]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Mon, 21 Oct 2024 16:03:54 +0000 (12:03 -0400)]
Revert "Handle empty DNS reply without error as NOERROR"
Closes #40984
This reverts commit
3d2f7c3467e7aff545d8e22ffd4153d7598c6d7c .
David Goulet [Wed, 16 Oct 2024 13:05:34 +0000 (09:05 -0400)]
Merge branch 'maint-0.4.8'
Alexander Hansen Færøy [Wed, 16 Oct 2024 12:35:57 +0000 (12:35 +0000)]
Merge branch 'tor-resolve-bugfix' into 'main'
Create socket with correct family as given by sockshost
See merge request tpo/core/tor!836
Daniel Winzen [Tue, 15 Oct 2024 20:01:13 +0000 (22:01 +0200)]
Add changes file
Roger Dingledine [Tue, 15 Oct 2024 06:54:27 +0000 (02:54 -0400)]
don't build preemptive conflux circuits if no predicted ports
Conflux circuit building was ignoring the "predicted ports" feature,
which aims to make Tor stop building circuits if there have been
no user requests lately. This bug led to every idle Tor on the
network building and discarding circuits every 30 seconds, which
added overall load to the network, used bandwidth and battery from
clients that weren't actively using their Tor, and kept sockets open
on guards which added connection padding essentially forever.
Bug went in on commit
39c2927d when we added preemptive conflux circuit
pools.
Fixes bug 40981; bugfix on 0.4.8.1-alpha.
Daniel Winzen [Sun, 13 Oct 2024 20:32:56 +0000 (22:32 +0200)]
Create socket with correct family as given by sockshost
David Goulet [Thu, 10 Oct 2024 13:57:12 +0000 (13:57 +0000)]
Merge branch 'changelogs' into 'main'
forward-port the 0.4.8.12 changes
See merge request tpo/core/tor!834
David Goulet [Thu, 10 Oct 2024 13:55:57 +0000 (09:55 -0400)]
Merge branch 'maint-0.4.8'
Waldemar Zimpel [Thu, 26 Sep 2024 01:37:19 +0000 (03:37 +0200)]
Fix: Memory leaks in cpuworker on shutdown
Resources allocated by cpuworker weren't being freed on clean shutdown.
This applies for worker threads, worker thread pool, reply queue, reply
event, ...
David Goulet [Thu, 10 Oct 2024 13:24:39 +0000 (09:24 -0400)]
changes: Add file for ticket 40248
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 10 Oct 2024 13:22:23 +0000 (13:22 +0000)]
Merge branch 'empty-dns' into 'main'
Handle empty DNS reply without error as NOERROR
Closes #40248
See merge request tpo/core/tor!830
Roger Dingledine [Tue, 1 Oct 2024 19:17:40 +0000 (15:17 -0400)]
forward-port the 0.4.8.12 changes
David Goulet [Wed, 25 Sep 2024 18:34:43 +0000 (18:34 +0000)]
Merge branch 'fix-unittest' into 'main'
Fix unit test in test_entrynodes.c
See merge request tpo/core/tor!831
Cecylia Bocovich [Tue, 24 Sep 2024 20:13:29 +0000 (16:13 -0400)]
Fix unit test in test_entrynodes.c
Daniel Winzen [Tue, 24 Sep 2024 13:07:59 +0000 (15:07 +0200)]
Handle empty DNS reply without error as NOERROR
David Goulet [Tue, 10 Sep 2024 12:49:51 +0000 (12:49 +0000)]
Merge branch 'typo-socks-proxy' into 'main'
Fix a typo in the HTTP proxy error message.
See merge request tpo/core/tor!829
David Goulet [Tue, 10 Sep 2024 12:46:02 +0000 (08:46 -0400)]
test: Add unit tests for prop351
Signed-off-by: David Goulet <dgoulet@torproject.org>
Pier Angelo Vendrame [Tue, 10 Sep 2024 12:24:46 +0000 (14:24 +0200)]
Fix a typo in the HTTP proxy error message.
Nick Mathewson [Mon, 9 Sep 2024 21:00:50 +0000 (17:00 -0400)]
Implement proposal 351
This proposal adds new syntax to the SOCKS5 username/password extension scheme,
so that requests with usernames starting with <torS0X> are now reserved.
For C tor, all we need to do is reject every username starting with <torS0X>
unless it is exactly "<torS0X>0".
David Goulet [Mon, 5 Aug 2024 19:26:38 +0000 (15:26 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Mon, 5 Aug 2024 15:59:30 +0000 (11:59 -0400)]
dirvote: Fix memleak when computing consensus
Fixes #40966
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jul 2024 14:54:42 +0000 (14:54 +0000)]
Merge branch 'manpage-typos' into 'main'
two small presentation issues in man page
See merge request tpo/core/tor!824
Roger Dingledine [Fri, 12 Jul 2024 21:46:40 +0000 (17:46 -0400)]
two small presentation issues in man page
David Goulet [Thu, 27 Jun 2024 13:34:12 +0000 (13:34 +0000)]
Merge branch 'tap-out-phase-1' into 'main'
Implement phase 1 of Proposal 350 (remove TAP onion keys)
See merge request tpo/core/tor!822
Nick Mathewson [Tue, 25 Jun 2024 12:35:12 +0000 (08:35 -0400)]
Changes file for proposal 350 phase 1
Nick Mathewson [Tue, 25 Jun 2024 13:01:21 +0000 (09:01 -0400)]
Do not publish TAP key when publish-dummy-tap-key is 0.
Nick Mathewson [Mon, 24 Jun 2024 23:53:50 +0000 (19:53 -0400)]
Update supported protovers for prop350
Relay=1 is no longer supported; it corresponds to TAP.
Microdesc=3 and Desc=3 are now supported; they correspond to the ability to
handle (micro)descriptors without TAP onion keys.
Nick Mathewson [Mon, 24 Jun 2024 21:48:42 +0000 (17:48 -0400)]
Add a test for parsing a routerdesc with no TAP key.
Nick Mathewson [Mon, 24 Jun 2024 21:23:20 +0000 (17:23 -0400)]
Add a test for a microdesc with no onion key.
Nick Mathewson [Mon, 24 Jun 2024 20:48:00 +0000 (16:48 -0400)]
Remove a now-unused variable.
Nick Mathewson [Mon, 24 Jun 2024 19:03:15 +0000 (15:03 -0400)]
process_descs: Authorities require TAP keys for now.
Nick Mathewson [Mon, 24 Jun 2024 18:55:27 +0000 (14:55 -0400)]
Routerparse: accept routerdescs without TAP keys.
Nick Mathewson [Mon, 24 Jun 2024 18:40:11 +0000 (14:40 -0400)]
routerparse: Simplify checking for now-mandatory elements
All of these elements are now mandatory, so we can now simplify
our logic for making sure that they are all present or all not-present.
Nick Mathewson [Mon, 24 Jun 2024 18:30:32 +0000 (14:30 -0400)]
Rename "onion_pkey" fields in routerinfo_t, and make them optional.
(Renaming them has forced me to look at every place where they are used, so I
can make sure that they are really optional now.)
Nick Mathewson [Mon, 24 Jun 2024 18:16:11 +0000 (14:16 -0400)]
Remove node_get_rsa_onion_key
Nick Mathewson [Mon, 24 Jun 2024 18:15:04 +0000 (14:15 -0400)]
Remove TAP key from extend_info_t
Nick Mathewson [Mon, 24 Jun 2024 18:04:04 +0000 (14:04 -0400)]
Make onion-key body optional in microdescs
Also, stop storing onion keys in microdesc_t.
(In prop350, for microdescs, we are making the body optional; the "onion-key"
entry is still mandatory, so that we can tell where microdescs begin.)
Nick Mathewson [Mon, 24 Jun 2024 17:54:26 +0000 (13:54 -0400)]
Remove support for deciding to use CREATE/EXTEND/TAP.
Nick Mathewson [Mon, 24 Jun 2024 17:51:54 +0000 (13:51 -0400)]
prop350: Remove all support for TAP, CREATE, and EXTEND.
Nick Mathewson [Mon, 24 Jun 2024 17:29:04 +0000 (13:29 -0400)]
prop350: Stop accepting CREATE and EXTEND.
David Goulet [Tue, 18 Jun 2024 19:19:12 +0000 (15:19 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Tue, 11 Jun 2024 16:38:56 +0000 (12:38 -0400)]
bridge: Always put transport-info line
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alexander Færøy [Fri, 21 Jul 2023 00:53:12 +0000 (02:53 +0200)]
Clean-up Managed Proxy state in PT tests.
This patch makes sure we clean up our version and implementation fields
in our Managed Proxy struct after each test run.
This was detected by LeakSanitizer.
See: tpo/core/tor#11101.
Alexander Færøy [Fri, 21 Jul 2023 00:15:40 +0000 (02:15 +0200)]
Add changes file for tpo/core/tor#11101.
Alexander Færøy [Fri, 21 Jul 2023 00:11:16 +0000 (02:11 +0200)]
Add implementation and version metadata to bridge extra-info.
This patch adds two new keys to bridges' extra-info document:
"transport-version" and "transport-implementation".
These two new values always appear together (if one is missing, the
other one will be missing too) and is parsed from PT's STATUS
TYPE=version messages.
See: tpo/core/tor#11101.
Alexander Færøy [Fri, 21 Jul 2023 00:10:21 +0000 (02:10 +0200)]
Include "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.
Alexander Færøy [Fri, 21 Jul 2023 00:09:33 +0000 (02:09 +0200)]
Drop requirement for TRANSPORT being present in STATUS messages.
Alexander Færøy [Thu, 24 Mar 2022 19:13:41 +0000 (19:13 +0000)]
Add support for PT STATUS TYPE=version messages.
This patch adds support for handling the version status message. Once we
receive such message, we add the given version string to the
managed_proxy_t instance. Note this value can be NULL and the value can
change throughout the lifetime of the PT as multiple status version
messages are handled.
See: tpo/core/tor#11101
David Goulet [Tue, 18 Jun 2024 13:10:19 +0000 (13:10 +0000)]
Merge branch 'sandbox-bwauth' into 'main'
fix sandbox for bandwidth authority
Closes #40933
See merge request tpo/core/tor!821
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)]
fix sandbox for bandwidth authority
David Goulet [Thu, 6 Jun 2024 14:32:07 +0000 (10:32 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Thu, 6 Jun 2024 13:25:52 +0000 (13:25 +0000)]
version: Bump version to 0.4.8.12-dev
David Goulet [Thu, 6 Jun 2024 13:22:20 +0000 (09:22 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Thu, 6 Jun 2024 12:42:04 +0000 (12:42 +0000)]
version: Bump version to 0.4.8.12
David Goulet [Thu, 6 Jun 2024 12:56:54 +0000 (08:56 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Thu, 6 Jun 2024 12:41:13 +0000 (12:41 +0000)]
fallbackdir: Update list generated on June 06, 2024
Tor CI Release [Thu, 6 Jun 2024 12:40:27 +0000 (12:40 +0000)]
Update geoip files to match ipfire location db, 2024/06/06.
David Goulet [Thu, 30 May 2024 16:31:51 +0000 (12:31 -0400)]
Merge branch 'maint-0.4.8'
Georg Koppen [Wed, 8 May 2024 09:34:05 +0000 (09:34 +0000)]
Update OverloadStatistics to match prop 328
Closes: #40940.
David Goulet [Thu, 30 May 2024 16:30:44 +0000 (12:30 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Thu, 30 May 2024 16:30:40 +0000 (12:30 -0400)]
Merge branch 'ticket40689_048_01' into maint-0.4.8
David Goulet [Thu, 30 May 2024 16:29:56 +0000 (16:29 +0000)]
Merge branch 'ticket40689_048_01' into 'main'
dirauth: Add new faravahar
Closes #40689
See merge request tpo/core/tor!819
David Goulet [Thu, 30 May 2024 13:51:52 +0000 (09:51 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Thu, 30 May 2024 13:50:38 +0000 (09:50 -0400)]
scripts: Fix Python3 warnings
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 May 2024 13:09:39 +0000 (09:09 -0400)]
dirauth: Add new faravahar
Brand new address, brand new keys, brand new day.
Closes #40689
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 29 May 2024 16:58:01 +0000 (16:58 +0000)]
Merge branch 'typos' into 'main'
fix a few comment typos
See merge request tpo/core/tor!818
Roger Dingledine [Wed, 29 May 2024 16:45:51 +0000 (12:45 -0400)]
fix a few comment typos
David Goulet [Tue, 30 Apr 2024 19:34:11 +0000 (15:34 -0400)]
Merge branch 'maint-0.4.8'
hiro [Tue, 30 Apr 2024 12:35:16 +0000 (14:35 +0200)]
Fix typo in tor-relays list address
David Goulet [Mon, 29 Apr 2024 20:02:12 +0000 (16:02 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Mon, 29 Apr 2024 20:00:44 +0000 (20:00 +0000)]
Merge branch 'm4-serial-fix' into 'main'
m4: update ax_check_compile_flag.m4 from autoconf-archive
See merge request tpo/core/tor!813
Alexander Færøy [Tue, 23 Apr 2024 17:51:16 +0000 (17:51 +0000)]
Merge branch 'changelogs' into 'main'
forward-port the 0.4.8.10 and .11 changelogs
See merge request tpo/core/tor!814
Roger Dingledine [Fri, 19 Apr 2024 12:18:48 +0000 (08:18 -0400)]
fix changelog typos and clean up a bit
Sam James [Fri, 19 Apr 2024 08:59:19 +0000 (09:59 +0100)]
m4: update ax_check_compile_flag.m4 from autoconf-archive
I noticed this when doing some M4 macro analysis work, and saw
that the version of `ax_check_compile_flag.m4` in Tor has two serial
lines ('serial 5' and 'serial 6') which is invalid.
We could just fix one of the lines, but it makes more sense to just
sync with upstream, I think.
Import ax_check_compile_flag.m4 from autoconf-archive at latest
commit at time of writing (
4e8aab846b0872fba99f1fe02ebcdff178a34c87 ).
Signed-off-by: Sam James <sam@gentoo.org>
David Goulet [Thu, 18 Apr 2024 13:27:15 +0000 (13:27 +0000)]
Merge branch 'typos' into 'main'
Typos
See merge request tpo/core/tor!812
Roger Dingledine [Thu, 18 Apr 2024 13:10:03 +0000 (09:10 -0400)]
forward-port the 0.4.8.10 and .11 changelogs
Roger Dingledine [Thu, 18 Apr 2024 13:04:12 +0000 (09:04 -0400)]
typos in comments
Roger Dingledine [Thu, 18 Apr 2024 13:03:51 +0000 (09:03 -0400)]
fix syntax formatting in man page
David Goulet [Thu, 18 Apr 2024 12:35:09 +0000 (12:35 +0000)]
Merge branch 'typo' into 'main'
typo
See merge request tpo/core/tor!811
trinity-1686a [Wed, 17 Apr 2024 22:17:45 +0000 (00:17 +0200)]
typo
David Goulet [Tue, 16 Apr 2024 15:05:52 +0000 (11:05 -0400)]
circuit: Remove log_warn triggered by a proto violation
Fixes #40932
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 16 Apr 2024 15:20:18 +0000 (15:20 +0000)]
Merge branch 'count-log-bug' into 'main'
also consider LD_BUG logs when counting bug reached
Closes #40924
See merge request tpo/core/tor!805
David Goulet [Mon, 15 Apr 2024 19:11:30 +0000 (15:11 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Mon, 15 Apr 2024 19:11:16 +0000 (15:11 -0400)]
Merge branch 'tor-gitlab/mr/808' into maint-0.4.8
David Goulet [Mon, 15 Apr 2024 18:45:29 +0000 (14:45 -0400)]
conflux: Don't process a closed circuit on get packaged window
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 15 Apr 2024 18:24:45 +0000 (14:24 -0400)]
conflux: Avoid noting a cell was sent on a closed circuit
It turns out that circuit_package_relay_cell() returns 0 in order to drop a
cell but there is a code path, if the circuit queue is full, that also silently
closes the circuit and returns 0.
This lead to Conflux thinking a cell was sent but actually the cell was not and
the circuit was closed leading to the hard assert.
And so this function makes sure that circuit_package_relay_cell() and
append_cell_to_circuit_queue() returns a value that indicate what happened with
the cell and circuit so the caller can make an informed decision with it.
This change makes it that we do NOT enter the Conflux subsystem if the cell is
not queued on the circuit.
Fixes #40921
Signed-off-by: David Goulet <dgoulet@torproject.org>
trinity-1686a [Sun, 14 Apr 2024 12:58:58 +0000 (14:58 +0200)]
rename metric bug_reached to bug_reached_count
trinity-1686a [Sat, 13 Apr 2024 20:15:09 +0000 (22:15 +0200)]
also consider LD_BUG logs when counting bug reached
David Goulet [Wed, 10 Apr 2024 19:48:02 +0000 (15:48 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Wed, 10 Apr 2024 17:10:15 +0000 (17:10 +0000)]
version: Bump version to 0.4.8.11-dev
David Goulet [Wed, 10 Apr 2024 17:06:15 +0000 (13:06 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Wed, 10 Apr 2024 16:54:58 +0000 (16:54 +0000)]
version: Bump version to 0.4.8.11
David Goulet [Wed, 10 Apr 2024 16:59:04 +0000 (12:59 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Wed, 10 Apr 2024 16:54:12 +0000 (16:54 +0000)]
fallbackdir: Update list generated on April 10, 2024
Tor CI Release [Wed, 10 Apr 2024 16:53:43 +0000 (16:53 +0000)]
Update geoip files to match ipfire location db, 2024/04/10.
David Goulet [Tue, 9 Apr 2024 13:23:47 +0000 (09:23 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Mon, 8 Apr 2024 14:33:54 +0000 (10:33 -0400)]
dirauth: New keys and address for tor26
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 20 Mar 2024 13:23:24 +0000 (09:23 -0400)]
test: Disable unit test causing issue with nightly package
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 14 Mar 2024 17:41:54 +0000 (17:41 +0000)]
Merge branch 'testing-intro-rot' into 'main'
hs_service: don't force high intro point rotation for TestingTorNetwork
Closes #40922
See merge request tpo/core/tor!802
Jim Newsome [Tue, 12 Mar 2024 14:16:47 +0000 (09:16 -0500)]
hs_service: don't force high intro point rotation for TestingTorNetwork
This was previously added to facilitate testing intro point rotation
with chutney. However, the implementation is problematic since it forces
excessive rotation whenever TestingTorNetwork is enabled, and can't be
adjusted or disabled.
Alternatives for testing intro point rotation include:
* Using shadow to "fast forward" time
* Overriding the consensus parameters hs_intro_min_lifetime and
hs_intro_max_lifetime.
Fixes #40922