]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Thu, 24 Aug 2023 18:33:59 +0000 (14:33 -0400)]
prop340: Put in subproto request for RelayCell=1
Related #40791
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 24 Aug 2023 18:29:03 +0000 (14:29 -0400)]
protover: Add the RelayCell=1 new protocol version
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 23 Jan 2024 15:08:47 +0000 (10:08 -0500)]
test: New test for ntorv3 subproto ext
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jan 2024 20:36:25 +0000 (15:36 -0500)]
prop346: Support Relay=5 and negotiate if available
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jan 2024 19:57:19 +0000 (14:57 -0500)]
ntorv3: Adapt CC client extension to new code
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jan 2024 19:35:21 +0000 (14:35 -0500)]
cc: Consolidate trunnel code with ntorv3 trunnel file
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jan 2024 16:55:04 +0000 (11:55 -0500)]
prop346: Adapt old CC extension parsing to new code
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jan 2024 16:27:25 +0000 (11:27 -0500)]
prop346: Parse the ntorv3 subproto extension server side
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 22 Jan 2024 15:12:28 +0000 (10:12 -0500)]
trunnel: Add subproto request definition
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 30 Jan 2024 16:47:53 +0000 (11:47 -0500)]
Merge branch 'tor-gitlab/mr/791'
Alexander Færøy [Tue, 30 Jan 2024 16:24:55 +0000 (16:24 +0000)]
Merge branch 'ticket40816_049_01' into 'main'
metrics: Add new relay metrics to MetricsPort
Closes #40816
See merge request tpo/core/tor!793
David Goulet [Tue, 30 Jan 2024 15:57:02 +0000 (10:57 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Tue, 30 Jan 2024 15:56:16 +0000 (10:56 -0500)]
dirauth: Reject 0.4.7.x series at the authority level
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 30 Jan 2024 15:49:31 +0000 (10:49 -0500)]
Merge branch 'maint-0.4.8'
juga [Sat, 18 Nov 2023 17:45:28 +0000 (17:45 +0000)]
bwauth: Allow "node_id" KeyValue without "$"
Allow "node_id" KeyValue without the dollar sign at the start of the
hexdigit in the BandwidthFiles, in order to easier database queries
combining Tor documents in which the relays fingerprint doesn't
include it.
Bugfix on all supported versions of Tor.
Closes #40891
David Goulet [Tue, 30 Jan 2024 15:13:09 +0000 (10:13 -0500)]
metrics: Add new relay metrics to MetricsPort
This commit adds the total number of DROP cell seen, the total number of
DESTROY cell received and the total number of protocol violation that lead to a
circuit close.
Closes #40816
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 9 Jan 2024 14:09:44 +0000 (09:09 -0500)]
Merge branch 'maint-0.4.8'
trinity-1686a [Sun, 26 Nov 2023 12:12:47 +0000 (13:12 +0100)]
add release note and changelog entry for #40819
Alexander Færøy [Mon, 11 Dec 2023 20:18:32 +0000 (20:18 +0000)]
Merge branch 'fix-python-escs' into 'main'
Use raw strings for regexs containing escapes
See merge request tpo/core/tor!790
nonameformee [Sun, 10 Dec 2023 10:36:48 +0000 (10:36 +0000)]
dirauth: Reject 0.4.7.x series at the authority level
Alex Xu (Hello71) [Sat, 9 Dec 2023 15:16:08 +0000 (10:16 -0500)]
Use raw strings for regexs containing escapes
In Python 3.12, these invalid escape sequences emit SyntaxWarnings, and will
emit SyntaxErrors in a future release.
Found using: grep '[^r]["'\''].*\\[^rn\\x0t"]' $(grep -rl '^#!.*python')
David Goulet [Fri, 8 Dec 2023 19:14:06 +0000 (14:14 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Fri, 8 Dec 2023 18:53:15 +0000 (18:53 +0000)]
version: Bump version to 0.4.8.10-dev
David Goulet [Fri, 8 Dec 2023 18:49:32 +0000 (13:49 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Fri, 8 Dec 2023 18:31:17 +0000 (18:31 +0000)]
version: Bump version to 0.4.8.10
David Goulet [Fri, 8 Dec 2023 18:45:36 +0000 (13:45 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Fri, 8 Dec 2023 18:29:44 +0000 (18:29 +0000)]
fallbackdir: Update list generated on December 08, 2023
Tor CI Release [Fri, 8 Dec 2023 18:28:23 +0000 (18:28 +0000)]
Update geoip files to match ipfire location db, 2023/12/08.
David Goulet [Fri, 8 Dec 2023 18:26:16 +0000 (13:26 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Fri, 8 Dec 2023 18:19:40 +0000 (13:19 -0500)]
Merge remote-tracking branch 'mikeperry-private/bug40897' into maint-0.4.8
Alexander Færøy [Thu, 7 Dec 2023 21:38:32 +0000 (21:38 +0000)]
Merge branch 'maint-0.4.8'
Alexander Færøy [Thu, 7 Dec 2023 21:38:03 +0000 (21:38 +0000)]
Merge remote-tracking branch 'origin/merge-requests/776' into maint-0.4.8
Mike Perry [Wed, 6 Dec 2023 20:58:01 +0000 (20:58 +0000)]
Bug 40897: Changes file
Mike Perry [Wed, 6 Dec 2023 17:23:19 +0000 (17:23 +0000)]
Bug 40897 Bug Bounty: Double the number of max conflux circs
We strongly suspect that bug 40897 was caused by a custom Tor client that
tried to use more than the default number of conflux circuits, for either
performance or traffic analysis defense gains, or both.
This entity hit a safety check on the exit side, which caused a UAF. Our
"belt and suspenders" snapped off, and hit us in the face... again...
Since there are good reasons to try more than 2 conflux legs, and research has
found some traffic analysis benefits with as many as 5, we're going to raise
and parameterize this limit as a form of bug bounty for finding this UAF, so
that this entity can try out a little more confluxing.
This should also make it easier for researchers to try things like gathering
traces with larger amounts of confluxing than normal, to measure real-world
traffic analysis impacts of conflux.
Shine on, you yoloing anonymous diamond. Let us know if you find out anything
interesting!
Mike Perry [Wed, 6 Dec 2023 18:54:59 +0000 (18:54 +0000)]
Bug 40897: Add more checks to free paths
Similar double-frees would be caught earlier by these, so long as the pointers
remain nulled out.
Mike Perry [Wed, 6 Dec 2023 17:12:43 +0000 (17:12 +0000)]
Bug 40897: Move safety check to proper location and give it error handling.
trinity-1686a [Wed, 6 Dec 2023 16:42:41 +0000 (17:42 +0100)]
update changes file with correct introduced version
David Goulet [Wed, 22 Nov 2023 15:02:14 +0000 (15:02 +0000)]
Merge branch 'fix-bridge-exit-warn' into 'main'
Fix bridge exit warn
Closes #40884
See merge request tpo/core/tor!783
David Goulet [Wed, 22 Nov 2023 15:01:03 +0000 (15:01 +0000)]
Merge branch 'did-sanity-memmem' into 'main'
add sanity check in tor_memmem
Closes #40854
See merge request tpo/core/tor!785
trinity-1686a [Sun, 12 Nov 2023 17:36:12 +0000 (18:36 +0100)]
add changes entry
Alexander Færøy [Tue, 21 Nov 2023 18:04:38 +0000 (18:04 +0000)]
Merge branch 'eol-config-no-spurious-warn' into 'main'
don't warn for empty RecommendedServerVersion
Closes #40888
See merge request tpo/core/tor!787
juga [Sat, 18 Nov 2023 17:45:28 +0000 (17:45 +0000)]
bwauth: Allow "node_id" KeyValue without "$"
Allow "node_id" KeyValue without the dollar sign at the start of the
hexdigit in the BandwidthFiles, in order to easier database queries
combining Tor documents in which the relays fingerprint doesn't
include it.
Bugfix on all supported versions of Tor.
Closes #40891
trinity-1686a [Mon, 20 Nov 2023 23:22:51 +0000 (00:22 +0100)]
add changes file for sanity check on memmem
David Goulet [Mon, 20 Nov 2023 18:43:36 +0000 (18:43 +0000)]
Merge branch 'new-changelogs' into 'main'
forward-port the 0.4.8.x change stanzas
See merge request tpo/core/tor!784
trinity-1686a [Thu, 16 Nov 2023 18:13:28 +0000 (19:13 +0100)]
don't warn for empty RecommendedServerVersion
trinity-1686a [Wed, 15 Nov 2023 01:01:34 +0000 (02:01 +0100)]
add sanity check in tor_memmem
it's believed most libc already have those, but just in case, it can't
hurt
Roger Dingledine [Sun, 12 Nov 2023 21:03:06 +0000 (16:03 -0500)]
fix small typo and missing period while i'm here
Roger Dingledine [Sun, 12 Nov 2023 20:51:20 +0000 (15:51 -0500)]
forward-port the 0.4.8.x change stanzas
somehow our release process is not moving these into git main
trinity-1686a [Sun, 12 Nov 2023 17:24:33 +0000 (18:24 +0100)]
don't warn when ExitRelay is set to 0
David Goulet [Thu, 9 Nov 2023 15:11:27 +0000 (10:11 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Thu, 9 Nov 2023 14:47:09 +0000 (14:47 +0000)]
version: Bump version to 0.4.8.9-dev
David Goulet [Thu, 9 Nov 2023 14:44:02 +0000 (09:44 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Thu, 9 Nov 2023 14:21:49 +0000 (14:21 +0000)]
version: Bump version to 0.4.8.9
David Goulet [Thu, 9 Nov 2023 14:24:22 +0000 (09:24 -0500)]
Merge branch 'maint-0.4.8'
Tor CI Release [Thu, 9 Nov 2023 14:21:06 +0000 (14:21 +0000)]
fallbackdir: Update list generated on November 09, 2023
Tor CI Release [Thu, 9 Nov 2023 14:20:37 +0000 (14:20 +0000)]
Update geoip files to match ipfire location db, 2023/11/09.
David Goulet [Thu, 9 Nov 2023 14:17:51 +0000 (09:17 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Thu, 9 Nov 2023 14:14:19 +0000 (09:14 -0500)]
Merge branch 'ticket40883_048_01' into maint-0.4.8
David Goulet [Thu, 9 Nov 2023 14:10:58 +0000 (09:10 -0500)]
Merge branch 'maint-0.4.8'
David Goulet [Thu, 9 Nov 2023 14:10:52 +0000 (09:10 -0500)]
Merge branch 'tor-gitlab/mr/778' into maint-0.4.8
David Goulet [Thu, 9 Nov 2023 13:41:53 +0000 (13:41 +0000)]
Merge branch 'fix-man-typos' into 'main'
fix man page typos
See merge request tpo/core/tor!781
David Goulet [Wed, 8 Nov 2023 16:17:48 +0000 (11:17 -0500)]
hs: Always check if the hs_ident is available when processing a cell
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 7 Nov 2023 18:50:28 +0000 (13:50 -0500)]
hs: Fix assert in hs_metrics_update_by_ident()
The hs_metrics_failed_rdv() macro could pass a NULL value for the identity key
when a building circuit would end up in a failure path *before* the "hs_ident"
was able to be set which leading to this assert.
This was introduced in 0.4.8.1-alpha with the addition of rendezvous circuit
failure metrics for the MetricsPort.
This fixes TROVE-2023-006 for which its severity is considered high.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alex Xu (Hello71) [Sat, 4 Nov 2023 12:51:08 +0000 (08:51 -0400)]
fix man page typos
David Goulet [Fri, 3 Nov 2023 14:54:06 +0000 (10:54 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Fri, 3 Nov 2023 13:50:01 +0000 (13:50 +0000)]
version: Bump version to 0.4.8.8-dev
David Goulet [Fri, 3 Nov 2023 14:53:57 +0000 (10:53 -0400)]
Merge branch 'maint-0.4.7' into maint-0.4.8
Tor CI Release [Fri, 3 Nov 2023 13:50:00 +0000 (13:50 +0000)]
version: Bump version to 0.4.7.16-dev
David Goulet [Fri, 3 Nov 2023 13:41:12 +0000 (09:41 -0400)]
Merge branch 'maint-0.4.8'
Tor CI Release [Fri, 3 Nov 2023 13:18:09 +0000 (13:18 +0000)]
Update geoip files to match ipfire location db, 2023/11/03.
Tor CI Release [Fri, 3 Nov 2023 13:18:42 +0000 (13:18 +0000)]
fallbackdir: Update list generated on November 03, 2023
David Goulet [Fri, 3 Nov 2023 13:28:44 +0000 (09:28 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Fri, 3 Nov 2023 13:28:37 +0000 (09:28 -0400)]
Merge branch 'maint-0.4.7' into maint-0.4.8
Tor CI Release [Fri, 3 Nov 2023 13:21:33 +0000 (13:21 +0000)]
version: Bump version to 0.4.8.8
Tor CI Release [Fri, 3 Nov 2023 13:21:31 +0000 (13:21 +0000)]
version: Bump version to 0.4.7.16
Tor CI Release [Fri, 3 Nov 2023 13:18:42 +0000 (13:18 +0000)]
fallbackdir: Update list generated on November 03, 2023
Tor CI Release [Fri, 3 Nov 2023 13:18:09 +0000 (13:18 +0000)]
Update geoip files to match ipfire location db, 2023/11/03.
David Goulet [Fri, 3 Nov 2023 13:13:12 +0000 (09:13 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Fri, 3 Nov 2023 13:13:11 +0000 (09:13 -0400)]
Merge branch 'maint-0.4.7' into maint-0.4.8
David Goulet [Fri, 3 Nov 2023 13:13:05 +0000 (09:13 -0400)]
Sync geoip and fallbackdir from maint 048 before release
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 3 Nov 2023 13:04:27 +0000 (09:04 -0400)]
Merge branch 'maint-0.4.8'
David Goulet [Fri, 3 Nov 2023 13:04:27 +0000 (09:04 -0400)]
Merge branch 'maint-0.4.7' into maint-0.4.8
Alexander Færøy [Thu, 2 Nov 2023 18:38:43 +0000 (14:38 -0400)]
Fix TROVE-2023-004: Remote crash when compiled against OpenSSL
Fixes #40874
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Perry [Wed, 25 Oct 2023 18:00:19 +0000 (18:00 +0000)]
Bug 40876 changes file
Mike Perry [Wed, 25 Oct 2023 00:55:43 +0000 (00:55 +0000)]
Bug 40876: Extra logging
Mike Perry [Mon, 23 Oct 2023 21:48:09 +0000 (21:48 +0000)]
Bug 40876: Don't reduce primary list for temporary restrictions
David Goulet [Mon, 30 Oct 2023 17:46:20 +0000 (13:46 -0400)]
Merge branch 'maint-0.4.8'
Mike Perry [Mon, 30 Oct 2023 16:55:11 +0000 (16:55 +0000)]
Changes file for bug 40878
Mike Perry [Mon, 30 Oct 2023 16:54:49 +0000 (16:54 +0000)]
Bug 40878: Count a valid conflux linked cell as valid data
For vanguards addon.
David Goulet [Mon, 30 Oct 2023 16:52:22 +0000 (16:52 +0000)]
Merge branch 'fix-token-bucket-on-new-stream' into 'main'
Fix token bucket on new stream
Closes #40875
See merge request tpo/core/tor!779
trinity-1686a [Sun, 29 Oct 2023 18:16:49 +0000 (19:16 +0100)]
fix memory leak in dos stream for resolve requests
trinity-1686a [Sun, 29 Oct 2023 17:14:13 +0000 (18:14 +0100)]
correctly parse consensus params for dos stream mitigation
trinity-1686a [Wed, 18 Oct 2023 16:23:02 +0000 (18:23 +0200)]
remove todos
trinity-1686a [Thu, 12 Oct 2023 22:02:07 +0000 (00:02 +0200)]
fix typos
trinity-1686a [Sun, 10 Sep 2023 14:47:17 +0000 (16:47 +0200)]
add changes/ and man entries for stream dos mitigation
trinity-1686a [Sun, 10 Sep 2023 11:18:34 +0000 (13:18 +0200)]
add metrics for rejected BEGIN/RESOLVE
trinity-1686a [Sun, 10 Sep 2023 11:13:11 +0000 (13:13 +0200)]
add rate limit on BEGIN and RESOLVE cell per circuit
trinity-1686a [Sat, 9 Sep 2023 10:28:33 +0000 (12:28 +0200)]
add configuration and network parameters for stream dos mitigation
David Goulet [Wed, 18 Oct 2023 14:40:18 +0000 (14:40 +0000)]
Merge branch 'ticket40870_048_02' into 'main'
conflux: Flag set as in full teardown in the free path
Closes #40870
See merge request tpo/core/tor!777
David Goulet [Wed, 11 Oct 2023 14:51:16 +0000 (10:51 -0400)]
conflux: Flag set as in full teardown in the free path
We suspect a shutdown race of some sort for which the full teardown is not
noticed during the close but should be during the free.
For that, we flag the conflux set as in full teardown (if so) in the free path
in case the close path didn't caught it.
Fixes #40870
Signed-off-by: David Goulet <dgoulet@torproject.org>