]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
4 months agoscripts: Remove 0.4.7 from list tor branches
David Goulet [Tue, 11 Mar 2025 14:21:03 +0000 (10:21 -0400)] 
scripts: Remove 0.4.7 from list tor branches

Not maintained anymore.

Signed-off-by: David Goulet <dgoulet@torproject.org>
5 months agofix sandbox for bandwidth authority
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)] 
fix sandbox for bandwidth authority

5 months agoTicket 40872: Changes file
Mike Perry [Thu, 21 Nov 2024 17:09:39 +0000 (17:09 +0000)] 
Ticket 40872: Changes file

5 months agoTicket 40872: Output conflux nonce and circ rtt to control port
Mike Perry [Thu, 21 Nov 2024 17:08:19 +0000 (17:08 +0000)] 
Ticket 40872: Output conflux nonce and circ rtt to control port

5 months agoTicket 40872: Add conflux helper functions for control port info
Mike Perry [Thu, 21 Nov 2024 17:06:26 +0000 (17:06 +0000)] 
Ticket 40872: Add conflux helper functions for control port info

6 months agoversion: Bump version to 0.4.8.14-dev
Tor CI Release [Wed, 5 Feb 2025 14:33:19 +0000 (14:33 +0000)] 
version: Bump version to 0.4.8.14-dev

6 months agoversion: Bump version to 0.4.8.14
Tor CI Release [Wed, 5 Feb 2025 14:22:05 +0000 (14:22 +0000)] 
version: Bump version to 0.4.8.14

6 months agofallbackdir: Update list generated on February 05, 2025
Tor CI Release [Wed, 5 Feb 2025 14:21:16 +0000 (14:21 +0000)] 
fallbackdir: Update list generated on February 05, 2025

6 months agoUpdate geoip files to match ipfire location db, 2025/02/05.
Tor CI Release [Wed, 5 Feb 2025 14:20:40 +0000 (14:20 +0000)] 
Update geoip files to match ipfire location db, 2025/02/05.

6 months agohs: Make Windows CI 32bit happy
David Goulet [Tue, 28 Jan 2025 18:44:11 +0000 (13:44 -0500)] 
hs: Make Windows CI 32bit happy

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 months agohashx: Move Windows function within another ifdef
David Goulet [Tue, 28 Jan 2025 18:27:14 +0000 (13:27 -0500)] 
hashx: Move Windows function within another ifdef

Function only used within the hugepage ifdef for Windows so move it there so we
avoid a unused function warning on our Windows CI:

src/ext/equix/hashx/src/virtual_memory.c:30:13: error: 'set_privilege' defined but not used [-Werror=unused-function]
   30 | static bool set_privilege(const char* pszPrivilege, BOOL bEnable) {
      |             ^~~~~~~~~~~~~

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 months agoscripts: Fix rust clippy warning
David Goulet [Wed, 22 Jan 2025 13:59:03 +0000 (08:59 -0500)] 
scripts: Fix rust clippy warning

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 months agochanges: Add file for ticket 40996
David Goulet [Wed, 18 Dec 2024 16:31:03 +0000 (11:31 -0500)] 
changes: Add file for ticket 40996

Part of #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 months agotest: Add HS cache OOM cleanup test
David Goulet [Wed, 18 Dec 2024 16:28:59 +0000 (11:28 -0500)] 
test: Add HS cache OOM cleanup test

Part of #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 months agohs: Use downloaded counter for HSDir OOM cache cleanup
David Goulet [Wed, 18 Dec 2024 16:04:00 +0000 (11:04 -0500)] 
hs: Use downloaded counter for HSDir OOM cache cleanup

The OOM cache cleanup is now done by looking at the downloaded counter. The
cleanup process start at 0 and increment it to the next lowest value until
enough bytes have been removed.

This process could be expensive for large amount of descriptors in the cache
but since it is very expensive to increment counters, most cleanup should
happen within a tight range of downloaded counter target.

Fixes #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 months agohs: Add downloaded counter to an HSDir cache entry
David Goulet [Wed, 18 Dec 2024 15:24:28 +0000 (10:24 -0500)] 
hs: Add downloaded counter to an HSDir cache entry

This adds a counter for the number of times a descriptor is downloaded from an
HSDir. Future commit will change the OOM subsystem to clean that cache based on
the lowest downloaded counts instead of time in cache.

In order to raise the bar even more for an attacker, the downloaded counter is
only marked when the directory request stream is closed. To pull this off, the
HS identifier on the directory connection is populated with the blinded key
requested (only on success). Finally, when the connection closes, we can then
lookup the cache entry with it and increment the counter.

Part of #40996

Signed-off-by: David Goulet <dgoulet@torproject.org>
8 months agotest-network-run: refactor away test_network_ipv6
Jim Newsome [Mon, 18 Nov 2024 16:26:26 +0000 (10:26 -0600)] 
test-network-run: refactor away test_network_ipv6

This should be a pure refactor to simplify the logic a bit now that we
no longer probe for IPv6 support.

8 months agotest-network: include IPv6 tests unconditionally
Jim Newsome [Fri, 15 Nov 2024 00:38:22 +0000 (18:38 -0600)] 
test-network: include IPv6 tests unconditionally

Previously we would incorrectly detect that ipv6 isn't supported if the
ping binary isn't present (as it may not be in a relatively stripped
down container image), or if ICMP packets aren't permitted (as they
often aren't in containers).

We don't really have a need to run these network tests on non-IPv6
systems, so it makes more sense to just run them unconditionally.

8 months agodebian-i386-minimal: explicitly set platform
Jim Newsome [Mon, 18 Nov 2024 19:58:25 +0000 (13:58 -0600)] 
debian-i386-minimal: explicitly set platform

This is to work around
https://github.com/docker-library/official-images/issues/17896

8 months agoCI: Use TPA-based images
Jim Newsome [Mon, 18 Nov 2024 19:25:13 +0000 (13:25 -0600)] 
CI: Use TPA-based images

8 months agodebian-gpl: Run on debian:bullseye instead of buster
Jim Newsome [Mon, 18 Nov 2024 20:15:37 +0000 (14:15 -0600)] 
debian-gpl: Run on debian:bullseye instead of buster

* buster is now very old
* all the other jobs run bullseye
* This will facilitate switching to a TPA-maintained image (there is no
  buster image).

9 months agoFix: Use FREE_AND_NULL() for releasing workqueue resources
Waldemar Zimpel [Wed, 30 Oct 2024 01:51:20 +0000 (02:51 +0100)] 
Fix: Use FREE_AND_NULL() for releasing workqueue resources

See issue #40989

9 months agoMerge branch 'tor-gitlab/mr/840' into maint-0.4.8
David Goulet [Thu, 24 Oct 2024 15:43:07 +0000 (11:43 -0400)] 
Merge branch 'tor-gitlab/mr/840' into maint-0.4.8

9 months agoUse pip to install chutney's python dependencies
Jim Newsome [Thu, 24 Oct 2024 14:53:19 +0000 (09:53 -0500)] 
Use pip to install chutney's python dependencies

9 months agoversion: Bump version to 0.4.8.13-dev
Tor CI Release [Thu, 24 Oct 2024 14:45:02 +0000 (14:45 +0000)] 
version: Bump version to 0.4.8.13-dev

9 months agoRe-format CHUTNEY installation block into multiple lines
Jim Newsome [Thu, 24 Oct 2024 14:44:47 +0000 (09:44 -0500)] 
Re-format CHUTNEY installation block into multiple lines

We're about to add a few more steps, which would make the single-line
format a bit unwieldy.

9 months agoversion: Bump version to 0.4.8.13
Tor CI Release [Thu, 24 Oct 2024 14:27:20 +0000 (14:27 +0000)] 
version: Bump version to 0.4.8.13

9 months agofallbackdir: Update list generated on October 24, 2024
Tor CI Release [Thu, 24 Oct 2024 14:26:19 +0000 (14:26 +0000)] 
fallbackdir: Update list generated on October 24, 2024

9 months agoUpdate geoip files to match ipfire location db, 2024/10/24.
Tor CI Release [Thu, 24 Oct 2024 14:25:23 +0000 (14:25 +0000)] 
Update geoip files to match ipfire location db, 2024/10/24.

9 months agodon't build preemptive conflux circuits if no predicted ports
Roger Dingledine [Tue, 15 Oct 2024 06:54:27 +0000 (02:54 -0400)] 
don't build preemptive conflux circuits if no predicted ports

Conflux circuit building was ignoring the "predicted ports" feature,
which aims to make Tor stop building circuits if there have been
no user requests lately. This bug led to every idle Tor on the
network building and discarding circuits every 30 seconds, which
added overall load to the network, used bandwidth and battery from
clients that weren't actively using their Tor, and kept sockets open
on guards which added connection padding essentially forever.

Bug went in on commit 39c2927d when we added preemptive conflux circuit
pools.

Fixes bug 40981; bugfix on 0.4.8.1-alpha.

9 months agoFix: Memory leaks in cpuworker on shutdown
Waldemar Zimpel [Thu, 26 Sep 2024 01:37:19 +0000 (03:37 +0200)] 
Fix: Memory leaks in cpuworker on shutdown

Resources allocated by cpuworker weren't being freed on clean shutdown.
This applies for worker threads, worker thread pool, reply queue, reply
event, ...

12 months agodirvote: Fix memleak when computing consensus
David Goulet [Mon, 5 Aug 2024 15:59:30 +0000 (11:59 -0400)] 
dirvote: Fix memleak when computing consensus

Fixes #40966

Signed-off-by: David Goulet <dgoulet@torproject.org>
13 months agobridge: Always put transport-info line
David Goulet [Tue, 11 Jun 2024 16:38:56 +0000 (12:38 -0400)] 
bridge: Always put transport-info line

Signed-off-by: David Goulet <dgoulet@torproject.org>
13 months agoClean-up Managed Proxy state in PT tests.
Alexander Færøy [Fri, 21 Jul 2023 00:53:12 +0000 (02:53 +0200)] 
Clean-up Managed Proxy state in PT tests.

This patch makes sure we clean up our version and implementation fields
in our Managed Proxy struct after each test run.

This was detected by LeakSanitizer.

See: tpo/core/tor#11101.

13 months agoAdd changes file for tpo/core/tor#11101.
Alexander Færøy [Fri, 21 Jul 2023 00:15:40 +0000 (02:15 +0200)] 
Add changes file for tpo/core/tor#11101.

13 months agoAdd implementation and version metadata to bridge extra-info.
Alexander Færøy [Fri, 21 Jul 2023 00:11:16 +0000 (02:11 +0200)] 
Add implementation and version metadata to bridge extra-info.

This patch adds two new keys to bridges' extra-info document:
"transport-version" and "transport-implementation".

These two new values always appear together (if one is missing, the
other one will be missing too) and is parsed from PT's STATUS
TYPE=version messages.

See: tpo/core/tor#11101.

13 months agoInclude "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.
Alexander Færøy [Fri, 21 Jul 2023 00:10:21 +0000 (02:10 +0200)] 
Include "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.

13 months agoDrop requirement for TRANSPORT being present in STATUS messages.
Alexander Færøy [Fri, 21 Jul 2023 00:09:33 +0000 (02:09 +0200)] 
Drop requirement for TRANSPORT being present in STATUS messages.

13 months agoAdd support for PT STATUS TYPE=version messages.
Alexander Færøy [Thu, 24 Mar 2022 19:13:41 +0000 (19:13 +0000)] 
Add support for PT STATUS TYPE=version messages.

This patch adds support for handling the version status message. Once we
receive such message, we add the given version string to the
managed_proxy_t instance. Note this value can be NULL and the value can
change throughout the lifetime of the PT as multiple status version
messages are handled.

See: tpo/core/tor#11101

14 months agoversion: Bump version to 0.4.8.12-dev
Tor CI Release [Thu, 6 Jun 2024 13:25:52 +0000 (13:25 +0000)] 
version: Bump version to 0.4.8.12-dev

14 months agoversion: Bump version to 0.4.8.12
Tor CI Release [Thu, 6 Jun 2024 12:42:04 +0000 (12:42 +0000)] 
version: Bump version to 0.4.8.12

14 months agofallbackdir: Update list generated on June 06, 2024
Tor CI Release [Thu, 6 Jun 2024 12:41:13 +0000 (12:41 +0000)] 
fallbackdir: Update list generated on June 06, 2024

14 months agoUpdate geoip files to match ipfire location db, 2024/06/06.
Tor CI Release [Thu, 6 Jun 2024 12:40:27 +0000 (12:40 +0000)] 
Update geoip files to match ipfire location db, 2024/06/06.

14 months agoUpdate OverloadStatistics to match prop 328
Georg Koppen [Wed, 8 May 2024 09:34:05 +0000 (09:34 +0000)] 
Update OverloadStatistics to match prop 328

Closes: #40940.
14 months agoMerge branch 'ticket40689_048_01' into maint-0.4.8
David Goulet [Thu, 30 May 2024 16:30:40 +0000 (12:30 -0400)] 
Merge branch 'ticket40689_048_01' into maint-0.4.8

14 months agoscripts: Fix Python3 warnings
David Goulet [Thu, 30 May 2024 13:50:38 +0000 (09:50 -0400)] 
scripts: Fix Python3 warnings

Signed-off-by: David Goulet <dgoulet@torproject.org>
14 months agodirauth: Add new faravahar
David Goulet [Thu, 30 May 2024 13:09:39 +0000 (09:09 -0400)] 
dirauth: Add new faravahar

Brand new address, brand new keys, brand new day.

Closes #40689

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agoFix typo in tor-relays list address
hiro [Tue, 30 Apr 2024 12:35:16 +0000 (14:35 +0200)] 
Fix typo in tor-relays list address

15 months agocircuit: Remove log_warn triggered by a proto violation
David Goulet [Tue, 16 Apr 2024 15:05:52 +0000 (11:05 -0400)] 
circuit: Remove log_warn triggered by a proto violation

Fixes #40932

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agoMerge branch 'tor-gitlab/mr/808' into maint-0.4.8
David Goulet [Mon, 15 Apr 2024 19:11:16 +0000 (15:11 -0400)] 
Merge branch 'tor-gitlab/mr/808' into maint-0.4.8

15 months agoconflux: Don't process a closed circuit on get packaged window
David Goulet [Mon, 15 Apr 2024 18:45:29 +0000 (14:45 -0400)] 
conflux: Don't process a closed circuit on get packaged window

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agoconflux: Avoid noting a cell was sent on a closed circuit
David Goulet [Mon, 15 Apr 2024 18:24:45 +0000 (14:24 -0400)] 
conflux: Avoid noting a cell was sent on a closed circuit

It turns out that circuit_package_relay_cell() returns 0 in order to drop a
cell but there is a code path, if the circuit queue is full, that also silently
closes the circuit and returns 0.

This lead to Conflux thinking a cell was sent but actually the cell was not and
the circuit was closed leading to the hard assert.

And so this function makes sure that circuit_package_relay_cell() and
append_cell_to_circuit_queue() returns a value that indicate what happened with
the cell and circuit so the caller can make an informed decision with it.

This change makes it that we do NOT enter the Conflux subsystem if the cell is
not queued on the circuit.

Fixes #40921

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agoversion: Bump version to 0.4.8.11-dev
Tor CI Release [Wed, 10 Apr 2024 17:10:15 +0000 (17:10 +0000)] 
version: Bump version to 0.4.8.11-dev

15 months agoversion: Bump version to 0.4.8.11
Tor CI Release [Wed, 10 Apr 2024 16:54:58 +0000 (16:54 +0000)] 
version: Bump version to 0.4.8.11

15 months agofallbackdir: Update list generated on April 10, 2024
Tor CI Release [Wed, 10 Apr 2024 16:54:12 +0000 (16:54 +0000)] 
fallbackdir: Update list generated on April 10, 2024

15 months agoUpdate geoip files to match ipfire location db, 2024/04/10.
Tor CI Release [Wed, 10 Apr 2024 16:53:43 +0000 (16:53 +0000)] 
Update geoip files to match ipfire location db, 2024/04/10.

15 months agodirauth: New keys and address for tor26
David Goulet [Mon, 8 Apr 2024 14:33:54 +0000 (10:33 -0400)] 
dirauth: New keys and address for tor26

Signed-off-by: David Goulet <dgoulet@torproject.org>
18 months agoTry to appease the changefile format checker
Sebastian Hahn [Tue, 6 Feb 2024 18:52:44 +0000 (19:52 +0100)] 
Try to appease the changefile format checker

18 months agoUpdate test strings
Sebastian Hahn [Thu, 1 Feb 2024 16:16:17 +0000 (17:16 +0100)] 
Update test strings

18 months agoAdd a changes file
Sebastian Hahn [Thu, 1 Feb 2024 15:45:58 +0000 (16:45 +0100)] 
Add a changes file

18 months agodirauth: Warn when failing to post during a vote
Sebastian Hahn [Thu, 1 Feb 2024 09:34:30 +0000 (10:34 +0100)] 
dirauth: Warn when failing to post during a vote

The only way to figure out that posting a vote or signatures to another
dirauth failed is by counting how many success messages there are on
notice level, and noticing that it is fewer than the number of
configured dirauths.

Closes #40910.

18 months agodirauth: Reject 0.4.7.x series at the authority level
David Goulet [Tue, 30 Jan 2024 15:56:16 +0000 (10:56 -0500)] 
dirauth: Reject 0.4.7.x series at the authority level

Signed-off-by: David Goulet <dgoulet@torproject.org>
18 months agobwauth: Allow "node_id" KeyValue without "$"
juga [Sat, 18 Nov 2023 17:45:28 +0000 (17:45 +0000)] 
bwauth: Allow "node_id" KeyValue without "$"

Allow "node_id" KeyValue without the dollar sign at the start of the
hexdigit in the BandwidthFiles, in order to easier database queries
combining Tor documents in which the relays fingerprint doesn't
include it.
Bugfix on all supported versions of Tor.

Closes #40891

18 months agoadd release note and changelog entry for #40819
trinity-1686a [Sun, 26 Nov 2023 12:12:47 +0000 (13:12 +0100)] 
add release note and changelog entry for #40819

19 months agoversion: Bump version to 0.4.8.10-dev
Tor CI Release [Fri, 8 Dec 2023 18:53:15 +0000 (18:53 +0000)] 
version: Bump version to 0.4.8.10-dev

19 months agoversion: Bump version to 0.4.8.10
Tor CI Release [Fri, 8 Dec 2023 18:31:17 +0000 (18:31 +0000)] 
version: Bump version to 0.4.8.10

19 months agofallbackdir: Update list generated on December 08, 2023
Tor CI Release [Fri, 8 Dec 2023 18:29:44 +0000 (18:29 +0000)] 
fallbackdir: Update list generated on December 08, 2023

19 months agoUpdate geoip files to match ipfire location db, 2023/12/08.
Tor CI Release [Fri, 8 Dec 2023 18:28:23 +0000 (18:28 +0000)] 
Update geoip files to match ipfire location db, 2023/12/08.

19 months agoMerge remote-tracking branch 'mikeperry-private/bug40897' into maint-0.4.8
David Goulet [Fri, 8 Dec 2023 18:19:40 +0000 (13:19 -0500)] 
Merge remote-tracking branch 'mikeperry-private/bug40897' into maint-0.4.8

20 months agoMerge remote-tracking branch 'origin/merge-requests/776' into maint-0.4.8
Alexander Færøy [Thu, 7 Dec 2023 21:38:03 +0000 (21:38 +0000)] 
Merge remote-tracking branch 'origin/merge-requests/776' into maint-0.4.8

20 months agoBug 40897: Changes file
Mike Perry [Wed, 6 Dec 2023 20:58:01 +0000 (20:58 +0000)] 
Bug 40897: Changes file

20 months agoBug 40897 Bug Bounty: Double the number of max conflux circs
Mike Perry [Wed, 6 Dec 2023 17:23:19 +0000 (17:23 +0000)] 
Bug 40897 Bug Bounty: Double the number of max conflux circs

We strongly suspect that bug 40897 was caused by a custom Tor client that
tried to use more than the default number of conflux circuits, for either
performance or traffic analysis defense gains, or both.

This entity hit a safety check on the exit side, which caused a UAF. Our
"belt and suspenders" snapped off, and hit us in the face... again...

Since there are good reasons to try more than 2 conflux legs, and research has
found some traffic analysis benefits with as many as 5, we're going to raise
and parameterize this limit as a form of bug bounty for finding this UAF, so
that this entity can try out a little more confluxing.

This should also make it easier for researchers to try things like gathering
traces with larger amounts of confluxing than normal, to measure real-world
traffic analysis impacts of conflux.

Shine on, you yoloing anonymous diamond. Let us know if you find out anything
interesting!

20 months agoBug 40897: Add more checks to free paths
Mike Perry [Wed, 6 Dec 2023 18:54:59 +0000 (18:54 +0000)] 
Bug 40897: Add more checks to free paths

Similar double-frees would be caught earlier by these, so long as the pointers
remain nulled out.

20 months agoBug 40897: Move safety check to proper location and give it error handling.
Mike Perry [Wed, 6 Dec 2023 17:12:43 +0000 (17:12 +0000)] 
Bug 40897: Move safety check to proper location and give it error handling.

20 months agoupdate changes file with correct introduced version
trinity-1686a [Wed, 6 Dec 2023 16:42:41 +0000 (17:42 +0100)] 
update changes file with correct introduced version

20 months agoversion: Bump version to 0.4.8.9-dev
Tor CI Release [Thu, 9 Nov 2023 14:47:09 +0000 (14:47 +0000)] 
version: Bump version to 0.4.8.9-dev

20 months agoversion: Bump version to 0.4.8.9
Tor CI Release [Thu, 9 Nov 2023 14:21:49 +0000 (14:21 +0000)] 
version: Bump version to 0.4.8.9

20 months agofallbackdir: Update list generated on November 09, 2023
Tor CI Release [Thu, 9 Nov 2023 14:21:06 +0000 (14:21 +0000)] 
fallbackdir: Update list generated on November 09, 2023

20 months agoUpdate geoip files to match ipfire location db, 2023/11/09.
Tor CI Release [Thu, 9 Nov 2023 14:20:37 +0000 (14:20 +0000)] 
Update geoip files to match ipfire location db, 2023/11/09.

20 months agoMerge branch 'ticket40883_048_01' into maint-0.4.8
David Goulet [Thu, 9 Nov 2023 14:14:19 +0000 (09:14 -0500)] 
Merge branch 'ticket40883_048_01' into maint-0.4.8

20 months agoMerge branch 'tor-gitlab/mr/778' into maint-0.4.8
David Goulet [Thu, 9 Nov 2023 14:10:52 +0000 (09:10 -0500)] 
Merge branch 'tor-gitlab/mr/778' into maint-0.4.8

20 months agohs: Always check if the hs_ident is available when processing a cell
David Goulet [Wed, 8 Nov 2023 16:17:48 +0000 (11:17 -0500)] 
hs: Always check if the hs_ident is available when processing a cell

Signed-off-by: David Goulet <dgoulet@torproject.org>
21 months agohs: Fix assert in hs_metrics_update_by_ident()
David Goulet [Tue, 7 Nov 2023 18:50:28 +0000 (13:50 -0500)] 
hs: Fix assert in hs_metrics_update_by_ident()

The hs_metrics_failed_rdv() macro could pass a NULL value for the identity key
when a building circuit would end up in a failure path *before* the "hs_ident"
was able to be set which leading to this assert.

This was introduced in 0.4.8.1-alpha with the addition of rendezvous circuit
failure metrics for the MetricsPort.

This fixes TROVE-2023-006 for which its severity is considered high.

Signed-off-by: David Goulet <dgoulet@torproject.org>
21 months agoversion: Bump version to 0.4.8.8-dev
Tor CI Release [Fri, 3 Nov 2023 13:50:01 +0000 (13:50 +0000)] 
version: Bump version to 0.4.8.8-dev

21 months agoMerge branch 'maint-0.4.7' into maint-0.4.8
David Goulet [Fri, 3 Nov 2023 14:53:57 +0000 (10:53 -0400)] 
Merge branch 'maint-0.4.7' into maint-0.4.8

21 months agoversion: Bump version to 0.4.7.16-dev maint-0.4.7
Tor CI Release [Fri, 3 Nov 2023 13:50:00 +0000 (13:50 +0000)] 
version: Bump version to 0.4.7.16-dev

21 months agoUpdate geoip files to match ipfire location db, 2023/11/03.
Tor CI Release [Fri, 3 Nov 2023 13:18:09 +0000 (13:18 +0000)] 
Update geoip files to match ipfire location db, 2023/11/03.

21 months agofallbackdir: Update list generated on November 03, 2023
Tor CI Release [Fri, 3 Nov 2023 13:18:42 +0000 (13:18 +0000)] 
fallbackdir: Update list generated on November 03, 2023

21 months agoMerge branch 'maint-0.4.7' into maint-0.4.8
David Goulet [Fri, 3 Nov 2023 13:28:37 +0000 (09:28 -0400)] 
Merge branch 'maint-0.4.7' into maint-0.4.8

21 months agoversion: Bump version to 0.4.8.8 tor-0.4.8.8
Tor CI Release [Fri, 3 Nov 2023 13:21:33 +0000 (13:21 +0000)] 
version: Bump version to 0.4.8.8

21 months agoversion: Bump version to 0.4.7.16 tor-0.4.7.16
Tor CI Release [Fri, 3 Nov 2023 13:21:31 +0000 (13:21 +0000)] 
version: Bump version to 0.4.7.16

21 months agofallbackdir: Update list generated on November 03, 2023
Tor CI Release [Fri, 3 Nov 2023 13:18:42 +0000 (13:18 +0000)] 
fallbackdir: Update list generated on November 03, 2023

21 months agoUpdate geoip files to match ipfire location db, 2023/11/03.
Tor CI Release [Fri, 3 Nov 2023 13:18:09 +0000 (13:18 +0000)] 
Update geoip files to match ipfire location db, 2023/11/03.

21 months agoMerge branch 'maint-0.4.7' into maint-0.4.8
David Goulet [Fri, 3 Nov 2023 13:13:11 +0000 (09:13 -0400)] 
Merge branch 'maint-0.4.7' into maint-0.4.8

21 months agoSync geoip and fallbackdir from maint 048 before release
David Goulet [Fri, 3 Nov 2023 13:13:05 +0000 (09:13 -0400)] 
Sync geoip and fallbackdir from maint 048 before release

Signed-off-by: David Goulet <dgoulet@torproject.org>
21 months agoMerge branch 'maint-0.4.7' into maint-0.4.8
David Goulet [Fri, 3 Nov 2023 13:04:27 +0000 (09:04 -0400)] 
Merge branch 'maint-0.4.7' into maint-0.4.8

21 months agoFix TROVE-2023-004: Remote crash when compiled against OpenSSL
Alexander Færøy [Thu, 2 Nov 2023 18:38:43 +0000 (14:38 -0400)] 
Fix TROVE-2023-004: Remote crash when compiled against OpenSSL

Fixes #40874

Signed-off-by: David Goulet <dgoulet@torproject.org>
21 months agoBug 40876 changes file
Mike Perry [Wed, 25 Oct 2023 18:00:19 +0000 (18:00 +0000)] 
Bug 40876 changes file

21 months agoBug 40876: Extra logging
Mike Perry [Wed, 25 Oct 2023 00:55:43 +0000 (00:55 +0000)] 
Bug 40876: Extra logging

21 months agoBug 40876: Don't reduce primary list for temporary restrictions
Mike Perry [Mon, 23 Oct 2023 21:48:09 +0000 (21:48 +0000)] 
Bug 40876: Don't reduce primary list for temporary restrictions