]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Wed, 5 Dec 2018 13:29:41 +0000 (08:29 -0500)]
Merge remote-tracking branch 'tor-github/pr/561'
Nick Mathewson [Wed, 5 Dec 2018 13:28:54 +0000 (08:28 -0500)]
Merge remote-tracking branch 'tor-github/pr/553'
Nick Mathewson [Wed, 5 Dec 2018 13:19:02 +0000 (08:19 -0500)]
Merge remote-tracking branch 'tor-github/pr/508'
Nick Mathewson [Wed, 5 Dec 2018 13:14:21 +0000 (08:14 -0500)]
remember why we are doing getsockopt()
Nick Mathewson [Wed, 5 Dec 2018 13:13:02 +0000 (08:13 -0500)]
Merge remote-tracking branch 'tor-github/pr/560'
Nick Mathewson [Wed, 5 Dec 2018 12:59:44 +0000 (07:59 -0500)]
Merge branch 'ticket28479_squashed'
Nick Mathewson [Fri, 16 Nov 2018 16:51:58 +0000 (11:51 -0500)]
Update ReleasingTor.md to reflect current practice
See #28479.
David Goulet [Tue, 4 Dec 2018 17:55:02 +0000 (12:55 -0500)]
Merge branch 'maint-0.3.5'
David Goulet [Mon, 3 Dec 2018 16:22:14 +0000 (11:22 -0500)]
man: Document HSv3 client authorization revocation
Removing a ".auth" file revokes a client access to the service but the
rendezvous circuit is not closed service side because the service simply
doesn't know which circuit is for which client.
This commit notes in the man page that to fully revoke a client access to the
service, the tor process should be restarted.
Closes #28275
Signed-off-by: David Goulet <dgoulet@torproject.org>
rl1987 [Mon, 3 Dec 2018 13:19:33 +0000 (15:19 +0200)]
manpage: Mention that adding new HS is unsupported if Sandbox is enabled
rl1987 [Mon, 3 Dec 2018 12:49:33 +0000 (14:49 +0200)]
Print error message we get from socket.connect_ex when it fails
rl1987 [Mon, 3 Dec 2018 12:40:37 +0000 (14:40 +0200)]
More logging for #28229
rl1987 [Mon, 3 Dec 2018 12:28:32 +0000 (14:28 +0200)]
Check that new listener connection is actually listening
Nick Mathewson [Mon, 3 Dec 2018 00:50:04 +0000 (19:50 -0500)]
Merge remote-tracking branch 'tor-github/pr/544'
Nick Mathewson [Mon, 3 Dec 2018 00:38:40 +0000 (19:38 -0500)]
Merge remote-tracking branch 'tor-github/pr/559'
teor [Mon, 3 Dec 2018 00:22:49 +0000 (10:22 +1000)]
doc: remove cached-routers from the man page
cached-routers was removed from the code a long time ago
teor [Mon, 3 Dec 2018 00:19:34 +0000 (10:19 +1000)]
comment: replace cached-routers with cached-descriptors
cached-routers has been gone for a long time
Nick Mathewson [Sun, 2 Dec 2018 01:46:06 +0000 (20:46 -0500)]
Use tor_strdup() in place of malloc+strncpy+terminate.
Nick Mathewson [Sun, 2 Dec 2018 01:35:38 +0000 (20:35 -0500)]
Merge remote-tracking branch 'tor-github/pr/556'
Nick Mathewson [Sun, 2 Dec 2018 01:32:18 +0000 (20:32 -0500)]
Merge branch 'ticket27490a_squashed'
Neel Chauhan [Wed, 17 Oct 2018 00:14:27 +0000 (20:14 -0400)]
Add regression test for ClientAutoIPv6ORPort
Neel Chauhan [Wed, 26 Sep 2018 23:19:11 +0000 (19:19 -0400)]
In fascist_firewall_use_ipv6(), say we can use IPv6 if ClientAutoIPv6ORPort is 1
Neel Chauhan [Wed, 26 Sep 2018 23:14:33 +0000 (19:14 -0400)]
Add new option ClientAutoIPv6ORPort to switch between IPv4 and IPv6 OR ports
rl1987 [Thu, 13 Sep 2018 07:18:06 +0000 (10:18 +0300)]
Add changes file
rl1987 [Thu, 13 Sep 2018 06:57:43 +0000 (09:57 +0300)]
Fix coverage build
rl1987 [Wed, 12 Sep 2018 12:03:08 +0000 (15:03 +0300)]
tor-resolve: Rework SOCKS5 response parsing with trunnel
rl1987 [Wed, 12 Sep 2018 10:12:51 +0000 (13:12 +0300)]
tor-resolve: Rework SOCKS5 method negotiation client part with trunnel
rl1987 [Wed, 12 Sep 2018 08:30:01 +0000 (11:30 +0300)]
tor-resolve: parse SOCKS4a reply
rl1987 [Wed, 12 Sep 2018 08:18:43 +0000 (11:18 +0300)]
Allow socks4_server_reply version to be 0 (for tor-resolve)
rl1987 [Tue, 11 Sep 2018 18:42:38 +0000 (21:42 +0300)]
tor-resolve: Use trunnel code for SOCKS5 request generation
rl1987 [Tue, 11 Sep 2018 16:39:00 +0000 (19:39 +0300)]
tor-resolve: link tor-resolve binary with trunnel lib
rl1987 [Tue, 11 Sep 2018 16:38:30 +0000 (19:38 +0300)]
tor-resolve: generate SOCKS4a request with trunnel
Nick Mathewson [Sat, 1 Dec 2018 16:36:03 +0000 (11:36 -0500)]
Move net.inet.ip.random_id code to lib/net/
Nick Mathewson [Sat, 1 Dec 2018 16:30:53 +0000 (11:30 -0500)]
Merge remote-tracking branch 'tor-github/pr/527'
Nick Mathewson [Sat, 1 Dec 2018 16:28:22 +0000 (11:28 -0500)]
Merge remote-tracking branch 'tor-github/pr/530'
Nick Mathewson [Sat, 1 Dec 2018 16:26:55 +0000 (11:26 -0500)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Sat, 1 Dec 2018 16:26:52 +0000 (11:26 -0500)]
Merge remote-tracking branch 'tor-github/pr/554' into maint-0.3.5
Nick Mathewson [Sat, 1 Dec 2018 16:24:02 +0000 (11:24 -0500)]
Merge remote-tracking branch 'tor-github/pr/536'
Nick Mathewson [Sat, 1 Dec 2018 16:20:10 +0000 (11:20 -0500)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Sat, 1 Dec 2018 16:20:04 +0000 (11:20 -0500)]
Merge branch 'bug28229_diag_035' into maint-0.3.5
rl1987 [Tue, 13 Nov 2018 09:38:51 +0000 (11:38 +0200)]
Also log a Tor log entry when it has a substring we are waiting for
rl1987 [Tue, 13 Nov 2018 09:15:40 +0000 (11:15 +0200)]
1 ms. resolution for Tor logs
rl1987 [Sun, 4 Nov 2018 17:10:40 +0000 (19:10 +0200)]
Add changes file
rl1987 [Sun, 4 Nov 2018 17:01:00 +0000 (19:01 +0200)]
Log everything from tor down to debug loglevel
rl1987 [Sun, 4 Nov 2018 16:09:31 +0000 (18:09 +0200)]
In test_rebind.py, log stuff with timestamps
Nick Mathewson [Sat, 1 Dec 2018 16:15:09 +0000 (11:15 -0500)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Sat, 1 Dec 2018 16:15:09 +0000 (11:15 -0500)]
Merge branch 'maint-0.3.4' into maint-0.3.5
Nick Mathewson [Sat, 1 Dec 2018 16:15:09 +0000 (11:15 -0500)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Neel Chauhan [Tue, 19 Sep 2017 20:08:24 +0000 (16:08 -0400)]
sr: Switch from tor_assert() to BUG()
Closes #19566
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 29 Nov 2018 15:02:50 +0000 (10:02 -0500)]
test: Fix a warning underflow in rend_cache/clean
Because the test is adding entries to the "rend_cache" directly, the
rend_cache_increment_allocation() was never called which made the
rend_cache_clean() call trigger that underflow warning:
rend_cache/clean: [forking] Nov 29 09:55:04.024 [warn] rend_cache_decrement_allocation(): Bug: Underflow in rend_cache_decrement_allocation (on Tor 0.4.0.0-alpha-dev
2240fe63feb9a8cf )
The test is still good and valid.
Fixes #28660
Signed-off-by: David Goulet <dgoulet@torproject.org>
rl1987 [Thu, 29 Nov 2018 09:10:48 +0000 (11:10 +0200)]
Mention --no-verify in error message
rl1987 [Thu, 29 Nov 2018 09:10:30 +0000 (11:10 +0200)]
Improve comment at the top
rl1987 [Thu, 29 Nov 2018 08:56:56 +0000 (10:56 +0200)]
Rename to pre-push.git-hook
Nick Mathewson [Tue, 27 Nov 2018 17:03:50 +0000 (12:03 -0500)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Tue, 27 Nov 2018 17:03:50 +0000 (12:03 -0500)]
Merge branch 'maint-0.3.4' into maint-0.3.5
Alexander Færøy [Tue, 27 Nov 2018 01:35:44 +0000 (02:35 +0100)]
Explicitly specify path to OpenSSL for Appveyor.
This patch explicitly specifies the path to our OpenSSL dependency and
disables the installation of an external OpenSSL version and instead
uses the OpenSSL version available from the MinGW environments.
See: https://bugs.torproject.org/28574
Nick Mathewson [Mon, 26 Nov 2018 22:25:28 +0000 (17:25 -0500)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Mon, 26 Nov 2018 22:24:41 +0000 (17:24 -0500)]
Merge remote-tracking branch 'teor/bug28096-035-squashed' into maint-0.3.5
Nick Mathewson [Mon, 26 Nov 2018 22:22:37 +0000 (17:22 -0500)]
Merge remote-tracking branch 'tor-github/pr/539'
Nick Mathewson [Mon, 26 Nov 2018 22:17:40 +0000 (17:17 -0500)]
Merge remote-tracking branch 'tor-github/pr/495'
Nick Mathewson [Mon, 26 Nov 2018 21:39:44 +0000 (16:39 -0500)]
Changes file for "Dormant Mode" (28335, 2149).
Nick Mathewson [Mon, 26 Nov 2018 21:33:31 +0000 (16:33 -0500)]
Merge branch 'dormant_v2_squashed'
Nick Mathewson [Mon, 19 Nov 2018 21:31:50 +0000 (16:31 -0500)]
Test for check_network_participation_callback()
Nick Mathewson [Mon, 19 Nov 2018 20:35:55 +0000 (15:35 -0500)]
Test netstatus.c tracking of user participation status
Nick Mathewson [Thu, 15 Nov 2018 18:16:58 +0000 (13:16 -0500)]
Add options to control dormant-client feature.
The DormantClientTimeout option controls how long Tor will wait before
going dormant. It also provides a way to disable the feature by setting
DormantClientTimeout to e.g. "50 years".
The DormantTimeoutDisabledByIdleStreams option controls whether open but
inactive streams count as "client activity". To implement it, I had to
make it so that reading or writing on a client stream *always* counts as
activity.
Closes ticket 28429.
David Goulet [Mon, 26 Nov 2018 19:59:24 +0000 (14:59 -0500)]
Merge branch 'maint-0.3.5'
David Goulet [Mon, 26 Nov 2018 19:59:10 +0000 (14:59 -0500)]
Merge remote-tracking branch 'dgoulet/ticket28128_035_01' into maint-0.3.5
rl1987 [Mon, 26 Nov 2018 15:32:29 +0000 (17:32 +0200)]
Try silencing Coverity false positive CID
1441482
Bugfix on
469f47ef8dc8b18104108f0437c860ec88fca6ad ; bug not in any released
Tor version.
Taylor R Campbell [Thu, 22 Nov 2018 00:53:57 +0000 (00:53 +0000)]
Create a temporary directory for tor's DataDirectory in test_rebind.
Fixes #28562.
While here, put the argument count test and usage message _before_ we
attempt to read from sys.argv.
teor [Thu, 22 Nov 2018 07:47:12 +0000 (17:47 +1000)]
Entry Nodes: Test on reasonably live consensuses
As well as live consensuses.
Tests for 24661.
teor [Thu, 22 Nov 2018 07:10:28 +0000 (17:10 +1000)]
Entry Nodes: refactor tests to use macros
Part of 24661.
teor [Wed, 21 Nov 2018 10:15:21 +0000 (20:15 +1000)]
Fix a comment typo in test_hs_common.c
teor [Wed, 21 Nov 2018 05:55:43 +0000 (15:55 +1000)]
Test: make unit tests use a reasonably live consensus
Cleanup after 24661.
teor [Wed, 21 Nov 2018 09:51:34 +0000 (19:51 +1000)]
Entry Nodes: Mark outdated dirservers in reasonably live consensuses
Fixes bug 28569; bugfix on Tor 0.3.2.5-alpha.
teor [Mon, 5 Nov 2018 05:27:38 +0000 (15:27 +1000)]
Entry Nodes: Use a reasonably live consensus to select guards
Fixes bug 24661; bugfix on 0.3.0.1-alpha.
teor [Wed, 21 Nov 2018 05:56:30 +0000 (15:56 +1000)]
Test: Fix memory leaks and missing unmocks in entry guard tests
test_entry_guard_outdated_dirserver_exclusion leaks memory, and is
missing some unmocks.
Fixes 28554; bugfix on 0.3.0.1-alpha.
Nick Mathewson [Wed, 21 Nov 2018 12:38:38 +0000 (07:38 -0500)]
Fix a fun heisenbug in memoize_protover_flags()
After we clear the protover map for getting full, we need to
re-create it, since we are about to use it.
This is a bugfix for bug 28558. It is a bugfix for the code from
ticket 27225, which is not in any released Tor. Found by Google
OSS-Fuzz, as issue 11475.
Nick Mathewson [Tue, 20 Nov 2018 18:14:56 +0000 (13:14 -0500)]
Merge branch 'ticket25341_merged_v2'
Nick Mathewson [Tue, 20 Nov 2018 18:10:38 +0000 (13:10 -0500)]
Merge branch 'maint-0.3.4' into maint-0.3.5
Nick Mathewson [Tue, 20 Nov 2018 18:10:38 +0000 (13:10 -0500)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Tue, 20 Nov 2018 18:10:18 +0000 (13:10 -0500)]
Merge remote-tracking branch 'teor/ticket28459-034' into maint-0.3.4
rl1987 [Tue, 20 Nov 2018 14:37:30 +0000 (16:37 +0200)]
Also disallow fixup/squash commits in maint-* and release-*
Nick Mathewson [Tue, 20 Nov 2018 14:04:35 +0000 (09:04 -0500)]
Merge branch 'maint-0.3.5'
rl1987 [Tue, 20 Nov 2018 13:40:52 +0000 (15:40 +0200)]
Add pre-push git hook to prevent fixup and squash commits from ending up in master
Taylor Yu [Mon, 19 Nov 2018 21:48:08 +0000 (15:48 -0600)]
Update control_free_all() for #27169
Reset the added bootstrap tracking state introduced by ticket 27169.
Fixes bug 28524; bugfix on 0.3.5.1-alpha.
Alexander Færøy [Mon, 19 Nov 2018 15:33:06 +0000 (16:33 +0100)]
Add changes file for #28518.
See: https://bugs.torproject.org/28518
Fabian Keil [Tue, 7 Apr 2015 14:36:05 +0000 (16:36 +0200)]
Complain if net.inet.ip.random_id is not set on FreeBSD-based servers
Apparently a couple of operators haven't gotten the memos [0] yet
and it looks like FreeBSD's default value will not change any time
soon [1].
[0]:
https://lists.torproject.org/pipermail/tor-relays/2014-March/004199.html
https://lists.torproject.org/pipermail/tor-relays/2014-November/005687.html
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=195828
[1]:
https://lists.freebsd.org/pipermail/freebsd-net/2015-April/041942.html
Nick Mathewson [Mon, 19 Nov 2018 15:18:57 +0000 (10:18 -0500)]
Merge branch 'maint-0.3.5'
Alexander Færøy [Sat, 17 Nov 2018 02:29:04 +0000 (03:29 +0100)]
Add missing library to build tor-print-ed-signing-cert.
To succesful compile tor-print-ed-signing-cert.exe on Windows we
sometimes need to include the @TOR_LIB_GDI@ library.
See: https://bugs.torproject.org/28485
Nick Mathewson [Mon, 19 Nov 2018 14:22:30 +0000 (09:22 -0500)]
Merge remote-tracking branch 'isis/bug25341' into ticket25341_merged_v2
Nick Mathewson [Mon, 19 Nov 2018 13:47:03 +0000 (08:47 -0500)]
Merge remote-tracking branch 'tor-github/pr/519'
Nick Mathewson [Mon, 19 Nov 2018 13:45:41 +0000 (08:45 -0500)]
Merge remote-tracking branch 'tor-github/pr/518'
Nick Mathewson [Mon, 19 Nov 2018 13:26:49 +0000 (08:26 -0500)]
Merge branch 'ticket27359_v2_squashed'
Nick Mathewson [Sat, 17 Nov 2018 18:35:52 +0000 (13:35 -0500)]
Test new functions in nodelist.c
Nick Mathewson [Sat, 17 Nov 2018 17:55:23 +0000 (12:55 -0500)]
Expose more nodelist.c functions to tests
Nick Mathewson [Sat, 17 Nov 2018 17:46:59 +0000 (12:46 -0500)]
Aim for 100% test coverage on nodefamily.c
Nick Mathewson [Tue, 23 Oct 2018 23:55:12 +0000 (19:55 -0400)]
Use nodefamily_t in microdescriptors.
Closes ticket 27359.
Nick Mathewson [Tue, 28 Aug 2018 15:34:31 +0000 (11:34 -0400)]
Backend for compact node-family representation.
This representation is meant to save memory in microdescriptors --
we can't use it in routerinfo_t yet, since those families need to be
encoded losslessly for directory voting to work.
This representation saves memory in three ways:
1. It uses only one allocation per family. (The old way used a
smartlist (2 allocs) plus one strdup per entry.)
2. It stores identity digests in binary, not hex.
3. It keeps families in a canonical format, memoizes, and
reference-counts them.
Part of #27359.
rl1987 [Sat, 17 Nov 2018 08:27:10 +0000 (10:27 +0200)]
fixup! Make ROUTERLIST_PRUNING_INTERVAL 1 hr.
rl1987 [Sat, 17 Nov 2018 08:19:25 +0000 (10:19 +0200)]
Make ROUTERLIST_PRUNING_INTERVAL 1 hr.