]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
2 weeks agoclean up MaxHSDirCacheBytes docs 928/head
dzwdz [Tue, 16 Sep 2025 02:57:37 +0000 (04:57 +0200)] 
clean up MaxHSDirCacheBytes docs

slop? in my tor(1)? more likely than you think

I don't think any other entries use "Default" lke this, and the repetition
seems pointless.  The historical context was broken off to keep the "main" part
short and tidy.

3 weeks agoconfig: Fix wide comment
David Goulet [Wed, 10 Sep 2025 17:53:59 +0000 (13:53 -0400)] 
config: Fix wide comment

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 weeks agoMerge remote-tracking branch 'mikeperry-private/ticket41006_copilot_piecewise' into...
David Goulet [Wed, 10 Sep 2025 17:51:19 +0000 (13:51 -0400)] 
Merge remote-tracking branch 'mikeperry-private/ticket41006_copilot_piecewise' into maint-0.4.8

3 weeks agoMerge branch 'tor-gitlab/mr/917' into maint-0.4.8
David Goulet [Wed, 10 Sep 2025 17:11:10 +0000 (13:11 -0400)] 
Merge branch 'tor-gitlab/mr/917' into maint-0.4.8

4 weeks agoMake thread control POSIX compliant
Waldemar Zimpel [Sun, 24 Aug 2025 19:10:34 +0000 (21:10 +0200)] 
Make thread control POSIX compliant

Closes issue #41109

5 weeks agoPreparation of `tor_sleep_msec()`
Waldemar Zimpel [Wed, 27 Aug 2025 23:24:50 +0000 (01:24 +0200)] 
Preparation of `tor_sleep_msec()`

- Update `tor_sleep_msec()` with `nanosleep()` function
- Make `tor_sleep_msec()` available outside of unit tests

5 weeks agoRevert "Make thread control POSIX compliant"
David Goulet [Wed, 27 Aug 2025 18:01:19 +0000 (14:01 -0400)] 
Revert "Make thread control POSIX compliant"

This reverts commit bd461eb92048d7dd13ba25dbdafb1fd5440c071c.

6 weeks agoMake thread control POSIX compliant
Waldemar Zimpel [Sun, 24 Aug 2025 19:10:34 +0000 (21:10 +0200)] 
Make thread control POSIX compliant

Closes issue #41109

7 weeks agoLogging / Compression
Waldemar Zimpel [Thu, 14 Aug 2025 21:41:27 +0000 (23:41 +0200)] 
Logging / Compression

Add compression factor to the "Detected possible compression bomb ..."
warning.

8 weeks agochanges: Add file for padding log fix
David Goulet [Thu, 7 Aug 2025 18:20:02 +0000 (14:20 -0400)] 
changes: Add file for padding log fix

Signed-off-by: David Goulet <dgoulet@torproject.org>
8 weeks agoMerge branch 'tor-gitlab/mr/908' into maint-0.4.8
David Goulet [Thu, 7 Aug 2025 18:12:09 +0000 (14:12 -0400)] 
Merge branch 'tor-gitlab/mr/908' into maint-0.4.8

2 months agoFix: "Bug: Duplicate call to circuit_mark_for_close()"
Waldemar Zimpel [Tue, 8 Jul 2025 18:52:49 +0000 (20:52 +0200)] 
Fix: "Bug: Duplicate call to circuit_mark_for_close()"

Second attempt

Closes issues #41106, #40951

3 months agogeoip: Fix Rust clippy warning
David Goulet [Tue, 1 Jul 2025 12:19:36 +0000 (08:19 -0400)] 
geoip: Fix Rust clippy warning

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 months agoversion: Bump version to 0.4.8.17-dev
Tor CI Release [Mon, 30 Jun 2025 14:11:34 +0000 (14:11 +0000)] 
version: Bump version to 0.4.8.17-dev

3 months agoversion: Bump version to 0.4.8.17
Tor CI Release [Mon, 30 Jun 2025 13:14:59 +0000 (13:14 +0000)] 
version: Bump version to 0.4.8.17

3 months agofallbackdir: Update list generated on June 30, 2025
Tor CI Release [Mon, 30 Jun 2025 13:14:10 +0000 (13:14 +0000)] 
fallbackdir: Update list generated on June 30, 2025

3 months agoUpdate geoip files to match ipfire location db, 2025/06/30.
Tor CI Release [Mon, 30 Jun 2025 13:13:13 +0000 (13:13 +0000)] 
Update geoip files to match ipfire location db, 2025/06/30.

3 months agotls: Set TLSv1.3 ciphers to preserve ciphersuites order
ValdikSS [Thu, 26 Jun 2025 14:24:28 +0000 (10:24 -0400)] 
tls: Set TLSv1.3 ciphers to preserve ciphersuites order

This commit fixes two issues:

1. ciphers.inc has TLSv1.3 ciphers prefixed with "TXT", while current version
   has "RFC". TLS1_3_RFC_AES_128_GCM_SHA256 should be instead of
   TLS1_3_TXT_AES_128_GCM_SHA256, in both define and CIPHER() macro.

2. Tor calls only SSL_set_cipher_list() in tlstls_openssl.c, this sets only
   TLSv1.2 ciphers, while TLSv1.3 ciphers stay in default state. TLSv1.3
   ciphersuites are set with SSL_set_ciphersuites(), but the list require to
   contain only TLSv1.3 suites (no v1.2).

Contrary to SSL_set_cipher_list(), TLSv1.3 SSL_set_ciphersuites() does NOT
accept finalizing :, so it should be stripped out.

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 months agoLogging / Channel padding delay
Waldemar Zimpel [Mon, 9 Jun 2025 12:07:33 +0000 (14:07 +0200)] 
Logging / Channel padding delay

Reduce the amount of messages being logged related to
channel padding delay when log level is "notice".
Log the channel padding delay as "info" as soon as the
delay occurs. Log "notice" on each heartbeat only
containing the average channel padding delay and the
amount of delays (that exceeded the allowed time window)
occurring between heartbeats or, if first heartbeat
since startup, between startup and heartbeat.

3 months agoMerge branch 'tor-gitlab/mr/910' into maint-0.4.8
David Goulet [Thu, 12 Jun 2025 15:57:27 +0000 (11:57 -0400)] 
Merge branch 'tor-gitlab/mr/910' into maint-0.4.8

3 months agoUnix processes / Obtain exit status code
Waldemar Zimpel [Sun, 8 Jun 2025 12:20:48 +0000 (14:20 +0200)] 
Unix processes / Obtain exit status code

The actual way for obtaining the exit code
of an exited child process

3 months agoMerge branch 'tor-gitlab/mr/903' into maint-0.4.8
David Goulet [Mon, 9 Jun 2025 13:50:10 +0000 (09:50 -0400)] 
Merge branch 'tor-gitlab/mr/903' into maint-0.4.8

3 months agoFix: "Bug: Duplicate call to circuit_mark_for_close()"
Waldemar Zimpel [Sun, 1 Jun 2025 12:43:03 +0000 (14:43 +0200)] 
Fix: "Bug: Duplicate call to circuit_mark_for_close()"

Closes issue #40951

3 months agolog "list of supported TLS groups" only once
Roger Dingledine [Mon, 9 Jun 2025 01:50:36 +0000 (21:50 -0400)] 
log "list of supported TLS groups" only once

We had been logging it every two hours forever, even though it's based
on the version of OpenSSL we're using it so it will never change.

Fixes bug #41093.

The fix is an improvement on commit ba88ad6b which addressed #41058.

Not adding a changes file since those commits haven't gone out in a
release yet either.

4 months agoAdd ratelimit log for hsdesc pruning during oomkiller
Mike Perry [Thu, 5 Jun 2025 15:12:32 +0000 (15:12 +0000)] 
Add ratelimit log for hsdesc pruning during oomkiller

4 months agoChanges file
Mike Perry [Thu, 5 Jun 2025 01:08:08 +0000 (01:08 +0000)] 
Changes file

4 months agoAdd manpage entry for MaxHSDirCacheBytes.
Mike Perry [Thu, 5 Jun 2025 01:02:01 +0000 (01:02 +0000)] 
Add manpage entry for MaxHSDirCacheBytes.

4 months agoPersist n_downloaded counter for lifetime of HS key.
Mike Perry [Tue, 3 Jun 2025 19:57:07 +0000 (19:57 +0000)] 
Persist n_downloaded counter for lifetime of HS key.

4 months agoAdd check of MaxHSDirCacheBytes every hsdesc upload
Mike Perry [Tue, 3 Jun 2025 19:44:21 +0000 (19:44 +0000)] 
Add check of MaxHSDirCacheBytes every hsdesc upload

4 months agoAdd a new hsdir max bytes config
Mike Perry [Tue, 3 Jun 2025 19:32:38 +0000 (19:32 +0000)] 
Add a new hsdir max bytes config

4 months agoMerge branch 'tor-gitlab/mr/894' into maint-0.4.8
David Goulet [Wed, 21 May 2025 13:29:30 +0000 (09:29 -0400)] 
Merge branch 'tor-gitlab/mr/894' into maint-0.4.8

4 months agoMake an exception to one of the NONSTRINGs
Nick Mathewson [Mon, 19 May 2025 01:52:36 +0000 (21:52 -0400)] 
Make an exception to one of the NONSTRINGs

Older GCCs accept the attribute but don't believe it can appear
before an array.

4 months agoAdd a changes file for 41079.
Nick Mathewson [Mon, 19 May 2025 01:12:30 +0000 (21:12 -0400)] 
Add a changes file for 41079.

4 months agoFix a new GCC warning about strings.
Nick Mathewson [Mon, 19 May 2025 01:11:00 +0000 (21:11 -0400)] 
Fix a new GCC warning about strings.

When we say something like

```
const char foo[3] = "foo";
```

GCC now complains, because there is no space for the terminating NUL.
But we use this construction in a lot of places in our tests to
initialize test digests, keys, and so on.  So to resolve the issue,
we have to mark these strings with a new attribute.

4 months agoConvince gcc that we will not access an array out of bounds
Nick Mathewson [Mon, 19 May 2025 00:54:08 +0000 (20:54 -0400)] 
Convince gcc that we will not access an array out of bounds

4 months agoreindent code from previous commit
Nick Mathewson [Mon, 12 May 2025 12:44:44 +0000 (08:44 -0400)] 
reindent code from previous commit

4 months agoAllow pow-params to appear multiple times.
Nick Mathewson [Mon, 12 May 2025 12:27:34 +0000 (08:27 -0400)] 
Allow pow-params to appear multiple times.

Relatedly, we only require that a pow-params line has _1_ argument
(since future versions might have nothing but a scheme).

See torspec#272 for discussion;
also see proposal 356 for why the fingerprinting opportunity here
isn't a big deal.

We probably shouldn't merge this until torspec!390 is in,
just in case we decide _not_ to take this approach.

(I haven't reindented some code here yet, to make the diff easier to read.)

5 months agocrypt_openssl_mgt: define DISABLE_ENGINES after OPENSSL_NO_ENGINE
orbea [Thu, 31 Aug 2023 21:35:52 +0000 (14:35 -0700)] 
crypt_openssl_mgt: define DISABLE_ENGINES after OPENSSL_NO_ENGINE

With LibreSSL-3.8.1 these engines are no long available causing a build
failure, but LibreSSL correctly defines OPENSSL_NO_ENGINE as part of its
opensslfeatures.h. However Tor includes crypto_openssl_mgt.h before any
of the openssl includes which would define OPENSSL_NO_ENGINE and then
fails to define DISABLE_ENGINES.

As the define is used in only a single .c file it is best to move it
there.

Signed-off-by: orbea <orbea@riseup.net>
5 months agocompat_openssl: fix for LibreSSL 4.1.0
orbea [Wed, 30 Apr 2025 18:47:13 +0000 (11:47 -0700)] 
compat_openssl: fix for LibreSSL 4.1.0

Starting with LibreSSL 4.1.0 this now causes a build failure:

src/lib/tls/tortls_openssl.c: In function 'tor_tls_setup_session_secret_cb':
src/lib/tls/tortls_openssl.c:1059:39: error: passing argument 2 of 'SSL_set_session_secret_cb' from incompatible pointer type [-Wincompatible-pointer-types]
 1059 |   SSL_set_session_secret_cb(tls->ssl, tor_tls_session_secret_cb, NULL);
      |                                       ^~~~~~~~~~~~~~~~~~~~~~~~~
      |                                       |
      |                                       int (*)(SSL *, void *, int *, struct stack_st_SSL_CIPHER *, SSL_CIPHER **, void *) {aka int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, struct ssl_cipher_st **, void *)}
In file included from src/lib/tls/tortls_openssl.c:48:
/usr/include/openssl/ssl.h:1489:30: note: expected 'tls_session_secret_cb_fn' {aka 'int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, const struct ssl_cipher_st **, void *)'} but argument is of type 'int (*)(SSL *, void *, int *, struct stack_st_SSL_CIPHER *, SSL_CIPHER **, void *)' {aka 'int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, struct ssl_cipher_st **, void *)'}
 1489 |     tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
      |     ~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~

Signed-off-by: orbea <orbea@riseup.net>
5 months agoPromote "list of supported groups" message to notice.
Nick Mathewson [Wed, 23 Apr 2025 18:11:39 +0000 (14:11 -0400)] 
Promote "list of supported groups" message to notice.

I have a feeling that this might help diagnosing
any other problems similar to #41058.

5 months agoOnly try more complex OpenSSL group list syntax with OpenSSL 3.5.
Nick Mathewson [Wed, 23 Apr 2025 18:10:43 +0000 (14:10 -0400)] 
Only try more complex OpenSSL group list syntax with OpenSSL 3.5.

Closes #41058.

5 months agoTLS: When possible, enable ML-KEM768.
Nick Mathewson [Wed, 23 Apr 2025 13:13:04 +0000 (09:13 -0400)] 
TLS: When possible, enable ML-KEM768.

Closes ticket 41041.

5 months agoCorrectly detect error from SSL_CTX_set1_groups_list.
Nick Mathewson [Wed, 23 Apr 2025 12:46:17 +0000 (08:46 -0400)] 
Correctly detect error from SSL_CTX_set1_groups_list.

Previously our code was checking for '< 0', but the error return value for
this function _is_ zero.

5 months agoRemove TOR_TLS_USE_ECDHE_P* flags.
Nick Mathewson [Wed, 23 Apr 2025 12:38:05 +0000 (08:38 -0400)] 
Remove TOR_TLS_USE_ECDHE_P* flags.

They have been unused since 0.3.1.1-alpha, when we removed the
TLSECGroups option.

5 months agoMake two 1-bit fields unsigned
Sebastian Hahn [Thu, 1 Feb 2024 18:45:04 +0000 (19:45 +0100)] 
Make two 1-bit fields unsigned

This should be a completely harmless warning as we only check whether
the fields are true or false.

Closes #40911.

(Backported by nickm so that I can compile 0.4.8 without warnings.)

6 months agoFix: Crash on SIGSEGV if at least one worker thread cannot be launched
Waldemar Zimpel [Thu, 27 Mar 2025 22:15:05 +0000 (23:15 +0100)] 
Fix: Crash on SIGSEGV if at least one worker thread cannot be launched

Perform a clean shutdown in case worker threads cannot be lauched.

6 months agoMerge branch 'tor-gitlab/mr/874' into maint-0.4.8
David Goulet [Thu, 27 Mar 2025 19:56:02 +0000 (15:56 -0400)] 
Merge branch 'tor-gitlab/mr/874' into maint-0.4.8

6 months agoMerge branch 'fix/memleaks-cpuworker' into 'maint-0.4.8'
David Goulet [Thu, 27 Mar 2025 14:29:11 +0000 (14:29 +0000)] 
Merge branch 'fix/memleaks-cpuworker' into 'maint-0.4.8'

Re: Coverity report Oct 31st, 2024 (Issue #40991)

See merge request tpo/core/tor!844

6 months agoRe: Coverity report Oct 31st, 2024 (Issue #40991)
excurso [Thu, 27 Mar 2025 14:29:11 +0000 (14:29 +0000)] 
Re: Coverity report Oct 31st, 2024 (Issue #40991)

6 months agoconflux: Avoid non fatal assert in CIRCUIT_IS_CONFLUX()
David Goulet [Thu, 27 Mar 2025 12:49:40 +0000 (08:49 -0400)] 
conflux: Avoid non fatal assert in CIRCUIT_IS_CONFLUX()

In the circuit_about_to_free(), we clear the circ->conflux object and then we
end up trying to emit an event on the control port which calls
CIRCUIT_IS_CONFLUX() and non fatal assert on the false branch.

Fixes #41037

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 months agoRequire FlowCtrl=1 (authenticated sendmes) for clients
Nick Mathewson [Tue, 25 Mar 2025 19:13:31 +0000 (15:13 -0400)] 
Require FlowCtrl=1 (authenticated sendmes) for clients

This will cause clients before 0.4.1.1-alpha to shut down.

Part of #40836.

6 months agoprotover: Vote for additional protocols to be required/recommended
Nick Mathewson [Tue, 25 Mar 2025 19:06:12 +0000 (15:06 -0400)] 
protover: Vote for additional protocols to be required/recommended

Note that the changes here will require all relays
to be 0.4.7.4-alpha or later, which is lower than
our current lowest-supported relay version.

Part of #40836.

6 months agofix two comment typos from 0.4.8.15
Roger Dingledine [Tue, 25 Mar 2025 15:22:24 +0000 (11:22 -0400)] 
fix two comment typos from 0.4.8.15

6 months agoversion: Bump version to 0.4.8.16-dev
Tor CI Release [Mon, 24 Mar 2025 15:25:59 +0000 (15:25 +0000)] 
version: Bump version to 0.4.8.16-dev

6 months agoversion: Bump version to 0.4.8.16
Tor CI Release [Mon, 24 Mar 2025 15:11:11 +0000 (15:11 +0000)] 
version: Bump version to 0.4.8.16

6 months agoUpdate geoip files to match ipfire location db, 2025/03/24.
Tor CI Release [Mon, 24 Mar 2025 15:09:47 +0000 (15:09 +0000)] 
Update geoip files to match ipfire location db, 2025/03/24.

6 months agodirauth: Fix typo in flag relay assignment token
David Goulet [Mon, 24 Mar 2025 13:09:38 +0000 (09:09 -0400)] 
dirauth: Fix typo in flag relay assignment token

Unfortunately, we wanted to be able to control the Guard flag here but the
token used mentionned "exit" instead.

Oh well, s*** happens :).

Fixes #41035

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 months agoversion: Bump version to 0.4.8.15-dev
Tor CI Release [Thu, 20 Mar 2025 15:06:00 +0000 (15:06 +0000)] 
version: Bump version to 0.4.8.15-dev

6 months agoversion: Bump version to 0.4.8.15
Tor CI Release [Thu, 20 Mar 2025 14:43:55 +0000 (14:43 +0000)] 
version: Bump version to 0.4.8.15

6 months agofallbackdir: Update list generated on March 20, 2025
Tor CI Release [Thu, 20 Mar 2025 14:40:50 +0000 (14:40 +0000)] 
fallbackdir: Update list generated on March 20, 2025

6 months agoUpdate geoip files to match ipfire location db, 2025/03/20.
Tor CI Release [Thu, 20 Mar 2025 14:39:57 +0000 (14:39 +0000)] 
Update geoip files to match ipfire location db, 2025/03/20.

6 months agoBug 41023 changes file
Mike Perry [Wed, 19 Mar 2025 00:05:43 +0000 (00:05 +0000)] 
Bug 41023 changes file

6 months agohs: Never pick a MiddleOnly node for HS circuit purposes
David Goulet [Tue, 11 Mar 2025 16:00:22 +0000 (12:00 -0400)] 
hs: Never pick a MiddleOnly node for HS circuit purposes

Related to #41023

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 months agohs: Remove HSv3 rendezvous circuit flag used for node selection
David Goulet [Tue, 11 Mar 2025 14:54:51 +0000 (10:54 -0400)] 
hs: Remove HSv3 rendezvous circuit flag used for node selection

This was put in when HSv2 and v3 were co-existing. Now, the network requires
HSRend=2 which is v3 by default.

This is a simple cleanup of an internal flag used to identify a launch of a
RPv3 circuit.

Related to #41023

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 months agoProvide dirauth ability to strip specific flags.
Mike Perry [Thu, 13 Mar 2025 20:00:03 +0000 (20:00 +0000)] 
Provide dirauth ability to strip specific flags.

6 months agoCI: Add changes file related to 41029.
Alexander Hansen Færøy [Tue, 18 Mar 2025 15:23:00 +0000 (16:23 +0100)] 
CI: Add changes file related to 41029.

6 months agoCI: Enable venv before running ci-driver.sh for Chutney.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:47:53 +0000 (14:47 +0100)] 
CI: Enable venv before running ci-driver.sh for Chutney.

6 months agoCI: Install python3-venv.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:29:11 +0000 (14:29 +0100)] 
CI: Install python3-venv.

6 months agoCI: Use local pip instead of python3-pip.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:25:41 +0000 (14:25 +0100)] 
CI: Use local pip instead of python3-pip.

6 months agoCI: Disable redundant-decls warnings for NSS in crypto_nss_mgt.c.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:22:35 +0000 (14:22 +0100)] 
CI: Disable redundant-decls warnings for NSS in crypto_nss_mgt.c.

6 months agoCI: Install libclang-rt-dev when build with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:37:39 +0000 (13:37 +0100)] 
CI: Install libclang-rt-dev when build with hardening enabled.

6 months agoCI: Install libubsan1 when building with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:33:23 +0000 (13:33 +0100)] 
CI: Install libubsan1 when building with hardening enabled.

6 months agoCI: Use bookworm instead of bullseye.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:26:50 +0000 (13:26 +0100)] 
CI: Use bookworm instead of bullseye.

6 months agoCI: use a fixed version of chutney
Jim Newsome [Wed, 30 Oct 2024 15:34:58 +0000 (10:34 -0500)] 
CI: use a fixed version of chutney

While chutney currently runs tor's chutney test in its own CI,
it's difficult to guarantee the two won't accidentally diverge.
Probably best to use a fixed version here so that we can control
chutney version bumps and avoid surprise breakage in tor's CI.

This will also free us to intentionally make breaking changes in
chutney (though I don't have any immediate plans for any).

6 months agoCI: Remove physical tags from gitlab-ci runner requirements.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:17:28 +0000 (13:17 +0100)] 
CI: Remove physical tags from gitlab-ci runner requirements.

6 months agoscripts: Remove 0.4.7 from list tor branches
David Goulet [Tue, 11 Mar 2025 14:21:03 +0000 (10:21 -0400)] 
scripts: Remove 0.4.7 from list tor branches

Not maintained anymore.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 months agofix sandbox for bandwidth authority
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)] 
fix sandbox for bandwidth authority

7 months agoTicket 40872: Changes file
Mike Perry [Thu, 21 Nov 2024 17:09:39 +0000 (17:09 +0000)] 
Ticket 40872: Changes file

7 months agoTicket 40872: Output conflux nonce and circ rtt to control port
Mike Perry [Thu, 21 Nov 2024 17:08:19 +0000 (17:08 +0000)] 
Ticket 40872: Output conflux nonce and circ rtt to control port

7 months agoTicket 40872: Add conflux helper functions for control port info
Mike Perry [Thu, 21 Nov 2024 17:06:26 +0000 (17:06 +0000)] 
Ticket 40872: Add conflux helper functions for control port info

7 months agoversion: Bump version to 0.4.8.14-dev
Tor CI Release [Wed, 5 Feb 2025 14:33:19 +0000 (14:33 +0000)] 
version: Bump version to 0.4.8.14-dev

7 months agoversion: Bump version to 0.4.8.14
Tor CI Release [Wed, 5 Feb 2025 14:22:05 +0000 (14:22 +0000)] 
version: Bump version to 0.4.8.14

7 months agofallbackdir: Update list generated on February 05, 2025
Tor CI Release [Wed, 5 Feb 2025 14:21:16 +0000 (14:21 +0000)] 
fallbackdir: Update list generated on February 05, 2025

7 months agoUpdate geoip files to match ipfire location db, 2025/02/05.
Tor CI Release [Wed, 5 Feb 2025 14:20:40 +0000 (14:20 +0000)] 
Update geoip files to match ipfire location db, 2025/02/05.

8 months agohs: Make Windows CI 32bit happy
David Goulet [Tue, 28 Jan 2025 18:44:11 +0000 (13:44 -0500)] 
hs: Make Windows CI 32bit happy

Signed-off-by: David Goulet <dgoulet@torproject.org>
8 months agohashx: Move Windows function within another ifdef
David Goulet [Tue, 28 Jan 2025 18:27:14 +0000 (13:27 -0500)] 
hashx: Move Windows function within another ifdef

Function only used within the hugepage ifdef for Windows so move it there so we
avoid a unused function warning on our Windows CI:

src/ext/equix/hashx/src/virtual_memory.c:30:13: error: 'set_privilege' defined but not used [-Werror=unused-function]
   30 | static bool set_privilege(const char* pszPrivilege, BOOL bEnable) {
      |             ^~~~~~~~~~~~~

Signed-off-by: David Goulet <dgoulet@torproject.org>
8 months agoscripts: Fix rust clippy warning
David Goulet [Wed, 22 Jan 2025 13:59:03 +0000 (08:59 -0500)] 
scripts: Fix rust clippy warning

Signed-off-by: David Goulet <dgoulet@torproject.org>
9 months agochanges: Add file for ticket 40996
David Goulet [Wed, 18 Dec 2024 16:31:03 +0000 (11:31 -0500)] 
changes: Add file for ticket 40996

Part of #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
9 months agotest: Add HS cache OOM cleanup test
David Goulet [Wed, 18 Dec 2024 16:28:59 +0000 (11:28 -0500)] 
test: Add HS cache OOM cleanup test

Part of #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
9 months agohs: Use downloaded counter for HSDir OOM cache cleanup
David Goulet [Wed, 18 Dec 2024 16:04:00 +0000 (11:04 -0500)] 
hs: Use downloaded counter for HSDir OOM cache cleanup

The OOM cache cleanup is now done by looking at the downloaded counter. The
cleanup process start at 0 and increment it to the next lowest value until
enough bytes have been removed.

This process could be expensive for large amount of descriptors in the cache
but since it is very expensive to increment counters, most cleanup should
happen within a tight range of downloaded counter target.

Fixes #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
9 months agohs: Add downloaded counter to an HSDir cache entry
David Goulet [Wed, 18 Dec 2024 15:24:28 +0000 (10:24 -0500)] 
hs: Add downloaded counter to an HSDir cache entry

This adds a counter for the number of times a descriptor is downloaded from an
HSDir. Future commit will change the OOM subsystem to clean that cache based on
the lowest downloaded counts instead of time in cache.

In order to raise the bar even more for an attacker, the downloaded counter is
only marked when the directory request stream is closed. To pull this off, the
HS identifier on the directory connection is populated with the blinded key
requested (only on success). Finally, when the connection closes, we can then
lookup the cache entry with it and increment the counter.

Part of #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
10 months agotest-network-run: refactor away test_network_ipv6
Jim Newsome [Mon, 18 Nov 2024 16:26:26 +0000 (10:26 -0600)] 
test-network-run: refactor away test_network_ipv6

This should be a pure refactor to simplify the logic a bit now that we
no longer probe for IPv6 support.

10 months agotest-network: include IPv6 tests unconditionally
Jim Newsome [Fri, 15 Nov 2024 00:38:22 +0000 (18:38 -0600)] 
test-network: include IPv6 tests unconditionally

Previously we would incorrectly detect that ipv6 isn't supported if the
ping binary isn't present (as it may not be in a relatively stripped
down container image), or if ICMP packets aren't permitted (as they
often aren't in containers).

We don't really have a need to run these network tests on non-IPv6
systems, so it makes more sense to just run them unconditionally.

10 months agodebian-i386-minimal: explicitly set platform
Jim Newsome [Mon, 18 Nov 2024 19:58:25 +0000 (13:58 -0600)] 
debian-i386-minimal: explicitly set platform

This is to work around
https://github.com/docker-library/official-images/issues/17896

10 months agoCI: Use TPA-based images
Jim Newsome [Mon, 18 Nov 2024 19:25:13 +0000 (13:25 -0600)] 
CI: Use TPA-based images

10 months agodebian-gpl: Run on debian:bullseye instead of buster
Jim Newsome [Mon, 18 Nov 2024 20:15:37 +0000 (14:15 -0600)] 
debian-gpl: Run on debian:bullseye instead of buster

* buster is now very old
* all the other jobs run bullseye
* This will facilitate switching to a TPA-maintained image (there is no
  buster image).

11 months agoFix: Use FREE_AND_NULL() for releasing workqueue resources
Waldemar Zimpel [Wed, 30 Oct 2024 01:51:20 +0000 (02:51 +0100)] 
Fix: Use FREE_AND_NULL() for releasing workqueue resources

See issue #40989

11 months agoMerge branch 'tor-gitlab/mr/840' into maint-0.4.8
David Goulet [Thu, 24 Oct 2024 15:43:07 +0000 (11:43 -0400)] 
Merge branch 'tor-gitlab/mr/840' into maint-0.4.8

11 months agoUse pip to install chutney's python dependencies
Jim Newsome [Thu, 24 Oct 2024 14:53:19 +0000 (09:53 -0500)] 
Use pip to install chutney's python dependencies

11 months agoversion: Bump version to 0.4.8.13-dev
Tor CI Release [Thu, 24 Oct 2024 14:45:02 +0000 (14:45 +0000)] 
version: Bump version to 0.4.8.13-dev