]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Thu, 20 Mar 2025 13:53:16 +0000 (09:53 -0400)]
Merge branch 'maint-0.4.8'
Mike Perry [Wed, 19 Mar 2025 00:05:43 +0000 (00:05 +0000)]
Bug 41023 changes file
David Goulet [Tue, 11 Mar 2025 16:00:22 +0000 (12:00 -0400)]
hs: Never pick a MiddleOnly node for HS circuit purposes
Related to #41023
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Mar 2025 14:54:51 +0000 (10:54 -0400)]
hs: Remove HSv3 rendezvous circuit flag used for node selection
This was put in when HSv2 and v3 were co-existing. Now, the network requires
HSRend=2 which is v3 by default.
This is a simple cleanup of an internal flag used to identify a launch of a
RPv3 circuit.
Related to #41023
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Perry [Thu, 13 Mar 2025 20:00:03 +0000 (20:00 +0000)]
Provide dirauth ability to strip specific flags.
David Goulet [Wed, 19 Mar 2025 18:42:11 +0000 (14:42 -0400)]
Merge branch 'maint-0.4.8'
Alexander Hansen Færøy [Tue, 18 Mar 2025 15:23:00 +0000 (16:23 +0100)]
CI: Add changes file related to 41029.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:47:53 +0000 (14:47 +0100)]
CI: Enable venv before running ci-driver.sh for Chutney.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:29:11 +0000 (14:29 +0100)]
CI: Install python3-venv.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:25:41 +0000 (14:25 +0100)]
CI: Use local pip instead of python3-pip.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:22:35 +0000 (14:22 +0100)]
CI: Disable redundant-decls warnings for NSS in crypto_nss_mgt.c.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:37:39 +0000 (13:37 +0100)]
CI: Install libclang-rt-dev when build with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:33:23 +0000 (13:33 +0100)]
CI: Install libubsan1 when building with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:26:50 +0000 (13:26 +0100)]
CI: Use bookworm instead of bullseye.
Jim Newsome [Wed, 30 Oct 2024 15:34:58 +0000 (10:34 -0500)]
CI: use a fixed version of chutney
While chutney currently runs tor's chutney test in its own CI,
it's difficult to guarantee the two won't accidentally diverge.
Probably best to use a fixed version here so that we can control
chutney version bumps and avoid surprise breakage in tor's CI.
This will also free us to intentionally make breaking changes in
chutney (though I don't have any immediate plans for any).
David Goulet [Wed, 19 Mar 2025 18:08:55 +0000 (18:08 +0000)]
Merge branch 'repair-disable-relay' into 'main'
Fix compilation with --disable-module-relay
Closes #41032
See merge request tpo/core/tor!866
Nick Mathewson [Wed, 19 Mar 2025 17:40:46 +0000 (13:40 -0400)]
Fix compilation with --disable-relay-mode.
Broken with my happy-family-sandbox patch;
bug not in any released Tor.
Nick Mathewson [Wed, 19 Mar 2025 17:39:54 +0000 (13:39 -0400)]
Fix a compilation warning in networkstatus.c
I have no idea why this just showed up for me.
I guess it has something to do with GCC, but I'm not sure.
Closes #41032.
Nick Mathewson [Wed, 19 Mar 2025 16:37:06 +0000 (16:37 +0000)]
Merge branch 'happy-sandbox' into 'main'
Make sandbox work with family id keys.
Closes #41022
See merge request tpo/core/tor!864
Nick Mathewson [Wed, 19 Mar 2025 16:36:49 +0000 (16:36 +0000)]
Merge branch 'too_many_tlssecrets' into 'main'
Remove RSA-SHA256-TLSSecrets link authentication
Closes #41020 and #41021
See merge request tpo/core/tor!862
Nick Mathewson [Mon, 17 Mar 2025 14:41:25 +0000 (10:41 -0400)]
Changes file for removing RSA-SHA256-TLSSecret.
Closes #41020.
Nick Mathewson [Mon, 17 Mar 2025 14:02:21 +0000 (10:02 -0400)]
Trunnel: remove support for pre-
ed25519 auth.
This involves a more-than-usual bit of code churn in the generated C,
since the context argument is now gone.
Nick Mathewson [Mon, 17 Mar 2025 13:56:55 +0000 (09:56 -0400)]
Remove support for RSA client auth key (KP_legacy_linkauth_rsa)
Nick Mathewson [Mon, 17 Mar 2025 13:54:58 +0000 (09:54 -0400)]
Remove now-needless RSA key argument for AUTHENTICATE body
Nick Mathewson [Mon, 17 Mar 2025 13:43:27 +0000 (09:43 -0400)]
Remove higher-level RSA-SHA256-TLSSecret code.
This is all unreachable now, so we can tear it out
and simplify things a bit.
Nick Mathewson [Mon, 17 Mar 2025 13:38:06 +0000 (09:38 -0400)]
Remove more tests for case where rsa-tlssecrets is supported.
Nick Mathewson [Mon, 17 Mar 2025 13:33:41 +0000 (09:33 -0400)]
Never claim to have LinkAuth=1
Nick Mathewson [Mon, 17 Mar 2025 13:32:55 +0000 (09:32 -0400)]
AUTHTYPE_RSA_SHA256_TLSSECRET is never supported.
Nick Mathewson [Mon, 17 Mar 2025 13:31:30 +0000 (09:31 -0400)]
Adapt authchallenge tests to always use
ed25519 +rfc5709 auth
Previously they used RSA+TlsSecret auth, but that's about
to go away even more.
David Goulet [Tue, 18 Mar 2025 13:05:26 +0000 (09:05 -0400)]
Merge branch 'maint-0.4.8'
Nick Mathewson [Tue, 18 Mar 2025 12:41:49 +0000 (08:41 -0400)]
Make sandbox work with family id keys.
Closes #41022.
Bug not in any released version of Tor.
Nick Mathewson [Tue, 18 Mar 2025 12:29:34 +0000 (08:29 -0400)]
Make a function to list the family key files.
(The sandbox code will need this.)
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:17:28 +0000 (13:17 +0100)]
CI: Remove physical tags from gitlab-ci runner requirements.
Nick Mathewson [Thu, 13 Mar 2025 15:37:15 +0000 (11:37 -0400)]
Remove support for "tlssecrets" exporting
Before we could rely on RFC5705 key material exporters,
we did a fairly hinky thing involving the client random,
the server random, and the master secret. These fields
are all opaque in sensible TLS libraries,
and the master secret is quite sensitive.
Therefore, we're removing them.
Some code still refers to them, but it does so behind
a `define(HAVE_WORKING_TOR_TLS_GET_TLSSECRETS)` check,
which macro is now never defined.
Part of #41020.
Nick Mathewson [Mon, 17 Mar 2025 13:20:48 +0000 (09:20 -0400)]
Remove tests for RSA-SHA256-TLSSecret
(Actually, most of them can remain: we just convert them
to test
Ed25519 +RFC5709 authentication instead.)
David Goulet [Tue, 11 Mar 2025 14:21:17 +0000 (10:21 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Tue, 11 Mar 2025 14:21:03 +0000 (10:21 -0400)]
scripts: Remove 0.4.7 from list tor branches
Not maintained anymore.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Fri, 7 Mar 2025 01:09:44 +0000 (01:09 +0000)]
Merge branch 'happy-families' into 'main'
Implement proposal 321 (happy families)
Closes #41009
See merge request tpo/core/tor!857
Nick Mathewson [Tue, 25 Feb 2025 17:17:28 +0000 (12:17 -0500)]
Document that --keygen-family overwrites
Nick Mathewson [Tue, 25 Feb 2025 17:16:57 +0000 (12:16 -0500)]
Make --keygen-family save a key ID file too.
(Requested by @nusenu)
Nick Mathewson [Fri, 21 Feb 2025 15:12:56 +0000 (10:12 -0500)]
Fill in URL for FamilyId support.
Nick Mathewson [Tue, 18 Feb 2025 14:53:59 +0000 (09:53 -0500)]
Update interface for happy families
I'm hoping that this design will be a bit more ergonomic
than my first idea; the improvement here is that you have to list the family
IDs you expect in your torrc. This way, there's a cross-check between the
actual keys we use and your configuration for them.
Nick Mathewson [Fri, 14 Feb 2025 00:44:33 +0000 (19:44 -0500)]
Fix compilation with --disable-module-relay
Nick Mathewson [Thu, 13 Feb 2025 16:44:38 +0000 (11:44 -0500)]
Add a changes file for happy families.
It's kind of long, but I think we might want to explain this stuff?
Maybe we can cut it down.
Nick Mathewson [Thu, 13 Feb 2025 16:38:43 +0000 (11:38 -0500)]
Document new options for happy families.
Nick Mathewson [Thu, 13 Feb 2025 16:29:24 +0000 (11:29 -0500)]
Add --keygen-family support.
Nick Mathewson [Thu, 13 Feb 2025 15:43:45 +0000 (10:43 -0500)]
Happy families: finish implementing relay side.
Nick Mathewson [Wed, 12 Feb 2025 19:49:35 +0000 (14:49 -0500)]
Dirauth: generate microdescs with family-ids.
Nick Mathewson [Thu, 13 Feb 2025 14:00:32 +0000 (09:00 -0500)]
Add protover for prop321 (happy families) support
Nick Mathewson [Tue, 11 Feb 2025 14:04:53 +0000 (09:04 -0500)]
nodelist: Additionally use family IDs to decide family membership.
This implements the client side of happy families.
Nick Mathewson [Tue, 11 Feb 2025 13:50:13 +0000 (08:50 -0500)]
nodelist: Rename functions that look at the family list.
We want to be really careful to make it clear that the family-list
is not the same as the family itself.
Nick Mathewson [Tue, 11 Feb 2025 13:44:22 +0000 (08:44 -0500)]
Cache values of use_family_{keys,lists} params.
Nick Mathewson [Tue, 11 Feb 2025 13:30:02 +0000 (08:30 -0500)]
Parse and validate family-certs in routerdescs
Nick Mathewson [Tue, 11 Feb 2025 16:47:59 +0000 (11:47 -0500)]
Add internal support for publishing family-certs
This will eventually be used by relays, but for now it's only going to get used
for round-trip testing.
Nick Mathewson [Mon, 10 Feb 2025 21:42:52 +0000 (16:42 -0500)]
Parse microdesc family-ids lines.
Nick Mathewson [Mon, 10 Feb 2025 21:38:45 +0000 (16:38 -0500)]
Add "family_ids" fields to routerinfo and microdescs.
Nick Mathewson [Tue, 11 Feb 2025 16:49:51 +0000 (11:49 -0500)]
Add definition for family cert type
Nick Mathewson [Thu, 6 Mar 2025 13:47:55 +0000 (08:47 -0500)]
Stop using time(NULL) for certificate tests.
The canned testing certificates added in order to fix #41041
will start to expire in a couple of months;
to avoid a test failure then, we should only validate
them against a time when they are valid.
Previously, we got away with using time(NULL) because the old
canned certificate (taken from testing.torproject.org)
was not only signed using SHA-1: it was valid until 2043!
Nick Mathewson [Thu, 6 Mar 2025 13:36:00 +0000 (08:36 -0500)]
Fix test failures with openssl security level >= 1
When OpenSSL compiled to run at security level >= 1,
certificates signed using SHA-1 aren't allowed.
We don't generate or use any such certificates in our regular protocol,
but we had a few in our tests.
This commit replaces those certs with the current certs
from www.torproject.org.
Closes #41021. Bugfix on 0.2.8.1 when the tests were introduced.
David Goulet [Mon, 3 Mar 2025 18:18:32 +0000 (13:18 -0500)]
Merge branch 'maint-0.4.8'
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)]
fix sandbox for bandwidth authority
David Goulet [Mon, 3 Mar 2025 17:40:02 +0000 (12:40 -0500)]
Merge branch 'maint-0.4.8'
Mike Perry [Thu, 21 Nov 2024 17:09:39 +0000 (17:09 +0000)]
Ticket 40872: Changes file
Mike Perry [Thu, 21 Nov 2024 17:08:19 +0000 (17:08 +0000)]
Ticket 40872: Output conflux nonce and circ rtt to control port
Mike Perry [Thu, 21 Nov 2024 17:06:26 +0000 (17:06 +0000)]
Ticket 40872: Add conflux helper functions for control port info
David Goulet [Mon, 3 Mar 2025 13:46:56 +0000 (13:46 +0000)]
Merge branch 'floating-point-fuzzing' into 'main'
float-divide-by-zero set in libfuzzer
Closes #24745
See merge request tpo/core/tor!859
David Goulet [Mon, 3 Mar 2025 13:19:11 +0000 (13:19 +0000)]
Merge branch 'settings_distribution' into 'main'
relay: add settings distribution setting and remove moat
See merge request tpo/core/tor!860
meskio [Tue, 25 Feb 2025 15:07:50 +0000 (16:07 +0100)]
relay: add settings distribution setting and remove moat
moat is being deprecated and replaced by settings. Let's not give a
warning if 'settings' is set but do if 'moat' is set.
john [Fri, 21 Feb 2025 15:16:50 +0000 (16:16 +0100)]
float-divide-by-zero set in libfuzzer
David Goulet [Wed, 5 Feb 2025 14:49:31 +0000 (09:49 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Wed, 5 Feb 2025 14:33:19 +0000 (14:33 +0000)]
version: Bump version to 0.4.8.14-dev
David Goulet [Wed, 5 Feb 2025 14:30:13 +0000 (09:30 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Wed, 5 Feb 2025 14:22:05 +0000 (14:22 +0000)]
version: Bump version to 0.4.8.14
David Goulet [Wed, 5 Feb 2025 14:23:52 +0000 (09:23 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Wed, 5 Feb 2025 14:21:16 +0000 (14:21 +0000)]
fallbackdir: Update list generated on February 05, 2025
Tor CI Release [Wed, 5 Feb 2025 14:20:40 +0000 (14:20 +0000)]
Update geoip files to match ipfire location db, 2025/02/05.
David Goulet [Tue, 28 Jan 2025 18:44:17 +0000 (13:44 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Tue, 28 Jan 2025 18:44:11 +0000 (13:44 -0500)]
hs: Make Windows CI 32bit happy
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 28 Jan 2025 18:28:36 +0000 (13:28 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Tue, 28 Jan 2025 18:27:14 +0000 (13:27 -0500)]
hashx: Move Windows function within another ifdef
Function only used within the hugepage ifdef for Windows so move it there so we
avoid a unused function warning on our Windows CI:
src/ext/equix/hashx/src/virtual_memory.c:30:13: error: 'set_privilege' defined but not used [-Werror=unused-function]
30 | static bool set_privilege(const char* pszPrivilege, BOOL bEnable) {
| ^~~~~~~~~~~~~
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 28 Jan 2025 14:34:07 +0000 (14:34 +0000)]
Merge branch 'vuln' into 'main'
cargo: fix RUSTSEC-2024-0006
See merge request tpo/core/tor!856
Dimitris Apostolou [Wed, 22 Jan 2025 23:21:07 +0000 (01:21 +0200)]
cargo: fix RUSTSEC-2024-0006
David Goulet [Wed, 22 Jan 2025 14:52:44 +0000 (09:52 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Wed, 22 Jan 2025 13:59:03 +0000 (08:59 -0500)]
scripts: Fix rust clippy warning
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 22 Jan 2025 14:06:14 +0000 (09:06 -0500)]
Merge branch 'maint-0.4.8'
Cecylia Bocovich [Wed, 25 Sep 2024 13:06:35 +0000 (09:06 -0400)]
Bug 40976: Ensure conflux guards obey family and subnet restrictions
Cecylia Bocovich [Tue, 24 Sep 2024 20:32:41 +0000 (16:32 -0400)]
Add unit test for selecting guards with exit restrictions
This test checks to see whether guard selection for circuits honor exit
family restrictions.
David Goulet [Wed, 22 Jan 2025 13:59:03 +0000 (08:59 -0500)]
scripts: Fix rust clippy warning
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 18 Dec 2024 16:31:03 +0000 (11:31 -0500)]
changes: Add file for ticket 40996
Part of #40996
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 18 Dec 2024 16:28:59 +0000 (11:28 -0500)]
test: Add HS cache OOM cleanup test
Part of #40996
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 18 Dec 2024 16:04:00 +0000 (11:04 -0500)]
hs: Use downloaded counter for HSDir OOM cache cleanup
The OOM cache cleanup is now done by looking at the downloaded counter. The
cleanup process start at 0 and increment it to the next lowest value until
enough bytes have been removed.
This process could be expensive for large amount of descriptors in the cache
but since it is very expensive to increment counters, most cleanup should
happen within a tight range of downloaded counter target.
Fixes #40996
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 18 Dec 2024 15:24:28 +0000 (10:24 -0500)]
hs: Add downloaded counter to an HSDir cache entry
This adds a counter for the number of times a descriptor is downloaded from an
HSDir. Future commit will change the OOM subsystem to clean that cache based on
the lowest downloaded counts instead of time in cache.
In order to raise the bar even more for an attacker, the downloaded counter is
only marked when the directory request stream is closed. To pull this off, the
HS identifier on the directory connection is populated with the blinded key
requested (only on success). Finally, when the connection closes, we can then
lookup the cache entry with it and increment the counter.
Part of #40996
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 3 Dec 2024 20:47:57 +0000 (20:47 +0000)]
Merge branch 'fix-changelogs' into 'main'
clean up the 0.4.9.1-alpha changelog/releasenotes
See merge request tpo/core/tor!849
Roger Dingledine [Tue, 3 Dec 2024 19:03:20 +0000 (14:03 -0500)]
remove redundant change entries
they are already in a released stable, so they are not new to
this alpha
Roger Dingledine [Tue, 3 Dec 2024 18:54:01 +0000 (13:54 -0500)]
forward-port the 0.4.8.13 changes
Roger Dingledine [Tue, 3 Dec 2024 18:50:51 +0000 (13:50 -0500)]
remove the 0.4.9.1-alpha entries from releasenotes
releasenotes is for stables, and 1-alpha is not a stable
Tor CI Release [Tue, 3 Dec 2024 16:20:23 +0000 (16:20 +0000)]
version: Bump version to 0.4.9.1-alpha-dev
Tor CI Release [Tue, 3 Dec 2024 15:48:12 +0000 (15:48 +0000)]
version: Bump version to 0.4.9.1-alpha
Tor CI Release [Tue, 3 Dec 2024 15:48:11 +0000 (15:48 +0000)]
release: ChangeLog and ReleaseNotes for 0.4.9.1-alpha
Alexander Hansen Færøy [Tue, 3 Dec 2024 15:43:34 +0000 (15:43 +0000)]
Merge branch 'ticket40990_049_01' into 'main'
process: Don't close all FDs on new spawn
Closes #40990
See merge request tpo/core/tor!848