]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Wed, 31 Oct 2018 14:06:30 +0000 (10:06 -0400)]
Merge branch 'networkstatus_mmap_merge'
Nick Mathewson [Wed, 31 Oct 2018 13:04:12 +0000 (09:04 -0400)]
Merge branch 'networkstatus_mmap' into networkstatus_mmap_merge
Nick Mathewson [Wed, 31 Oct 2018 12:30:48 +0000 (08:30 -0400)]
Fix memory leak (#28257, CID
1440805 ).
David Goulet [Tue, 30 Oct 2018 15:44:14 +0000 (11:44 -0400)]
Merge branch 'maint-0.3.5'
David Goulet [Tue, 30 Oct 2018 15:43:54 +0000 (11:43 -0400)]
Merge branch 'tor-github/pr/438' into maint-0.3.5
David Goulet [Tue, 30 Oct 2018 15:37:44 +0000 (11:37 -0400)]
Merge branch 'maint-0.3.5'
David Goulet [Tue, 30 Oct 2018 15:36:36 +0000 (11:36 -0400)]
Merge branch 'tor-github/pr/415' into maint-0.3.5
David Goulet [Tue, 30 Oct 2018 15:29:30 +0000 (11:29 -0400)]
Merge branch 'maint-0.3.5'
David Goulet [Tue, 30 Oct 2018 15:28:53 +0000 (11:28 -0400)]
hs-v3: Add changes file for 28026
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Tigas [Fri, 12 Oct 2018 21:15:11 +0000 (17:15 -0400)]
tweak manpage bits about v3 onion svc client auth
make a couple things more explicit, like not needing to set "HiddenServiceAuthorizeClient" & etc
David Goulet [Tue, 30 Oct 2018 14:55:10 +0000 (10:55 -0400)]
Merge branch 'maint-0.3.5'
Neel Chauhan [Wed, 24 Oct 2018 16:20:28 +0000 (12:20 -0400)]
Add changes file for Bug #28127
Neel Chauhan [Wed, 24 Oct 2018 16:20:10 +0000 (12:20 -0400)]
Add test for HiddenServiceAuthorizeClient and v3 onion services
Neel Chauhan [Wed, 24 Oct 2018 16:19:42 +0000 (12:19 -0400)]
Detect the onion service version and then check for invalid options unless we have set HiddenServiceVersion
Nick Mathewson [Tue, 30 Oct 2018 13:35:11 +0000 (09:35 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Tue, 30 Oct 2018 13:35:11 +0000 (09:35 -0400)]
Merge branch 'maint-0.3.4' into maint-0.3.5
Nick Mathewson [Tue, 30 Oct 2018 13:35:07 +0000 (09:35 -0400)]
Merge remote-tracking branch 'tor-github/pr/431' into maint-0.3.5
Nick Mathewson [Tue, 30 Oct 2018 13:34:04 +0000 (09:34 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 30 Oct 2018 13:33:36 +0000 (09:33 -0400)]
Merge remote-tracking branch 'tor-github/pr/346' into maint-0.3.3
Nick Mathewson [Tue, 30 Oct 2018 13:16:55 +0000 (09:16 -0400)]
Merge remote-tracking branch 'tor-github/pr/425'
Nick Mathewson [Tue, 30 Oct 2018 13:05:42 +0000 (09:05 -0400)]
Merge branch 'ticket23082_squashed'
rl1987 [Sat, 1 Sep 2018 18:22:47 +0000 (21:22 +0300)]
Code cleanups for tor_addr_parse()
rl1987 [Sat, 1 Sep 2018 17:56:33 +0000 (20:56 +0300)]
Move a check for trailing colon to tor_inet_pton()
That way, string_is_valid_ipv6_address() can benefit from it
Nick Mathewson [Tue, 30 Oct 2018 12:45:49 +0000 (08:45 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Tue, 30 Oct 2018 12:45:35 +0000 (08:45 -0400)]
Add a changes file for Alex Crichton's rust fixes.
Nick Mathewson [Tue, 30 Oct 2018 12:39:57 +0000 (08:39 -0400)]
Merge remote-tracking branch 'tor-github/pr/381' into maint-0.3.5
Nick Mathewson [Mon, 29 Oct 2018 20:30:44 +0000 (16:30 -0400)]
Merge branch 'ticket28225_036_01_squashed'
David Goulet [Mon, 29 Oct 2018 12:58:19 +0000 (08:58 -0400)]
doc: Add Maintaining.md documentation
Closes #28225
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Mon, 29 Oct 2018 19:59:11 +0000 (15:59 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Mon, 29 Oct 2018 19:59:06 +0000 (15:59 -0400)]
Merge branch '27913_rebased_035' into maint-0.3.5
Nick Mathewson [Mon, 29 Oct 2018 19:57:31 +0000 (15:57 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Mon, 29 Oct 2018 19:57:31 +0000 (15:57 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Mon, 29 Oct 2018 19:57:31 +0000 (15:57 -0400)]
Merge branch 'maint-0.3.4' into maint-0.3.5
rl1987 [Fri, 19 Oct 2018 18:40:12 +0000 (21:40 +0300)]
Make sure we're not running distcheck and test-stem on the same CI job
rl1987 [Fri, 19 Oct 2018 18:19:39 +0000 (21:19 +0300)]
Log stem commit id
rl1987 [Fri, 19 Oct 2018 15:30:33 +0000 (18:30 +0300)]
Try putting stem repo cloning into install part of config
Also print stem version when we have it downloaded
rl1987 [Tue, 16 Oct 2018 10:11:42 +0000 (13:11 +0300)]
Save time in CI test-stem job
When running `make test-stem` on Travis, we should refrain from
also running `make check`. Furthermore, let's limit compilation
to src/app/tor target.
rl1987 [Fri, 12 Oct 2018 08:02:58 +0000 (11:02 +0300)]
Add changes file
rl1987 [Sun, 7 Oct 2018 15:41:05 +0000 (18:41 +0300)]
Try running test-stem on travis
Nick Mathewson [Mon, 29 Oct 2018 18:51:00 +0000 (14:51 -0400)]
Merge remote-tracking branch 'tor-github/pr/447'
Nick Mathewson [Mon, 29 Oct 2018 18:49:15 +0000 (14:49 -0400)]
Merge remote-tracking branch 'tor-github/pr/446'
Alex Crichton [Mon, 29 Oct 2018 17:00:23 +0000 (10:00 -0700)]
Only pass `-C default-linker-libraries` with sanitizers
This'll help retain test compatibility until 1.31.0 is released!
teor [Mon, 29 Oct 2018 03:49:47 +0000 (13:49 +1000)]
doc: Use `` for commands and "" for quotes in ReleasingTor.md
teor [Mon, 29 Oct 2018 03:47:43 +0000 (13:47 +1000)]
doc: Spell make test-network-all correctly in ReleasingTor.md
Closes ticket 28821.
George Kadianakis [Fri, 26 Oct 2018 11:55:17 +0000 (14:55 +0300)]
HSv3: Correctly memwipe client auth keystream.
Wipe the whole thing, not just the size of the pointer.
rl1987 [Fri, 26 Oct 2018 07:26:47 +0000 (10:26 +0300)]
In configured_nameserver_address, check if tor_addr_from_sockaddr succeeded
Nick Mathewson [Thu, 25 Oct 2018 13:24:15 +0000 (09:24 -0400)]
Add a couple more checks to test_parsecommon.c
These checks should make coverity stop giving us a "dereference
before null check" warning here.
Nick Mathewson [Thu, 25 Oct 2018 13:15:53 +0000 (09:15 -0400)]
Merge branch 'bug28202_033' into bug28202_035
Nick Mathewson [Thu, 25 Oct 2018 13:14:06 +0000 (09:14 -0400)]
Merge branch 'bug28202_029' into bug28202_033
Nick Mathewson [Thu, 25 Oct 2018 13:08:02 +0000 (09:08 -0400)]
Fix two other cases of (buf + N > end) pattern
Related to fix for 28202.
Nick Mathewson [Thu, 25 Oct 2018 13:06:13 +0000 (09:06 -0400)]
Fix possible UB in an end-of-string check in get_next_token().
Remember, you can't check to see if there are N bytes left in a
buffer by doing (buf + N < end), since the buf + N computation might
take you off the end of the buffer and result in undefined behavior.
Fixes 28202; bugfix on 0.2.0.3-alpha.
Nick Mathewson [Wed, 24 Oct 2018 16:59:51 +0000 (12:59 -0400)]
Merge branch 'ticket28177'
Nick Mathewson [Wed, 24 Oct 2018 16:57:26 +0000 (12:57 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Wed, 24 Oct 2018 16:57:14 +0000 (12:57 -0400)]
Merge branch 'maint-0.3.4' into maint-0.3.5
"ours" to avoid taking a second instance of 27797.
Nick Mathewson [Wed, 24 Oct 2018 15:06:34 +0000 (11:06 -0400)]
Fix remaining cases of using consensus without a len parameter.
(Thanks to cyberpunks for noting two of them!)
David Goulet [Thu, 20 Sep 2018 12:50:27 +0000 (08:50 -0400)]
node: Make node_supports_v3_rendezvous_point() also check for the key
It is not enough to look at protover for v3 rendezvous support but also we
need to make sure that the curve25519 onion key is present or in other words
that the descriptor has been fetched and does contain it.
Fixes #27797.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Wed, 24 Oct 2018 14:20:53 +0000 (10:20 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Wed, 24 Oct 2018 14:20:41 +0000 (10:20 -0400)]
Merge branch 'ticket28115_035' into maint-0.3.5
Nick Mathewson [Wed, 24 Oct 2018 13:09:40 +0000 (09:09 -0400)]
Re-alphabetize the list of tests in tests.[ch]
Nick Mathewson [Wed, 24 Oct 2018 13:06:29 +0000 (09:06 -0400)]
Merge remote-tracking branch 'tor-github/pr/409'
Nick Mathewson [Wed, 24 Oct 2018 13:02:06 +0000 (09:02 -0400)]
Merge branch 'maint-0.3.5'
cypherpunks [Tue, 23 Oct 2018 17:12:13 +0000 (17:12 +0000)]
rust/tor_log: fix C_RUST_COUPLED documentation
This file was moved in
97b15a1d7c51764888d2172711e3f3a71fb01916
and moved again in
e7f5f48d68553206b95cbb4f610702c887500124 .
Nick Mathewson [Wed, 24 Oct 2018 12:57:28 +0000 (08:57 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Wed, 24 Oct 2018 12:57:22 +0000 (08:57 -0400)]
Merge branch 'nss-travis' into maint-0.3.5
Nick Mathewson [Tue, 23 Oct 2018 23:54:16 +0000 (19:54 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Tue, 23 Oct 2018 23:54:04 +0000 (19:54 -0400)]
Merge branch 'maint-0.3.4' into maint-0.3.5
"ours" version to avoid removing rust use declaration.
Nick Mathewson [Tue, 23 Oct 2018 23:50:53 +0000 (19:50 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 23 Oct 2018 23:50:45 +0000 (19:50 -0400)]
Remove a now-unused rust "use".
Nick Mathewson [Tue, 23 Oct 2018 23:22:05 +0000 (19:22 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Tue, 23 Oct 2018 23:21:44 +0000 (19:21 -0400)]
Merge branch 'maint-0.3.4' into maint-0.3.5
Nick Mathewson [Tue, 23 Oct 2018 23:18:23 +0000 (19:18 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 23 Oct 2018 23:17:48 +0000 (19:17 -0400)]
Merge remote-tracking branch 'onionk/rust-allsupportednull1' into maint-0.3.3
George Kadianakis [Tue, 23 Oct 2018 13:43:08 +0000 (16:43 +0300)]
Documentation: Move the hs_service_descriptor_t elements around.
Move the elements around to concentrate mutable and immutable elements
together. This commit changes no code, check with --color-moved.
George Kadianakis [Tue, 23 Oct 2018 13:34:43 +0000 (16:34 +0300)]
Documentation: Document which descriptor elements are (im)mutable.
George Kadianakis [Tue, 23 Oct 2018 13:35:02 +0000 (16:35 +0300)]
Func rename: Make it clear that update_all_descriptors() does intro points.
With the new refresh_service_descriptor() function we had both
refresh_service_descriptor() and update_service_descriptor() which is basically
the same thing.
This commit renames update_service_descriptor() to
update_service_descriptor_intro_points() to make it clear it's not a generic
refresh and it's only about intro points.
Commit changes no code.
David Goulet [Mon, 22 Oct 2018 20:18:44 +0000 (16:18 -0400)]
hs-v3: Create desc signing key cert before uploading
Before this commit, we would create the descriptor signing key certificate
when first building the descriptor.
In some extreme cases, it lead to the expiry of the certificate which triggers
a BUG() when encoding the descriptor before uploading.
Ticket #27838 details a possible scenario in which this can happen. It is an
edge case where tor losts internet connectivity, notices it and closes all
circuits. When it came back up, the HS subsystem noticed that it had no
introduction circuits, created them and tried to upload the descriptor.
However, in the meantime, if tor did lack a live consensus because it is
currently seeking to download one, we would consider that we don't need to
rotate the descriptors leading to using the expired signing key certificate.
That being said, this commit does a bit more to make this process cleaner.
There are a series of things that we need to "refresh" before uploading a
descriptor: signing key cert, intro points and revision counter.
A refresh function is added to deal with all mutable descriptor fields. It in
turn simplified a bit the code surrounding the creation of the plaintext data.
We keep creating the cert when building the descriptor in order to accomodate
the unit tests. However, it is replaced every single time the descriptor is
uploaded.
Fixes #27838
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Mon, 22 Oct 2018 12:49:55 +0000 (08:49 -0400)]
Merge remote-tracking branch 'tor-github/pr/421'
Roger Dingledine [Mon, 22 Oct 2018 03:46:09 +0000 (23:46 -0400)]
clean up a tor2web comment
rl1987 [Sat, 20 Oct 2018 17:32:26 +0000 (20:32 +0300)]
Exclude test and a supporting function when evdns_base_get_nameserver_addr() is not available
rl1987 [Sat, 20 Oct 2018 17:18:54 +0000 (20:18 +0300)]
Check if libevent comes with evdns_base_get_nameserver_addr()
rl1987 [Sat, 20 Oct 2018 17:15:06 +0000 (20:15 +0300)]
Unit test for DNS fallback in configure_nameservers
rl1987 [Mon, 13 Aug 2018 16:05:40 +0000 (19:05 +0300)]
Add changes file
rl1987 [Mon, 13 Aug 2018 15:48:32 +0000 (18:48 +0300)]
Mention DNS fallback in manpage
rl1987 [Mon, 13 Aug 2018 15:31:27 +0000 (18:31 +0300)]
Fallback to local DNS when no other nameservers are known
Nick Mathewson [Fri, 19 Oct 2018 18:29:01 +0000 (14:29 -0400)]
Merge remote-tracking branch 'tor-github/pr/396'
Nick Mathewson [Fri, 19 Oct 2018 18:21:01 +0000 (14:21 -0400)]
Merge branch 'maint-0.3.5'
Nick Mathewson [Fri, 19 Oct 2018 18:20:57 +0000 (14:20 -0400)]
Merge remote-tracking branch 'onionk/rust-protocommas1' into maint-0.3.5
Nick Mathewson [Fri, 19 Oct 2018 18:20:43 +0000 (14:20 -0400)]
Merge remote-tracking branch 'onionk/rust-protocommas1'
Nick Mathewson [Fri, 19 Oct 2018 12:42:28 +0000 (08:42 -0400)]
Rename a function; it is used to convert a value _From_ le.
We can't use htons()/ntohs() -- those are no-ops on exactly the
wrong platforms.
Nick Mathewson [Fri, 19 Oct 2018 12:41:25 +0000 (08:41 -0400)]
Fix a misspelled macro test that was breaking big-endian OPE
Fixes bug 28115; bugfix on 0.3.5.1-alpha.
Nick Mathewson [Thu, 18 Oct 2018 17:01:41 +0000 (13:01 -0400)]
Merge remote-tracking branch 'dgoulet/ticket27471_035_02'
David Goulet [Fri, 12 Oct 2018 14:30:33 +0000 (10:30 -0400)]
test: Add test for closing intro circuits when storing a new descriptor
This is client side and related to 27471 for previous commit that fixes this
issue.
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 12 Oct 2018 13:22:30 +0000 (09:22 -0400)]
hs-v3: Close client intro circuits if the descriptor is replaced
When storing a descriptor in the client cache, if we are about to replace an
existing descriptor, make sure to close every introduction circuits of the old
descriptor so we don't have leftovers lying around.
Ticket 27471 describes a situation where tor is sending an INTRODUCE1 cell on
an introduction circuit for which it doesn't have a matching intro point
object (taken from the descriptor).
The main theory is that, after a new descriptor showed up, the introduction
points changed which led to selecting an introduction circuit not used by the
service anymore thus for which we are unable to find the corresponding
introduction point within the descriptor we just fetched.
Closes #27471.
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 18 Oct 2018 15:44:26 +0000 (11:44 -0400)]
hs-v3: Always generate the descriptor cookie
It won't be used if there are no authorized client configured. We do that so
we can easily support the addition of a client with a HUP signal which allow
us to avoid more complex code path to generate that cookie if we have at least
one client auth and we had none before.
Fixes #27995
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Thu, 18 Oct 2018 14:16:30 +0000 (10:16 -0400)]
Merge branch 'ticket27549_035_01_squashed'
David Goulet [Tue, 18 Sep 2018 17:50:12 +0000 (13:50 -0400)]
hs-v3: Consolidate descriptor cookie computation code
Both client and service had their own code for this. Consolidate into one
place so we avoid duplication.
Closes #27549
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Thu, 18 Oct 2018 13:12:58 +0000 (09:12 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Thu, 18 Oct 2018 13:12:58 +0000 (09:12 -0400)]
Merge branch 'maint-0.3.4' into maint-0.3.5
Nick Mathewson [Thu, 18 Oct 2018 13:12:58 +0000 (09:12 -0400)]
Merge branch 'maint-0.3.5'
Taylor Yu [Wed, 17 Oct 2018 20:51:03 +0000 (15:51 -0500)]
Merge branch 'bug27800-034' into bug27800-035