]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Tue, 23 Sep 2025 15:44:28 +0000 (11:44 -0400)]
Bulletproof the "get_mozilla_ciphers" script
Reviewers have noted that the script's logic treats all "enabled"
flags in StaticPrefList.yaml (other than an explicit False) as True.
That's not so great, since the flag can also be a string, and we
don't necessarily want to treat all strings as meaning that a
ciphersuite is enabled. (Although we do in fact want to treat
the only string used in _current_ firefox git main that way.)
This change has no effect on the generated ciphers.inc.
Closes #41117.
ci
David Goulet [Wed, 10 Sep 2025 17:54:04 +0000 (13:54 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Wed, 10 Sep 2025 17:53:59 +0000 (13:53 -0400)]
config: Fix wide comment
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Sep 2025 17:51:29 +0000 (13:51 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Wed, 10 Sep 2025 17:51:19 +0000 (13:51 -0400)]
Merge remote-tracking branch 'mikeperry-private/ticket41006_copilot_piecewise' into maint-0.4.8
David Goulet [Wed, 10 Sep 2025 17:11:15 +0000 (13:11 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Wed, 10 Sep 2025 17:11:10 +0000 (13:11 -0400)]
Merge branch 'tor-gitlab/mr/917' into maint-0.4.8
David Goulet [Wed, 10 Sep 2025 17:07:16 +0000 (13:07 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Wed, 10 Sep 2025 15:01:35 +0000 (15:01 +0000)]
Merge branch 'cleanup' into 'main'
remove dead code from circuit_n_chan_done
See merge request tpo/core/tor!923
dzwdz [Mon, 8 Sep 2025 03:01:20 +0000 (05:01 +0200)]
remove dead code from circuit_n_chan_done
close_origin_circuits was added in
ccabbe702a072cfc4b2ec194d8211d06ce991904 ,
and the last usage was removed in
5a174ebfac759081c1c6c2adf614c43cc75325c3 ,
8 years ago.
Waldemar Zimpel [Sun, 24 Aug 2025 19:10:34 +0000 (21:10 +0200)]
Make thread control POSIX compliant
Closes issue #41109
Waldemar Zimpel [Wed, 27 Aug 2025 23:24:50 +0000 (01:24 +0200)]
Preparation of `tor_sleep_msec()`
- Update `tor_sleep_msec()` with `nanosleep()` function
- Make `tor_sleep_msec()` available outside of unit tests
Alexander Hansen Færøy [Thu, 28 Aug 2025 13:19:52 +0000 (15:19 +0200)]
Merge branch 'bridgeline' into 'main'
bridge: output complete bridge lines to logs & disk
See merge request tpo/core/tor!782
David Goulet [Wed, 27 Aug 2025 18:01:24 +0000 (14:01 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Wed, 27 Aug 2025 18:01:19 +0000 (14:01 -0400)]
Revert "Make thread control POSIX compliant"
This reverts commit
bd461eb92048d7dd13ba25dbdafb1fd5440c071c .
David Goulet [Tue, 26 Aug 2025 14:16:39 +0000 (10:16 -0400)]
Merge branch 'maint-0.4.8'
Waldemar Zimpel [Sun, 24 Aug 2025 19:10:34 +0000 (21:10 +0200)]
Make thread control POSIX compliant
Closes issue #41109
dzwdz [Sun, 24 Aug 2025 18:25:08 +0000 (20:25 +0200)]
save PT bridge lines to disk
Solves https://gitlab.torproject.org/tpo/core/tor/-/issues/29128.
pt_update_bridge_lines() was based on pt_get_extra_info_descriptor_string().
In particular, I copied the behaviour of not printing IPv6 addresses if IPv4 is
present. I'll make both functions use IPv6 in another MR.
That function is called when the IP or key changes. Sadly, I don't remember
how I decided from where exactly to call it (I wrote this ages ago), but it
seems fine?
Waldemar Zimpel [Thu, 14 Aug 2025 21:41:27 +0000 (23:41 +0200)]
Logging / Compression
Add compression factor to the "Detected possible compression bomb ..."
warning.
David Goulet [Thu, 7 Aug 2025 18:34:12 +0000 (14:34 -0400)]
metrics: Only coung LD_BUG if they are warn/err
Fixes #41104
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 7 Aug 2025 18:20:10 +0000 (14:20 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Thu, 7 Aug 2025 18:20:02 +0000 (14:20 -0400)]
changes: Add file for padding log fix
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 7 Aug 2025 18:12:09 +0000 (14:12 -0400)]
Merge branch 'tor-gitlab/mr/908' into maint-0.4.8
David Goulet [Tue, 5 Aug 2025 14:41:51 +0000 (10:41 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Mon, 4 Aug 2025 19:38:47 +0000 (19:38 +0000)]
Merge branch 'unix-processes/cloexec-pipes' into 'main'
Unix processes / IPC / Utilize pipes with "close-on-exec" flag set
See merge request tpo/core/tor!916
excurso [Mon, 4 Aug 2025 19:38:47 +0000 (19:38 +0000)]
Unix processes / IPC / Utilize pipes with "close-on-exec" flag set
Waldemar Zimpel [Tue, 8 Jul 2025 18:52:49 +0000 (20:52 +0200)]
Fix: "Bug: Duplicate call to circuit_mark_for_close()"
Second attempt
Closes issues #41106, #40951
David Goulet [Tue, 1 Jul 2025 12:19:45 +0000 (08:19 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Tue, 1 Jul 2025 12:19:36 +0000 (08:19 -0400)]
geoip: Fix Rust clippy warning
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 1 Jul 2025 12:17:21 +0000 (12:17 +0000)]
Merge branch 'changelogs' into 'main'
forward port changelogs 0.4.8.14 - 0.4.8.17
See merge request tpo/core/tor!914
David Goulet [Tue, 1 Jul 2025 12:16:00 +0000 (12:16 +0000)]
Merge branch 'tabs' into 'main'
clean up tabs/whitespace in automake files
See merge request tpo/core/tor!913
Roger Dingledine [Tue, 1 Jul 2025 06:13:10 +0000 (02:13 -0400)]
forward port changelogs 0.4.8.14 - 0.4.8.17
Roger Dingledine [Tue, 1 Jul 2025 05:59:45 +0000 (01:59 -0400)]
clean up tabs/whitespace in automake files
it used to be a clean set of tabs but it accumulated chaos
over the years
diff is best viewed with git diff -w
David Goulet [Mon, 30 Jun 2025 16:59:50 +0000 (12:59 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Mon, 30 Jun 2025 14:11:34 +0000 (14:11 +0000)]
version: Bump version to 0.4.8.17-dev
David Goulet [Mon, 30 Jun 2025 14:05:34 +0000 (10:05 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Mon, 30 Jun 2025 13:14:59 +0000 (13:14 +0000)]
version: Bump version to 0.4.8.17
David Goulet [Mon, 30 Jun 2025 13:55:54 +0000 (09:55 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Mon, 30 Jun 2025 13:14:10 +0000 (13:14 +0000)]
fallbackdir: Update list generated on June 30, 2025
Tor CI Release [Mon, 30 Jun 2025 13:13:13 +0000 (13:13 +0000)]
Update geoip files to match ipfire location db, 2025/06/30.
David Goulet [Thu, 26 Jun 2025 16:16:45 +0000 (12:16 -0400)]
Merge branch 'maint-0.4.8'
ValdikSS [Thu, 26 Jun 2025 14:24:28 +0000 (10:24 -0400)]
tls: Set TLSv1.3 ciphers to preserve ciphersuites order
This commit fixes two issues:
1. ciphers.inc has TLSv1.3 ciphers prefixed with "TXT", while current version
has "RFC". TLS1_3_RFC_AES_128_GCM_SHA256 should be instead of
TLS1_3_TXT_AES_128_GCM_SHA256, in both define and CIPHER() macro.
2. Tor calls only SSL_set_cipher_list() in tlstls_openssl.c, this sets only
TLSv1.2 ciphers, while TLSv1.3 ciphers stay in default state. TLSv1.3
ciphersuites are set with SSL_set_ciphersuites(), but the list require to
contain only TLSv1.3 suites (no v1.2).
Contrary to SSL_set_cipher_list(), TLSv1.3 SSL_set_ciphersuites() does NOT
accept finalizing :, so it should be stripped out.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alexander Hansen Færøy [Tue, 17 Jun 2025 15:19:10 +0000 (17:19 +0200)]
Merge branch 'unix-processes/code-cleanup/1' into 'main'
Unix processes / Remove dead code
See merge request tpo/core/tor!911
excurso [Tue, 17 Jun 2025 15:19:09 +0000 (15:19 +0000)]
Unix processes / Remove dead code
Waldemar Zimpel [Mon, 9 Jun 2025 12:07:33 +0000 (14:07 +0200)]
Logging / Channel padding delay
Reduce the amount of messages being logged related to
channel padding delay when log level is "notice".
Log the channel padding delay as "info" as soon as the
delay occurs. Log "notice" on each heartbeat only
containing the average channel padding delay and the
amount of delays (that exceeded the allowed time window)
occurring between heartbeats or, if first heartbeat
since startup, between startup and heartbeat.
David Goulet [Thu, 12 Jun 2025 16:54:04 +0000 (12:54 -0400)]
Merge branch 'tor-gitlab/mr/905'
David Goulet [Thu, 12 Jun 2025 15:57:31 +0000 (11:57 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Thu, 12 Jun 2025 15:57:27 +0000 (11:57 -0400)]
Merge branch 'tor-gitlab/mr/910' into maint-0.4.8
David Goulet [Thu, 12 Jun 2025 15:56:21 +0000 (15:56 +0000)]
Merge branch 'of_development' into 'main'
channel.h: missed channel state transition comment added
See merge request tpo/core/tor!888
zero_gear [Thu, 12 Jun 2025 15:56:21 +0000 (17:56 +0200)]
channel.h: missed channel state transition comment added
David Goulet [Thu, 12 Jun 2025 15:54:42 +0000 (11:54 -0400)]
Merge branch 'tor-gitlab/mr/901'
David Goulet [Thu, 12 Jun 2025 15:53:05 +0000 (11:53 -0400)]
Merge branch 'tor-gitlab/mr/891'
David Goulet [Wed, 11 Jun 2025 13:00:48 +0000 (13:00 +0000)]
Merge branch 'hsdir-interval' into 'main'
hs-common: Reduce HS_TIMER_PERIOD_LENGTH_MIN from 30 to 5
See merge request tpo/core/tor!909
Waldemar Zimpel [Sun, 8 Jun 2025 12:20:48 +0000 (14:20 +0200)]
Unix processes / Obtain exit status code
The actual way for obtaining the exit code
of an exited child process
Nick Mathewson [Tue, 10 Jun 2025 16:34:34 +0000 (12:34 -0400)]
Changes file for CGO (ticket 41047, prop359).
Nick Mathewson [Tue, 10 Jun 2025 16:29:40 +0000 (12:29 -0400)]
Remove circuit_sendme_cell_is_next
We needed this function previously, when we only computed a SENDME
tag conditionally, depending on whether we were about to need it.
But as part of the CGO refactoring, we now compute and store SENDME
tags unconditionally, whenever a cell is originated or recognized.
Therefore this function is no longer needed anywhere.
Nick Mathewson [Tue, 10 Jun 2025 16:24:54 +0000 (12:24 -0400)]
Enforce that SENDME tags have the expected length
The length is no longer a constant 20, but now depends on the
relay crypto algorithm in use.
Nick Mathewson [Tue, 10 Jun 2025 14:32:20 +0000 (10:32 -0400)]
Remove XXXs about Making CGO disable-able
Nick Mathewson [Thu, 5 Jun 2025 20:01:28 +0000 (16:01 -0400)]
Make SENDME tag lengths defined in a single place.
Nick Mathewson [Thu, 5 Jun 2025 19:54:56 +0000 (15:54 -0400)]
sendme: Use a simpler and more correct init for sendme tags.
Nick Mathewson [Wed, 4 Jun 2025 15:09:47 +0000 (11:09 -0400)]
Give relay_crypto.c access to cpath private members.
I'd considered moving all the relevant functions to crypt_path.c,
but after some experimentation it didn't seem to improve matters.
Nick Mathewson [Tue, 3 Jun 2025 12:31:02 +0000 (08:31 -0400)]
Set the key material length correctly based on crypto algorithm.
With this change, it appears that we can successfully negotiate
CGO.
Nick Mathewson [Mon, 2 Jun 2025 21:11:54 +0000 (17:11 -0400)]
Add some warnings for client create failures
Nick Mathewson [Mon, 2 Jun 2025 21:05:08 +0000 (17:05 -0400)]
Make extend_info_supports_ntor_v3 correct.
Previously it returned true if the extend_info was for an exit where we
intended to use congestion control, which is not exactly the same thing
as supporting ntor v3.
Nick Mathewson [Mon, 2 Jun 2025 20:44:27 +0000 (16:44 -0400)]
Relays: Advertise support for cgo.
Nick Mathewson [Mon, 2 Jun 2025 20:37:02 +0000 (16:37 -0400)]
Enable CGO at the client side when a relay supports it
Nick Mathewson [Mon, 2 Jun 2025 19:59:01 +0000 (15:59 -0400)]
client-side support for negotiating CGO via subprotocol request
This has been a bit tricky, since the old code assumed that
we never wanted to use extensions besides CC.
Nick Mathewson [Mon, 2 Jun 2025 19:54:03 +0000 (15:54 -0400)]
Accept subproto_request extensions for CGO.
Nick Mathewson [Mon, 2 Jun 2025 16:05:25 +0000 (12:05 -0400)]
Move responsibility for extension parsing to onion_crypto.c
Nick Mathewson [Mon, 2 Jun 2025 15:54:10 +0000 (11:54 -0400)]
Move responsibility for ntorv3 extension lookup to a function.
Nick Mathewson [Mon, 2 Jun 2025 15:11:05 +0000 (11:11 -0400)]
Add a negotiation message for subprotocol requests.
Nick Mathewson [Mon, 2 Jun 2025 14:36:18 +0000 (10:36 -0400)]
Use protovers to detect cgo support.
Nick Mathewson [Mon, 2 Jun 2025 14:32:46 +0000 (10:32 -0400)]
Remove incorrect note about supports_conflux flag
Nick Mathewson [Mon, 2 Jun 2025 14:22:50 +0000 (10:22 -0400)]
remove debug log with relay digest material
This will no longer always be a subset of the relay digest initial keys;
it's better just not to log this.
Nick Mathewson [Mon, 2 Jun 2025 14:21:05 +0000 (10:21 -0400)]
Move parameter initialization to the start of the client handshake
Since we're going to be determining cell format and relay crypto
algorithm when we send our negotiation message, we'll need to
initialize it here.
Nick Mathewson [Mon, 2 Jun 2025 14:13:39 +0000 (10:13 -0400)]
Remove rend_dh_handshake_state
It became useless when we removed v2 onion services.
Nick Mathewson [Mon, 2 Jun 2025 14:08:00 +0000 (10:08 -0400)]
Add cell format and crypto alg to circ_params
This allows them to be negotiated as part of the handshake.
Nick Mathewson [Wed, 28 May 2025 19:53:34 +0000 (15:53 -0400)]
relay_crypto: Implement support for CGO.
Nick Mathewson [Wed, 28 May 2025 19:14:51 +0000 (15:14 -0400)]
Turn relay_crypto_t into a tagged union.
Nick Mathewson [Wed, 28 May 2025 19:04:48 +0000 (15:04 -0400)]
Refactor relay_crypto_init API to take an algorithm.
Nick Mathewson [Wed, 28 May 2025 18:50:09 +0000 (14:50 -0400)]
Turn tor1_crypt_t into a distinct type.
Nick Mathewson [Wed, 28 May 2025 18:34:28 +0000 (14:34 -0400)]
Move relay_crypto_st.h to core/crypto.
Nick Mathewson [Wed, 28 May 2025 16:51:08 +0000 (12:51 -0400)]
Propagate longer keylens through onion handshakes.
Nick Mathewson [Wed, 28 May 2025 16:22:03 +0000 (12:22 -0400)]
relay crypto: functions to get key material length.
Nick Mathewson [Wed, 28 May 2025 16:02:39 +0000 (12:02 -0400)]
Allow SENDME tags to be 16 or 20 bytes.
Nick Mathewson [Wed, 28 May 2025 15:12:54 +0000 (11:12 -0400)]
Move tor1 crypto functions into new file
(I'd recommend reviewing this with "show -b --color-moved")
Nick Mathewson [Wed, 28 May 2025 14:02:38 +0000 (10:02 -0400)]
Refactor and simplify save_sendme logic in tor1.
Every time that we want a sendme_digest, we have already computed it
once, either to originate a cell or to recognize a cell. Rather
than figuring out when to compute the digest a second time, we
instead refactor our tor1 digest code to _always_ store such digests
in the relay_crypto_t.
This saves a bit of complexity, and shouldn't involve a performance
hit; rather, it has potential to speed things up by saving a sha1
call.
Nick Mathewson [Wed, 28 May 2025 12:52:57 +0000 (08:52 -0400)]
Refactor tor1 relay crypto functions into per-layer calls.
We'll need this for mixed circuits.
Also, the APIs here are a bit closer to the CGO APIs.
Nick Mathewson [Wed, 28 May 2025 12:27:58 +0000 (08:27 -0400)]
Rename two "record_*_digest functions to "save".
This makes an important distinction: "recording" a digest puts
it in the expected-sendme queue, whereas "saving" a digest makes
a temporary copy inside the relay_crypto_t.
Nick Mathewson [Wed, 28 May 2025 12:17:37 +0000 (08:17 -0400)]
Rename a couple of relay crypto functions to "tor1".
(I've designated the existing encryption algorithm "tor1".
Jim Newsome [Tue, 10 Jun 2025 22:17:53 +0000 (17:17 -0500)]
hs_common.h: delete duplicate definitions
Jim Newsome [Tue, 10 Jun 2025 22:13:41 +0000 (17:13 -0500)]
hs-common: Reduce HS_TIMER_PERIOD_LENGTH_MIN from 30 to 5
This matches the tor-spec change
<https://gitlab.torproject.org/tpo/core/torspec/-/merge_requests/406>
Progress on
<https://gitlab.torproject.org/tpo/core/chutney/-/issues/40038>
Alexander Hansen Færøy [Tue, 10 Jun 2025 12:35:21 +0000 (14:35 +0200)]
Merge branch 'tor_41091' into 'main'
cgo: Use the correct operation to re-align AES.
Closes #41091
See merge request tpo/core/tor!906
David Goulet [Mon, 9 Jun 2025 13:50:24 +0000 (09:50 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Mon, 9 Jun 2025 13:50:10 +0000 (09:50 -0400)]
Merge branch 'tor-gitlab/mr/903' into maint-0.4.8
David Goulet [Mon, 9 Jun 2025 13:36:26 +0000 (09:36 -0400)]
Merge branch 'maint-0.4.8'
Waldemar Zimpel [Sun, 1 Jun 2025 12:43:03 +0000 (14:43 +0200)]
Fix: "Bug: Duplicate call to circuit_mark_for_close()"
Closes issue #40951
Roger Dingledine [Mon, 9 Jun 2025 01:50:36 +0000 (21:50 -0400)]
log "list of supported TLS groups" only once
We had been logging it every two hours forever, even though it's based
on the version of OpenSSL we're using it so it will never change.
Fixes bug #41093.
The fix is an improvement on commit
ba88ad6b which addressed #41058.
Not adding a changes file since those commits haven't gone out in a
release yet either.
Nick Mathewson [Thu, 5 Jun 2025 20:12:24 +0000 (16:12 -0400)]
cgo: Use the correct operation to re-align AES.
By accident, this doesn't cause a bug, since 480 = 15*16*2.
Still, it's better to avoid problems in the future.
Closes #41091.
Mike Perry [Thu, 5 Jun 2025 15:12:32 +0000 (15:12 +0000)]
Add ratelimit log for hsdesc pruning during oomkiller