]>
git.ipfire.org Git - thirdparty/tor.git/log
Roger Dingledine [Fri, 21 Oct 2022 00:56:33 +0000 (20:56 -0400)]
dir auths now omit Measured= if rs->is_authority
Directory authorities stop voting a consensus "Measured" weight
for relays with the Authority flag. Now these relays will be
considered unmeasured, which should reserve their bandwidth
for their dir auth role and minimize distractions from other roles.
In place of the "Measured" weight, they now include a
"MeasuredButAuthority" weight (not used by anything) so the bandwidth
authority's opinion on this relay can be recorded for posterity.
Resolves ticket 40698.
Roger Dingledine [Mon, 24 Oct 2022 08:30:23 +0000 (04:30 -0400)]
back out most of commit
b7992d4f
The AuthDirDontVoteOnDirAuthBandwidth torrc option never worked, and it
was implemented in a way that could have produced consensus conflicts
if it had.
Resolves bug 40700.
Roger Dingledine [Thu, 20 Oct 2022 23:46:27 +0000 (19:46 -0400)]
fix typo in #40673's changes file
David Goulet [Fri, 14 Oct 2022 13:12:23 +0000 (09:12 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.7
Nick Mathewson [Thu, 13 Oct 2022 17:40:10 +0000 (13:40 -0400)]
Fix a completely wrong calculation in mach monotime_init_internal()
Bug 1: We were purporting to calculate milliseconds per tick, when we
*should* have been computing ticks per millisecond.
Bug 2: Instead of computing either one of those, we were _actually_
computing femtoseconds per tick.
These two bugs covered for one another on x86 hardware, where 1 tick
== 1 nanosecond. But on M1 OSX, 1 tick is about 41 nanoseconds,
causing surprising results.
Fixes bug 40684; bugfix on 0.3.3.1-alpha.
David Goulet [Wed, 12 Oct 2022 13:25:01 +0000 (09:25 -0400)]
relay: Add number of rejected connections to MetricsPort
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Oct 2022 18:03:38 +0000 (14:03 -0400)]
relay: Add connection stats to MetricsPort
This adds the number of created and opened connections to the
MetricsPort for a relay for each connection type and direction.
Output looks like:
# HELP tor_relay_connections Connections metrics of this relay
# TYPE tor_relay_connections counter
tor_relay_connections{type="OR listener",direction="initiated",state="created"} 0
tor_relay_connections{type="OR listener",direction="received",state="created"} 0
tor_relay_connections{type="OR listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="OR listener",direction="received",state="opened"} 0
tor_relay_connections{type="OR",direction="initiated",state="created"} 5
tor_relay_connections{type="OR",direction="received",state="created"} 0
tor_relay_connections{type="OR",direction="initiated",state="opened"} 5
tor_relay_connections{type="OR",direction="received",state="opened"} 0
tor_relay_connections{type="Exit",direction="initiated",state="created"} 0
tor_relay_connections{type="Exit",direction="received",state="created"} 0
tor_relay_connections{type="Exit",direction="initiated",state="opened"} 0
tor_relay_connections{type="Exit",direction="received",state="opened"} 0
tor_relay_connections{type="Socks listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Socks listener",direction="received",state="created"} 0
tor_relay_connections{type="Socks listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Socks listener",direction="received",state="opened"} 0
tor_relay_connections{type="Socks",direction="initiated",state="created"} 0
tor_relay_connections{type="Socks",direction="received",state="created"} 0
tor_relay_connections{type="Socks",direction="initiated",state="opened"} 0
tor_relay_connections{type="Socks",direction="received",state="opened"} 0
tor_relay_connections{type="Directory listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Directory listener",direction="received",state="created"} 0
tor_relay_connections{type="Directory listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Directory listener",direction="received",state="opened"} 0
tor_relay_connections{type="Directory",direction="initiated",state="created"} 0
tor_relay_connections{type="Directory",direction="received",state="created"} 0
tor_relay_connections{type="Directory",direction="initiated",state="opened"} 0
tor_relay_connections{type="Directory",direction="received",state="opened"} 0
tor_relay_connections{type="Control listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Control listener",direction="received",state="created"} 0
tor_relay_connections{type="Control listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Control listener",direction="received",state="opened"} 0
tor_relay_connections{type="Control",direction="initiated",state="created"} 0
tor_relay_connections{type="Control",direction="received",state="created"} 0
tor_relay_connections{type="Control",direction="initiated",state="opened"} 0
tor_relay_connections{type="Control",direction="received",state="opened"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="created"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="opened"} 0
tor_relay_connections{type="Transparent natd listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Transparent natd listener",direction="received",state="created"} 0
tor_relay_connections{type="Transparent natd listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Transparent natd listener",direction="received",state="opened"} 0
tor_relay_connections{type="DNS listener",direction="initiated",state="created"} 0
tor_relay_connections{type="DNS listener",direction="received",state="created"} 0
tor_relay_connections{type="DNS listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="DNS listener",direction="received",state="opened"} 0
tor_relay_connections{type="Extended OR",direction="initiated",state="created"} 0
tor_relay_connections{type="Extended OR",direction="received",state="created"} 0
tor_relay_connections{type="Extended OR",direction="initiated",state="opened"} 0
tor_relay_connections{type="Extended OR",direction="received",state="opened"} 0
tor_relay_connections{type="Extended OR listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Extended OR listener",direction="received",state="created"} 0
tor_relay_connections{type="Extended OR listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Extended OR listener",direction="received",state="opened"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="created"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="received",state="created"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="received",state="opened"} 0
tor_relay_connections{type="Metrics listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Metrics listener",direction="received",state="created"} 1
tor_relay_connections{type="Metrics listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Metrics listener",direction="received",state="opened"} 1
tor_relay_connections{type="Metrics",direction="initiated",state="created"} 0
tor_relay_connections{type="Metrics",direction="received",state="created"} 0
tor_relay_connections{type="Metrics",direction="initiated",state="opened"} 0
tor_relay_connections{type="Metrics",direction="received",state="opened"} 0
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Oct 2022 17:17:35 +0000 (13:17 -0400)]
conn: Keep stats of opened and closed connections
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
Andy [Thu, 6 Oct 2022 04:30:18 +0000 (04:30 +0000)]
Properly compute cell-drop overload fraction
Patch to address #40673. An additional check has been added to
onion_pending_add() in order to ensure that we avoid counting create
cells from clients.
In the cpuworker.c assign_onionskin_to_cpuworker
method if total_pending_tasks >= max_pending_tasks
and channel_is_client(circ->p_chan) returns false then
rep_hist_note_circuit_handshake_dropped() will be called and
rep_hist_note_circuit_handshake_assigned() will not be called. This
causes relays to run into errors due to the fact that the number of
dropped packets exceeds the total number of assigned packets.
To avoid this situation a check has been added to
onion_pending_add() to ensure that these erroneous calls to
rep_hist_note_circuit_handshake_dropped() are not made.
See the #40673 ticket for the conversation with armadev about this issue.
Tor CI Release [Fri, 12 Aug 2022 14:33:28 +0000 (14:33 +0000)]
version: Bump version to 0.4.7.10-dev
David Goulet [Fri, 12 Aug 2022 14:54:47 +0000 (10:54 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Fri, 12 Aug 2022 14:33:26 +0000 (14:33 +0000)]
version: Bump version to 0.4.6.12-dev
David Goulet [Fri, 12 Aug 2022 14:54:31 +0000 (10:54 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Fri, 12 Aug 2022 14:33:25 +0000 (14:33 +0000)]
version: Bump version to 0.4.5.14-dev
Tor CI Release [Fri, 12 Aug 2022 13:37:54 +0000 (13:37 +0000)]
version: Bump version to 0.4.7.10
David Goulet [Fri, 12 Aug 2022 14:17:36 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Fri, 12 Aug 2022 13:37:52 +0000 (13:37 +0000)]
version: Bump version to 0.4.6.12
David Goulet [Fri, 12 Aug 2022 14:14:38 +0000 (10:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Fri, 12 Aug 2022 14:14:32 +0000 (10:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Fri, 12 Aug 2022 13:37:49 +0000 (13:37 +0000)]
version: Bump version to 0.4.5.14
David Goulet [Fri, 12 Aug 2022 13:56:54 +0000 (09:56 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Fri, 12 Aug 2022 13:56:54 +0000 (09:56 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Fri, 12 Aug 2022 13:55:24 +0000 (09:55 -0400)]
geoip: Update geoip files with August 9th, 2022 database
Fixes #40658
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)]
version: Bump version to 0.4.7.9-dev
David Goulet [Thu, 11 Aug 2022 15:14:52 +0000 (11:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)]
version: Bump version to 0.4.6.11-dev
David Goulet [Thu, 11 Aug 2022 15:14:34 +0000 (11:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)]
version: Bump version to 0.4.5.13-dev
Tor CI Release [Thu, 11 Aug 2022 13:40:44 +0000 (13:40 +0000)]
version: Bump version to 0.4.7.9
David Goulet [Thu, 11 Aug 2022 14:23:40 +0000 (10:23 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Tor CI Release [Thu, 11 Aug 2022 13:40:38 +0000 (13:40 +0000)]
version: Bump version to 0.4.6.11
David Goulet [Thu, 11 Aug 2022 14:17:35 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Thu, 11 Aug 2022 14:17:30 +0000 (10:17 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Thu, 11 Aug 2022 13:40:32 +0000 (13:40 +0000)]
version: Bump version to 0.4.5.13
David Goulet [Thu, 11 Aug 2022 13:44:47 +0000 (09:44 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Thu, 11 Aug 2022 13:44:47 +0000 (09:44 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Tor CI Release [Thu, 11 Aug 2022 13:39:29 +0000 (13:39 +0000)]
fallbackdir: Update list generated on August 11, 2022
Tor CI Release [Thu, 11 Aug 2022 13:38:23 +0000 (13:38 +0000)]
Update geoip files to match ipfire location db, 2022/08/11.
David Goulet [Thu, 11 Aug 2022 13:26:59 +0000 (09:26 -0400)]
Merge branch 'tor-gitlab/mr/613' into maint-0.4.7
Mike Perry [Sat, 6 Aug 2022 00:36:24 +0000 (00:36 +0000)]
Tune congestion control parameters.
Mike Perry [Thu, 4 Aug 2022 21:23:40 +0000 (21:23 +0000)]
Add changes file for bug40642.
Mike Perry [Thu, 4 Aug 2022 21:12:50 +0000 (21:12 +0000)]
Reduce the number of vegas parameters.
We need to tune these, but we're not likely to need the subtle differences
between a few of them. Removing them will prevent our consensus parameter
string from becoming too long in the event of tuning.
Mike Perry [Sun, 31 Jul 2022 15:14:22 +0000 (15:14 +0000)]
Reset the min value if we hit cwnd_min.
This can avoid circuits getting stuck due to an abnormally low min value.
Mike Perry [Sun, 31 Jul 2022 15:09:35 +0000 (15:09 +0000)]
Use EWMA instead of bare rtt for min rtt.
This allows us to average out minimums due to lulls in activity a bit more.
Mike Perry [Sun, 31 Jul 2022 16:38:34 +0000 (16:38 +0000)]
Create slow-start max for n_ewma_cnt.
Since slow-start now checks every sendme, lower EWMA is better.
Mike Perry [Fri, 22 Jul 2022 17:00:22 +0000 (17:00 +0000)]
Implement RFC3742 Limited Slow Start
RFC3742 updates the cwnd every sendme during slow start, and backs off of the
exponential growth based on a cap parameter.
David Goulet [Wed, 10 Aug 2022 17:59:20 +0000 (13:59 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 10 Aug 2022 17:59:20 +0000 (13:59 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:59:14 +0000 (13:59 -0400)]
fallbackdirs: Update list from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 10 Aug 2022 17:41:25 +0000 (13:41 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:41:22 +0000 (13:41 -0400)]
geoip: Update files from maint-0.4.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
Roger Dingledine [Tue, 9 Aug 2022 20:39:26 +0000 (16:39 -0400)]
ignore families for L2 guard independence
mike is concerned that we would get too much exposure to adversaries,
if we enforce that none of our L2 guards can be in the same family.
this change set now essentially finishes the feature that commit
a77727cdc
was attempting to add, but strips the "_and_family" part of that plan.
Roger Dingledine [Thu, 7 Jul 2022 05:16:53 +0000 (01:16 -0400)]
make L2 vanguards actually independent
We had omitted some checks for whether our vanguards (second layer
guards from proposal 333) overlapped or came from the same family.
Now make sure to pick each of them to be independent.
Fixes bug 40639; bugfix on 0.4.7.1-alpha.
David Goulet [Mon, 8 Aug 2022 18:14:37 +0000 (14:14 -0400)]
man: Fix typo for AuthDirMiddleOnly option
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 4 Aug 2022 14:03:19 +0000 (10:03 -0400)]
dirauth: Make voting flag threshold tunable via torrc
Remove UPTIME_TO_GUARANTEE_STABLE, MTBF_TO_GUARANTEE_STABLE,
TIME_KNOWN_TO_GUARANTEE_FAMILIAR WFU_TO_GUARANTEE_GUARD and replace each
of them with a tunnable torrc option.
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 4 Aug 2022 13:39:15 +0000 (09:39 -0400)]
dirauth: Add a AuthDirVoteGuard to pin Guard flags
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 2 Aug 2022 20:14:02 +0000 (16:14 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Tue, 2 Aug 2022 20:13:58 +0000 (16:13 -0400)]
Merge branch 'tor-gitlab/mr/608' into maint-0.4.5
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 2 Aug 2022 20:08:50 +0000 (16:08 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Tue, 2 Aug 2022 19:49:03 +0000 (15:49 -0400)]
relay: Don't send DESTROY remote reason backward or forward
Fixes #40649
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Perry [Tue, 2 Aug 2022 17:33:55 +0000 (17:33 +0000)]
Changes file for bug 40644.
Mike Perry [Tue, 26 Jul 2022 22:28:02 +0000 (22:28 +0000)]
Add an underflow check to a cwnd error condition.
David Goulet [Mon, 1 Aug 2022 14:58:40 +0000 (10:58 -0400)]
conn: Notify btrack subsys on normal OR conn close
Fixes #40604
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 27 Jul 2022 15:33:19 +0000 (11:33 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Wed, 27 Jul 2022 15:33:16 +0000 (11:33 -0400)]
Merge branch 'tor-gitlab/mr/605' into maint-0.4.5
Nick Mathewson [Wed, 27 Jul 2022 13:16:50 +0000 (09:16 -0400)]
Fix a check, make a netflow padding function more safe.
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would
crash with an assertion failure if `low_timeout` was greater than
`high_timeout`. That wasn't possible in practice because of checks
in `channelpadding_update_padding_for_channel`, but it's better not
to have a function whose correctness is this tricky to prove.
Fixes #40645. Bugfix on 0.3.1.1-alpha.
David Goulet [Wed, 27 Jul 2022 12:32:01 +0000 (08:32 -0400)]
relay: Use remote reason when sending back a DESTROY
Fix from previous commit where a DESTROY cell is sent instead of a
TRUNCATED.
Related to #40623
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 26 Jul 2022 20:16:04 +0000 (16:16 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 26 Jul 2022 20:16:04 +0000 (16:16 -0400)]
Merge branch 'maint-0.4.6' into maint-0.4.7
David Goulet [Fri, 22 Jul 2022 17:53:52 +0000 (13:53 -0400)]
relay: Send DESTROY cell instead of TRUNCATED cell
Note that with this commit, TRUNCATED cells won't be used anymore that
is client and relays won't emit them.
Fixes #40623
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Fri, 17 Jun 2022 14:23:22 +0000 (14:23 +0000)]
version: Bump version to 0.4.7.8-dev
Tor CI Release [Fri, 17 Jun 2022 14:01:09 +0000 (14:01 +0000)]
version: Bump version to 0.4.7.8
Tor CI Release [Fri, 17 Jun 2022 14:01:09 +0000 (14:01 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.7.8
Tor CI Release [Fri, 17 Jun 2022 14:00:32 +0000 (14:00 +0000)]
fallbackdir: Update list generated on June 17, 2022
Tor CI Release [Fri, 17 Jun 2022 14:00:29 +0000 (14:00 +0000)]
Update geoip files to match ipfire location db, 2022/06/17.
Mike Perry [Wed, 15 Jun 2022 21:00:44 +0000 (21:00 +0000)]
Add changes file for bug40626
Mike Perry [Tue, 14 Jun 2022 20:59:03 +0000 (20:59 +0000)]
Fix for RTT calculation hang during congestion control.
Only cache RTT on explicit stalls; Only use this cache for the
RTT decrease case. Otherwise use only local circuit RTT state for clock jump
checks.
Mike Perry [Wed, 15 Jun 2022 14:43:52 +0000 (14:43 +0000)]
Changes file for Bug 40612
Mike Perry [Wed, 15 Jun 2022 14:42:37 +0000 (14:42 +0000)]
Demote "Unexpected path length" log to info.
You win Maze; we surrender.
Mike Perry [Wed, 15 Jun 2022 14:14:03 +0000 (14:14 +0000)]
Changes file for Bug #40603.
Mike Perry [Wed, 15 Jun 2022 14:13:09 +0000 (14:13 +0000)]
Demote a warning about finding hops in path if no dir info.
Leave it at notice if we do have enough dir info.
David Goulet [Thu, 2 Jun 2022 20:09:56 +0000 (16:09 -0400)]
Merge branch 'tor-gitlab/mr/583' into maint-0.4.7
Mike Perry [Thu, 2 Jun 2022 18:54:11 +0000 (18:54 +0000)]
Bug 40620: Changes file
Mike Perry [Thu, 2 Jun 2022 18:48:14 +0000 (18:48 +0000)]
Demote log message to info.
This log is harmless, and can be common at relays if clients are sending XOFF.
Alexander Færøy [Mon, 9 May 2022 14:37:26 +0000 (14:37 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Mon, 9 May 2022 14:37:26 +0000 (14:37 +0000)]
Merge branch 'maint-0.4.6' into maint-0.4.7
Alexander Færøy [Mon, 9 May 2022 14:35:42 +0000 (14:35 +0000)]
Add changes entry to tor!575.
See: tpo/core/tor#40601.
pmu-ipf [Sat, 30 Apr 2022 11:10:04 +0000 (11:10 +0000)]
sandbox: Permit rseq syscall as well
This was found to be necessary in conjunction with glibc 2.35 on Linux.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
David Goulet [Wed, 27 Apr 2022 15:12:38 +0000 (11:12 -0400)]
version: Bump to 0.4.7.7-dev
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 27 Apr 2022 15:06:03 +0000 (11:06 -0400)]
ci: Add 0.4.7 series to scripts and CI
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Wed, 27 Apr 2022 13:28:50 +0000 (13:28 +0000)]
version: Bump version to 0.4.7.7
Tor CI Release [Wed, 27 Apr 2022 13:28:50 +0000 (13:28 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.7.7
Tor CI Release [Wed, 27 Apr 2022 13:27:42 +0000 (13:27 +0000)]
fallbackdir: Update list generated on April 27, 2022
Tor CI Release [Wed, 27 Apr 2022 13:26:22 +0000 (13:26 +0000)]
Update geoip files to match ipfire location db, 2022/04/27.
Mike Perry [Mon, 25 Apr 2022 19:20:29 +0000 (19:20 +0000)]
Changes file for bug40598
Mike Perry [Mon, 25 Apr 2022 19:20:00 +0000 (19:20 +0000)]
Bug 40598: Demote warn log about odd path lengths with congestion control.