="initiated",state="opened"} 5
tor_relay_connections{type="OR",direction="received",state="opened"} 0
tor_relay_connections{type="Exit",direction="initiated",state="created"} 0
tor_relay_connections{type="Exit",direction="received",state="created"} 0
tor_relay_connections{type="Exit",direction="initiated",state="opened"} 0
tor_relay_connections{type="Exit",direction="received",state="opened"} 0
tor_relay_connections{type="Socks listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Socks listener",direction="received",state="created"} 0
tor_relay_connections{type="Socks listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Socks listener",direction="received",state="opened"} 0
tor_relay_connections{type="Socks",direction="initiated",state="created"} 0
tor_relay_connections{type="Socks",direction="received",state="created"} 0
tor_relay_connections{type="Socks",direction="initiated",state="opened"} 0
tor_relay_connections{type="Socks",direction="received",state="opened"} 0
tor_relay_connections{type="Directory listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Directory listener",direction="received",state="created"} 0
tor_relay_connections{type="Directory listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Directory listener",direction="received",state="opened"} 0
tor_relay_connections{type="Directory",direction="initiated",state="created"} 0
tor_relay_connections{type="Directory",direction="received",state="created"} 0
tor_relay_connections{type="Directory",direction="initiated",state="opened"} 0
tor_relay_connections{type="Directory",direction="received",state="opened"} 0
tor_relay_connections{type="Control listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Control listener",direction="received",state="created"} 0
tor_relay_connections{type="Control listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Control listener",direction="received",state="opened"} 0
tor_relay_connections{type="Control",direction="initiated",state="created"} 0
tor_relay_connections{type="Control",direction="received",state="created"} 0
tor_relay_connections{type="Control",direction="initiated",state="opened"} 0
tor_relay_connections{type="Control",direction="received",state="opened"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="created"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="opened"} 0
tor_relay_connections{type="Transparent natd listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Transparent natd listener",direction="received",state="created"} 0
tor_relay_connections{type="Transparent natd listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Transparent natd listener",direction="received",state="opened"} 0
tor_relay_connections{type="DNS listener",direction="initiated",state="created"} 0
tor_relay_connections{type="DNS listener",direction="received",state="created"} 0
tor_relay_connections{type="DNS listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="DNS listener",direction="received",state="opened"} 0
tor_relay_connections{type="Extended OR",direction="initiated",state="created"} 0
tor_relay_connections{type="Extended OR",direction="received",state="created"} 0
tor_relay_connections{type="Extended OR",direction="initiated",state="opened"} 0
tor_relay_connections{type="Extended OR",direction="received",state="opened"} 0
tor_relay_connections{type="Extended OR listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Extended OR listener",direction="received",state="created"} 0
tor_relay_connections{type="Extended OR listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Extended OR listener",direction="received",state="opened"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="created"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="received",state="created"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="received",state="opened"} 0
tor_relay_connections{type="Metrics listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Metrics listener",direction="received",state="created"} 1
tor_relay_connections{type="Metrics listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Metrics listener",direction="received",state="opened"} 1
tor_relay_connections{type="Metrics",direction="initiated",state="created"} 0
tor_relay_connections{type="Metrics",direction="received",state="created"} 0
tor_relay_connections{type="Metrics",direction="initiated",state="opened"} 0
tor_relay_connections{type="Metrics",direction="received",state="opened"} 0
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Oct 2022 17:17:35 +0000 (13:17 -0400)]
conn: Keep stats of opened and closed connections
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Oct 2022 14:09:37 +0000 (10:09 -0400)]
Merge branch 'maint-0.4.7'
Andy [Thu, 6 Oct 2022 04:30:18 +0000 (04:30 +0000)]
Properly compute cell-drop overload fraction
Patch to address #40673. An additional check has been added to
onion_pending_add() in order to ensure that we avoid counting create
cells from clients.
In the cpuworker.c assign_onionskin_to_cpuworker
method if total_pending_tasks >= max_pending_tasks
and channel_is_client(circ->p_chan) returns false then
rep_hist_note_circuit_handshake_dropped() will be called and
rep_hist_note_circuit_handshake_assigned() will not be called. This
causes relays to run into errors due to the fact that the number of
dropped packets exceeds the total number of assigned packets.
To avoid this situation a check has been added to
onion_pending_add() to ensure that these erroneous calls to
rep_hist_note_circuit_handshake_dropped() are not made.
See the #40673 ticket for the conversation with armadev about this issue.
Andy [Wed, 28 Sep 2022 19:57:26 +0000 (19:57 +0000)]
Update doc/man/tor.1.txt
Nick Mathewson [Mon, 26 Sep 2022 16:46:04 +0000 (12:46 -0400)]
Merge remote-tracking branch 'tor-gitlab/mr/614'
pseudonymisaTor [Thu, 22 Sep 2022 08:18:12 +0000 (08:18 +0000)]
remove unused DEFAULT_CLIENT_NICKNAME
David Goulet [Fri, 12 Aug 2022 15:04:30 +0000 (11:04 -0400)]
doc: Add git merge detail in release document
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 12 Aug 2022 14:55:08 +0000 (10:55 -0400)]
Merge branch 'maint-0.4.7'
Tor CI Release [Fri, 12 Aug 2022 14:33:28 +0000 (14:33 +0000)]
version: Bump version to 0.4.7.10-dev
David Goulet [Fri, 12 Aug 2022 14:54:47 +0000 (10:54 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Fri, 12 Aug 2022 14:33:26 +0000 (14:33 +0000)]
version: Bump version to 0.4.6.12-dev
David Goulet [Fri, 12 Aug 2022 14:54:31 +0000 (10:54 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Fri, 12 Aug 2022 14:33:25 +0000 (14:33 +0000)]
version: Bump version to 0.4.5.14-dev
David Goulet [Fri, 12 Aug 2022 14:20:06 +0000 (10:20 -0400)]
Merge branch 'maint-0.4.7'
Tor CI Release [Fri, 12 Aug 2022 13:37:54 +0000 (13:37 +0000)]
version: Bump version to 0.4.7.10
David Goulet [Fri, 12 Aug 2022 14:17:40 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Fri, 12 Aug 2022 14:17:36 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Fri, 12 Aug 2022 13:37:52 +0000 (13:37 +0000)]
version: Bump version to 0.4.6.12
David Goulet [Fri, 12 Aug 2022 14:14:38 +0000 (10:14 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Fri, 12 Aug 2022 14:14:38 +0000 (10:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Fri, 12 Aug 2022 14:14:32 +0000 (10:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Fri, 12 Aug 2022 13:37:49 +0000 (13:37 +0000)]
version: Bump version to 0.4.5.14
David Goulet [Fri, 12 Aug 2022 13:56:54 +0000 (09:56 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Fri, 12 Aug 2022 13:56:54 +0000 (09:56 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Fri, 12 Aug 2022 13:56:54 +0000 (09:56 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Fri, 12 Aug 2022 13:55:24 +0000 (09:55 -0400)]
geoip: Update geoip files with August 9th, 2022 database
Fixes #40658
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 11 Aug 2022 15:31:29 +0000 (11:31 -0400)]
doc: Improve ReleasingTor.md and fix announcement ML
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 11 Aug 2022 15:27:18 +0000 (11:27 -0400)]
scripts: Remove 0.4.6.x as it is EOL
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 11 Aug 2022 15:19:19 +0000 (11:19 -0400)]
release: Update ChangeLog/ReleaseNotes with latest releases
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 11 Aug 2022 15:15:17 +0000 (11:15 -0400)]
Merge branch 'maint-0.4.7'
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)]
version: Bump version to 0.4.7.9-dev
David Goulet [Thu, 11 Aug 2022 15:14:52 +0000 (11:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)]
version: Bump version to 0.4.6.11-dev
David Goulet [Thu, 11 Aug 2022 15:14:34 +0000 (11:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)]
version: Bump version to 0.4.5.13-dev
David Goulet [Thu, 11 Aug 2022 14:29:43 +0000 (10:29 -0400)]
Merge branch 'maint-0.4.7'
Tor CI Release [Thu, 11 Aug 2022 13:40:44 +0000 (13:40 +0000)]
version: Bump version to 0.4.7.9
David Goulet [Thu, 11 Aug 2022 14:23:44 +0000 (10:23 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Thu, 11 Aug 2022 14:23:40 +0000 (10:23 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Thu, 11 Aug 2022 13:40:38 +0000 (13:40 +0000)]
version: Bump version to 0.4.6.11
David Goulet [Thu, 11 Aug 2022 14:17:35 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Thu, 11 Aug 2022 14:17:35 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Thu, 11 Aug 2022 14:17:30 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Thu, 11 Aug 2022 13:40:32 +0000 (13:40 +0000)]
version: Bump version to 0.4.5.13
David Goulet [Thu, 11 Aug 2022 13:44:47 +0000 (09:44 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Thu, 11 Aug 2022 13:44:47 +0000 (09:44 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Thu, 11 Aug 2022 13:44:47 +0000 (09:44 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Thu, 11 Aug 2022 13:39:29 +0000 (13:39 +0000)]
fallbackdir: Update list generated on August 11, 2022
Tor CI Release [Thu, 11 Aug 2022 13:38:23 +0000 (13:38 +0000)]
Update geoip files to match ipfire location db, 2022/08/11.
David Goulet [Thu, 11 Aug 2022 13:27:03 +0000 (09:27 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Thu, 11 Aug 2022 13:26:59 +0000 (09:26 -0400)]
Merge branch 'tor-gitlab/mr/613' into maint-0.4.7
Mike Perry [Sat, 6 Aug 2022 00:36:24 +0000 (00:36 +0000)]
Tune congestion control parameters.
Mike Perry [Thu, 4 Aug 2022 21:23:40 +0000 (21:23 +0000)]
Add changes file for bug40642.
Mike Perry [Thu, 4 Aug 2022 21:12:50 +0000 (21:12 +0000)]
Reduce the number of vegas parameters.
We need to tune these, but we're not likely to need the subtle differences
between a few of them. Removing them will prevent our consensus parameter
string from becoming too long in the event of tuning.
Mike Perry [Sun, 31 Jul 2022 15:14:22 +0000 (15:14 +0000)]
Reset the min value if we hit cwnd_min.
This can avoid circuits getting stuck due to an abnormally low min value.
Mike Perry [Sun, 31 Jul 2022 15:09:35 +0000 (15:09 +0000)]
Use EWMA instead of bare rtt for min rtt.
This allows us to average out minimums due to lulls in activity a bit more.
Mike Perry [Sun, 31 Jul 2022 16:38:34 +0000 (16:38 +0000)]
Create slow-start max for n_ewma_cnt.
Since slow-start now checks every sendme, lower EWMA is better.
Mike Perry [Fri, 22 Jul 2022 17:00:22 +0000 (17:00 +0000)]
Implement RFC3742 Limited Slow Start
RFC3742 updates the cwnd every sendme during slow start, and backs off of the
exponential growth based on a cap parameter.
David Goulet [Wed, 10 Aug 2022 17:59:47 +0000 (13:59 -0400)]
fallbackdirs: Update list from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Aug 2022 17:59:20 +0000 (13:59 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 10 Aug 2022 17:59:20 +0000 (13:59 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:59:20 +0000 (13:59 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Wed, 10 Aug 2022 17:59:14 +0000 (13:59 -0400)]
fallbackdirs: Update list from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Aug 2022 17:43:46 +0000 (13:43 -0400)]
geoip: Get latest from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Wed, 10 Aug 2022 17:41:22 +0000 (13:41 -0400)]
geoip: Update files from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Aug 2022 17:28:04 +0000 (13:28 -0400)]
scripts: GeoIP update tool cargo update
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Aug 2022 12:53:08 +0000 (08:53 -0400)]
Merge branch 'maint-0.4.7'
Roger Dingledine [Tue, 9 Aug 2022 20:39:26 +0000 (16:39 -0400)]
ignore families for L2 guard independence
mike is concerned that we would get too much exposure to adversaries,
if we enforce that none of our L2 guards can be in the same family.
this change set now essentially finishes the feature that commit
a77727cdc
was attempting to add, but strips the "_and_family" part of that plan.
Roger Dingledine [Thu, 7 Jul 2022 05:16:53 +0000 (01:16 -0400)]
make L2 vanguards actually independent
We had omitted some checks for whether our vanguards (second layer
guards from proposal 333) overlapped or came from the same family.
Now make sure to pick each of them to be independent.
Fixes bug 40639; bugfix on 0.4.7.1-alpha.
David Goulet [Tue, 9 Aug 2022 15:01:44 +0000 (11:01 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Mon, 8 Aug 2022 18:14:37 +0000 (14:14 -0400)]
man: Fix typo for AuthDirMiddleOnly option
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 4 Aug 2022 14:03:19 +0000 (10:03 -0400)]
dirauth: Make voting flag threshold tunable via torrc
Remove UPTIME_TO_GUARANTEE_STABLE, MTBF_TO_GUARANTEE_STABLE,
TIME_KNOWN_TO_GUARANTEE_FAMILIAR WFU_TO_GUARANTEE_GUARD and replace each
of them with a tunnable torrc option.
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
Roger Dingledine [Sun, 7 Aug 2022 01:04:28 +0000 (21:04 -0400)]
fix a few more typos in comments
David Goulet [Thu, 4 Aug 2022 13:39:15 +0000 (09:39 -0400)]
dirauth: Add a AuthDirVoteGuard to pin Guard flags
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Tue, 2 Aug 2022 20:13:58 +0000 (16:13 -0400)]
Merge branch 'tor-gitlab/mr/608' into maint-0.4.5
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Tue, 2 Aug 2022 19:49:03 +0000 (15:49 -0400)]
relay: Don't send DESTROY remote reason backward or forward
Fixes #40649
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 2 Aug 2022 19:31:00 +0000 (15:31 -0400)]
Merge branch 'maint-0.4.7'
Mike Perry [Tue, 2 Aug 2022 17:33:55 +0000 (17:33 +0000)]
Changes file for bug 40644.
Mike Perry [Tue, 26 Jul 2022 22:28:02 +0000 (22:28 +0000)]
Add an underflow check to a cwnd error condition.
David Goulet [Mon, 1 Aug 2022 14:58:40 +0000 (10:58 -0400)]
conn: Notify btrack subsys on normal OR conn close
Fixes #40604
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.7'
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7