]>
git.ipfire.org Git - thirdparty/tor.git/log
Steven Engler [Tue, 30 Sep 2025 18:14:53 +0000 (14:14 -0400)]
maint: fix formatting of changes file (v2)
Steven Engler [Tue, 30 Sep 2025 14:45:23 +0000 (10:45 -0400)]
flow-ctrl: fix line length warnings
Steven Engler [Tue, 30 Sep 2025 14:41:51 +0000 (10:41 -0400)]
maint: fix formatting of changes file
Steven Engler [Tue, 30 Sep 2025 01:59:39 +0000 (21:59 -0400)]
flow-ctrl: improve log line
Steven Engler [Tue, 30 Sep 2025 01:57:57 +0000 (21:57 -0400)]
flow-ctrl: add XOFF grace period
This is meant to reduce the number of XOFF sent, especially on conflux
circuits.
Steven Engler [Tue, 30 Sep 2025 01:54:06 +0000 (21:54 -0400)]
flow-ctrl: indentation-only change
This is an intermediate commit to hopefully make reviewing easier. Adds
indentation and a `{}` scope.
Tor CI Release [Tue, 16 Sep 2025 15:45:24 +0000 (15:45 +0000)]
version: Bump version to 0.4.8.18-dev
Tor CI Release [Tue, 16 Sep 2025 14:36:42 +0000 (14:36 +0000)]
version: Bump version to 0.4.8.18
Tor CI Release [Tue, 16 Sep 2025 14:35:56 +0000 (14:35 +0000)]
fallbackdir: Update list generated on September 16, 2025
Tor CI Release [Tue, 16 Sep 2025 14:34:41 +0000 (14:34 +0000)]
Update geoip files to match ipfire location db, 2025/09/16.
Alex Xu (Hello71) [Mon, 15 Sep 2025 23:39:08 +0000 (19:39 -0400)]
Fix test_parseconf on MaxHSDirCacheBytes default
Change the logic to evaluate the default when fetching the value, matching
other default options like ExtORPortCookieAuthFile.
David Goulet [Tue, 16 Sep 2025 12:58:22 +0000 (08:58 -0400)]
Merge branch 'tor-gitlab/mr/927' into maint-0.4.8
David Goulet [Mon, 15 Sep 2025 15:05:56 +0000 (11:05 -0400)]
circ: Free conflux pending nonce if nonce is untracked
This can happen if we loose track of the nonce and a circuit with it is
repurposed.
Without this, it would lead to a non fatal assert on a control port circuit
event of puporse change.
Related to #41037
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Sep 2025 17:53:59 +0000 (13:53 -0400)]
config: Fix wide comment
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 10 Sep 2025 17:51:19 +0000 (13:51 -0400)]
Merge remote-tracking branch 'mikeperry-private/ticket41006_copilot_piecewise' into maint-0.4.8
David Goulet [Wed, 10 Sep 2025 17:11:10 +0000 (13:11 -0400)]
Merge branch 'tor-gitlab/mr/917' into maint-0.4.8
Waldemar Zimpel [Sun, 24 Aug 2025 19:10:34 +0000 (21:10 +0200)]
Make thread control POSIX compliant
Closes issue #41109
Waldemar Zimpel [Wed, 27 Aug 2025 23:24:50 +0000 (01:24 +0200)]
Preparation of `tor_sleep_msec()`
- Update `tor_sleep_msec()` with `nanosleep()` function
- Make `tor_sleep_msec()` available outside of unit tests
David Goulet [Wed, 27 Aug 2025 18:01:19 +0000 (14:01 -0400)]
Revert "Make thread control POSIX compliant"
This reverts commit
bd461eb92048d7dd13ba25dbdafb1fd5440c071c .
Waldemar Zimpel [Sun, 24 Aug 2025 19:10:34 +0000 (21:10 +0200)]
Make thread control POSIX compliant
Closes issue #41109
Waldemar Zimpel [Thu, 14 Aug 2025 21:41:27 +0000 (23:41 +0200)]
Logging / Compression
Add compression factor to the "Detected possible compression bomb ..."
warning.
David Goulet [Thu, 7 Aug 2025 18:20:02 +0000 (14:20 -0400)]
changes: Add file for padding log fix
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 7 Aug 2025 18:12:09 +0000 (14:12 -0400)]
Merge branch 'tor-gitlab/mr/908' into maint-0.4.8
Waldemar Zimpel [Tue, 8 Jul 2025 18:52:49 +0000 (20:52 +0200)]
Fix: "Bug: Duplicate call to circuit_mark_for_close()"
Second attempt
Closes issues #41106, #40951
David Goulet [Tue, 1 Jul 2025 12:19:36 +0000 (08:19 -0400)]
geoip: Fix Rust clippy warning
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Mon, 30 Jun 2025 14:11:34 +0000 (14:11 +0000)]
version: Bump version to 0.4.8.17-dev
Tor CI Release [Mon, 30 Jun 2025 13:14:59 +0000 (13:14 +0000)]
version: Bump version to 0.4.8.17
Tor CI Release [Mon, 30 Jun 2025 13:14:10 +0000 (13:14 +0000)]
fallbackdir: Update list generated on June 30, 2025
Tor CI Release [Mon, 30 Jun 2025 13:13:13 +0000 (13:13 +0000)]
Update geoip files to match ipfire location db, 2025/06/30.
ValdikSS [Thu, 26 Jun 2025 14:24:28 +0000 (10:24 -0400)]
tls: Set TLSv1.3 ciphers to preserve ciphersuites order
This commit fixes two issues:
1. ciphers.inc has TLSv1.3 ciphers prefixed with "TXT", while current version
has "RFC". TLS1_3_RFC_AES_128_GCM_SHA256 should be instead of
TLS1_3_TXT_AES_128_GCM_SHA256, in both define and CIPHER() macro.
2. Tor calls only SSL_set_cipher_list() in tlstls_openssl.c, this sets only
TLSv1.2 ciphers, while TLSv1.3 ciphers stay in default state. TLSv1.3
ciphersuites are set with SSL_set_ciphersuites(), but the list require to
contain only TLSv1.3 suites (no v1.2).
Contrary to SSL_set_cipher_list(), TLSv1.3 SSL_set_ciphersuites() does NOT
accept finalizing :, so it should be stripped out.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Waldemar Zimpel [Mon, 9 Jun 2025 12:07:33 +0000 (14:07 +0200)]
Logging / Channel padding delay
Reduce the amount of messages being logged related to
channel padding delay when log level is "notice".
Log the channel padding delay as "info" as soon as the
delay occurs. Log "notice" on each heartbeat only
containing the average channel padding delay and the
amount of delays (that exceeded the allowed time window)
occurring between heartbeats or, if first heartbeat
since startup, between startup and heartbeat.
David Goulet [Thu, 12 Jun 2025 15:57:27 +0000 (11:57 -0400)]
Merge branch 'tor-gitlab/mr/910' into maint-0.4.8
Waldemar Zimpel [Sun, 8 Jun 2025 12:20:48 +0000 (14:20 +0200)]
Unix processes / Obtain exit status code
The actual way for obtaining the exit code
of an exited child process
David Goulet [Mon, 9 Jun 2025 13:50:10 +0000 (09:50 -0400)]
Merge branch 'tor-gitlab/mr/903' into maint-0.4.8
Waldemar Zimpel [Sun, 1 Jun 2025 12:43:03 +0000 (14:43 +0200)]
Fix: "Bug: Duplicate call to circuit_mark_for_close()"
Closes issue #40951
Roger Dingledine [Mon, 9 Jun 2025 01:50:36 +0000 (21:50 -0400)]
log "list of supported TLS groups" only once
We had been logging it every two hours forever, even though it's based
on the version of OpenSSL we're using it so it will never change.
Fixes bug #41093.
The fix is an improvement on commit
ba88ad6b which addressed #41058.
Not adding a changes file since those commits haven't gone out in a
release yet either.
Mike Perry [Thu, 5 Jun 2025 15:12:32 +0000 (15:12 +0000)]
Add ratelimit log for hsdesc pruning during oomkiller
Mike Perry [Thu, 5 Jun 2025 01:08:08 +0000 (01:08 +0000)]
Changes file
Mike Perry [Thu, 5 Jun 2025 01:02:01 +0000 (01:02 +0000)]
Add manpage entry for MaxHSDirCacheBytes.
Mike Perry [Tue, 3 Jun 2025 19:57:07 +0000 (19:57 +0000)]
Persist n_downloaded counter for lifetime of HS key.
Mike Perry [Tue, 3 Jun 2025 19:44:21 +0000 (19:44 +0000)]
Add check of MaxHSDirCacheBytes every hsdesc upload
Mike Perry [Tue, 3 Jun 2025 19:32:38 +0000 (19:32 +0000)]
Add a new hsdir max bytes config
David Goulet [Wed, 21 May 2025 13:29:30 +0000 (09:29 -0400)]
Merge branch 'tor-gitlab/mr/894' into maint-0.4.8
Nick Mathewson [Mon, 19 May 2025 01:52:36 +0000 (21:52 -0400)]
Make an exception to one of the NONSTRINGs
Older GCCs accept the attribute but don't believe it can appear
before an array.
Nick Mathewson [Mon, 19 May 2025 01:12:30 +0000 (21:12 -0400)]
Add a changes file for 41079.
Nick Mathewson [Mon, 19 May 2025 01:11:00 +0000 (21:11 -0400)]
Fix a new GCC warning about strings.
When we say something like
```
const char foo[3] = "foo";
```
GCC now complains, because there is no space for the terminating NUL.
But we use this construction in a lot of places in our tests to
initialize test digests, keys, and so on. So to resolve the issue,
we have to mark these strings with a new attribute.
Nick Mathewson [Mon, 19 May 2025 00:54:08 +0000 (20:54 -0400)]
Convince gcc that we will not access an array out of bounds
Nick Mathewson [Mon, 12 May 2025 12:44:44 +0000 (08:44 -0400)]
reindent code from previous commit
Nick Mathewson [Mon, 12 May 2025 12:27:34 +0000 (08:27 -0400)]
Allow pow-params to appear multiple times.
Relatedly, we only require that a pow-params line has _1_ argument
(since future versions might have nothing but a scheme).
See torspec#272 for discussion;
also see proposal 356 for why the fingerprinting opportunity here
isn't a big deal.
We probably shouldn't merge this until torspec!390 is in,
just in case we decide _not_ to take this approach.
(I haven't reindented some code here yet, to make the diff easier to read.)
orbea [Thu, 31 Aug 2023 21:35:52 +0000 (14:35 -0700)]
crypt_openssl_mgt: define DISABLE_ENGINES after OPENSSL_NO_ENGINE
With LibreSSL-3.8.1 these engines are no long available causing a build
failure, but LibreSSL correctly defines OPENSSL_NO_ENGINE as part of its
opensslfeatures.h. However Tor includes crypto_openssl_mgt.h before any
of the openssl includes which would define OPENSSL_NO_ENGINE and then
fails to define DISABLE_ENGINES.
As the define is used in only a single .c file it is best to move it
there.
Signed-off-by: orbea <orbea@riseup.net>
orbea [Wed, 30 Apr 2025 18:47:13 +0000 (11:47 -0700)]
compat_openssl: fix for LibreSSL 4.1.0
Starting with LibreSSL 4.1.0 this now causes a build failure:
src/lib/tls/tortls_openssl.c: In function 'tor_tls_setup_session_secret_cb':
src/lib/tls/tortls_openssl.c:1059:39: error: passing argument 2 of 'SSL_set_session_secret_cb' from incompatible pointer type [-Wincompatible-pointer-types]
1059 | SSL_set_session_secret_cb(tls->ssl, tor_tls_session_secret_cb, NULL);
| ^~~~~~~~~~~~~~~~~~~~~~~~~
| |
| int (*)(SSL *, void *, int *, struct stack_st_SSL_CIPHER *, SSL_CIPHER **, void *) {aka int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, struct ssl_cipher_st **, void *)}
In file included from src/lib/tls/tortls_openssl.c:48:
/usr/include/openssl/ssl.h:1489:30: note: expected 'tls_session_secret_cb_fn' {aka 'int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, const struct ssl_cipher_st **, void *)'} but argument is of type 'int (*)(SSL *, void *, int *, struct stack_st_SSL_CIPHER *, SSL_CIPHER **, void *)' {aka 'int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, struct ssl_cipher_st **, void *)'}
1489 | tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
| ~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~
Signed-off-by: orbea <orbea@riseup.net>
Nick Mathewson [Wed, 23 Apr 2025 18:11:39 +0000 (14:11 -0400)]
Promote "list of supported groups" message to notice.
I have a feeling that this might help diagnosing
any other problems similar to #41058.
Nick Mathewson [Wed, 23 Apr 2025 18:10:43 +0000 (14:10 -0400)]
Only try more complex OpenSSL group list syntax with OpenSSL 3.5.
Closes #41058.
Nick Mathewson [Wed, 23 Apr 2025 13:13:04 +0000 (09:13 -0400)]
TLS: When possible, enable ML-KEM768.
Closes ticket 41041.
Nick Mathewson [Wed, 23 Apr 2025 12:46:17 +0000 (08:46 -0400)]
Correctly detect error from SSL_CTX_set1_groups_list.
Previously our code was checking for '< 0', but the error return value for
this function _is_ zero.
Nick Mathewson [Wed, 23 Apr 2025 12:38:05 +0000 (08:38 -0400)]
Remove TOR_TLS_USE_ECDHE_P* flags.
They have been unused since 0.3.1.1-alpha, when we removed the
TLSECGroups option.
Sebastian Hahn [Thu, 1 Feb 2024 18:45:04 +0000 (19:45 +0100)]
Make two 1-bit fields unsigned
This should be a completely harmless warning as we only check whether
the fields are true or false.
Closes #40911.
(Backported by nickm so that I can compile 0.4.8 without warnings.)
Waldemar Zimpel [Thu, 27 Mar 2025 22:15:05 +0000 (23:15 +0100)]
Fix: Crash on SIGSEGV if at least one worker thread cannot be launched
Perform a clean shutdown in case worker threads cannot be lauched.
David Goulet [Thu, 27 Mar 2025 19:56:02 +0000 (15:56 -0400)]
Merge branch 'tor-gitlab/mr/874' into maint-0.4.8
David Goulet [Thu, 27 Mar 2025 14:29:11 +0000 (14:29 +0000)]
Merge branch 'fix/memleaks-cpuworker' into 'maint-0.4.8'
Re: Coverity report Oct 31st, 2024 (Issue #40991)
See merge request tpo/core/tor!844
excurso [Thu, 27 Mar 2025 14:29:11 +0000 (14:29 +0000)]
Re: Coverity report Oct 31st, 2024 (Issue #40991)
David Goulet [Thu, 27 Mar 2025 12:49:40 +0000 (08:49 -0400)]
conflux: Avoid non fatal assert in CIRCUIT_IS_CONFLUX()
In the circuit_about_to_free(), we clear the circ->conflux object and then we
end up trying to emit an event on the control port which calls
CIRCUIT_IS_CONFLUX() and non fatal assert on the false branch.
Fixes #41037
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Tue, 25 Mar 2025 19:13:31 +0000 (15:13 -0400)]
Require FlowCtrl=1 (authenticated sendmes) for clients
This will cause clients before 0.4.1.1-alpha to shut down.
Part of #40836.
Nick Mathewson [Tue, 25 Mar 2025 19:06:12 +0000 (15:06 -0400)]
protover: Vote for additional protocols to be required/recommended
Note that the changes here will require all relays
to be 0.4.7.4-alpha or later, which is lower than
our current lowest-supported relay version.
Part of #40836.
Roger Dingledine [Tue, 25 Mar 2025 15:22:24 +0000 (11:22 -0400)]
fix two comment typos from 0.4.8.15
Tor CI Release [Mon, 24 Mar 2025 15:25:59 +0000 (15:25 +0000)]
version: Bump version to 0.4.8.16-dev
Tor CI Release [Mon, 24 Mar 2025 15:11:11 +0000 (15:11 +0000)]
version: Bump version to 0.4.8.16
Tor CI Release [Mon, 24 Mar 2025 15:09:47 +0000 (15:09 +0000)]
Update geoip files to match ipfire location db, 2025/03/24.
David Goulet [Mon, 24 Mar 2025 13:09:38 +0000 (09:09 -0400)]
dirauth: Fix typo in flag relay assignment token
Unfortunately, we wanted to be able to control the Guard flag here but the
token used mentionned "exit" instead.
Oh well, s*** happens :).
Fixes #41035
Signed-off-by: David Goulet <dgoulet@torproject.org>
Tor CI Release [Thu, 20 Mar 2025 15:06:00 +0000 (15:06 +0000)]
version: Bump version to 0.4.8.15-dev
Tor CI Release [Thu, 20 Mar 2025 14:43:55 +0000 (14:43 +0000)]
version: Bump version to 0.4.8.15
Tor CI Release [Thu, 20 Mar 2025 14:40:50 +0000 (14:40 +0000)]
fallbackdir: Update list generated on March 20, 2025
Tor CI Release [Thu, 20 Mar 2025 14:39:57 +0000 (14:39 +0000)]
Update geoip files to match ipfire location db, 2025/03/20.
Mike Perry [Wed, 19 Mar 2025 00:05:43 +0000 (00:05 +0000)]
Bug 41023 changes file
David Goulet [Tue, 11 Mar 2025 16:00:22 +0000 (12:00 -0400)]
hs: Never pick a MiddleOnly node for HS circuit purposes
Related to #41023
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Mar 2025 14:54:51 +0000 (10:54 -0400)]
hs: Remove HSv3 rendezvous circuit flag used for node selection
This was put in when HSv2 and v3 were co-existing. Now, the network requires
HSRend=2 which is v3 by default.
This is a simple cleanup of an internal flag used to identify a launch of a
RPv3 circuit.
Related to #41023
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Perry [Thu, 13 Mar 2025 20:00:03 +0000 (20:00 +0000)]
Provide dirauth ability to strip specific flags.
Alexander Hansen Færøy [Tue, 18 Mar 2025 15:23:00 +0000 (16:23 +0100)]
CI: Add changes file related to 41029.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:47:53 +0000 (14:47 +0100)]
CI: Enable venv before running ci-driver.sh for Chutney.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:29:11 +0000 (14:29 +0100)]
CI: Install python3-venv.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:25:41 +0000 (14:25 +0100)]
CI: Use local pip instead of python3-pip.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:22:35 +0000 (14:22 +0100)]
CI: Disable redundant-decls warnings for NSS in crypto_nss_mgt.c.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:37:39 +0000 (13:37 +0100)]
CI: Install libclang-rt-dev when build with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:33:23 +0000 (13:33 +0100)]
CI: Install libubsan1 when building with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:26:50 +0000 (13:26 +0100)]
CI: Use bookworm instead of bullseye.
Jim Newsome [Wed, 30 Oct 2024 15:34:58 +0000 (10:34 -0500)]
CI: use a fixed version of chutney
While chutney currently runs tor's chutney test in its own CI,
it's difficult to guarantee the two won't accidentally diverge.
Probably best to use a fixed version here so that we can control
chutney version bumps and avoid surprise breakage in tor's CI.
This will also free us to intentionally make breaking changes in
chutney (though I don't have any immediate plans for any).
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:17:28 +0000 (13:17 +0100)]
CI: Remove physical tags from gitlab-ci runner requirements.
David Goulet [Tue, 11 Mar 2025 14:21:03 +0000 (10:21 -0400)]
scripts: Remove 0.4.7 from list tor branches
Not maintained anymore.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)]
fix sandbox for bandwidth authority
Mike Perry [Thu, 21 Nov 2024 17:09:39 +0000 (17:09 +0000)]
Ticket 40872: Changes file
Mike Perry [Thu, 21 Nov 2024 17:08:19 +0000 (17:08 +0000)]
Ticket 40872: Output conflux nonce and circ rtt to control port
Mike Perry [Thu, 21 Nov 2024 17:06:26 +0000 (17:06 +0000)]
Ticket 40872: Add conflux helper functions for control port info
Tor CI Release [Wed, 5 Feb 2025 14:33:19 +0000 (14:33 +0000)]
version: Bump version to 0.4.8.14-dev
Tor CI Release [Wed, 5 Feb 2025 14:22:05 +0000 (14:22 +0000)]
version: Bump version to 0.4.8.14
Tor CI Release [Wed, 5 Feb 2025 14:21:16 +0000 (14:21 +0000)]
fallbackdir: Update list generated on February 05, 2025
Tor CI Release [Wed, 5 Feb 2025 14:20:40 +0000 (14:20 +0000)]
Update geoip files to match ipfire location db, 2025/02/05.
David Goulet [Tue, 28 Jan 2025 18:44:11 +0000 (13:44 -0500)]
hs: Make Windows CI 32bit happy
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 28 Jan 2025 18:27:14 +0000 (13:27 -0500)]
hashx: Move Windows function within another ifdef
Function only used within the hugepage ifdef for Windows so move it there so we
avoid a unused function warning on our Windows CI:
src/ext/equix/hashx/src/virtual_memory.c:30:13: error: 'set_privilege' defined but not used [-Werror=unused-function]
30 | static bool set_privilege(const char* pszPrivilege, BOOL bEnable) {
| ^~~~~~~~~~~~~
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 22 Jan 2025 13:59:03 +0000 (08:59 -0500)]
scripts: Fix rust clippy warning
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 18 Dec 2024 16:31:03 +0000 (11:31 -0500)]
changes: Add file for ticket 40996
Part of #40996
Signed-off-by: David Goulet <dgoulet@torproject.org>