]>
git.ipfire.org Git - thirdparty/tor.git/log
Alexander Færøy [Fri, 14 Sep 2018 19:37:36 +0000 (21:37 +0200)]
Encode the 32-bit Global Identifier as 2 x 16-bit in the IPv6 address.
Without this patch we would encode the IPv6 address' last part as
::
ffffffff instead of ::ffff:ffff when the GID is UINT32_MAX.
See: https://bugs.torproject.org/4700
George Kadianakis [Thu, 13 Sep 2018 14:37:05 +0000 (17:37 +0300)]
Add man page entry.
George Kadianakis [Sat, 15 Sep 2018 13:33:05 +0000 (16:33 +0300)]
Add unittest for HiddenServiceExportCircuitID.
Had to move a function to test helpers.
George Kadianakis [Wed, 12 Sep 2018 12:52:41 +0000 (15:52 +0300)]
Save original virtual port in edge conn HS ident.
George Kadianakis [Wed, 12 Sep 2018 11:43:23 +0000 (14:43 +0300)]
Improve export_hs_client_circuit_id() function.
- Change default values.
- Beautify.
- Documentation.
George Kadianakis [Wed, 12 Sep 2018 11:40:19 +0000 (14:40 +0300)]
Introduce per-service HiddenServiceExportCircuitID torrc option.
Moves code to a function, better viewed with --color-moved.
Mahrud Sayrafi [Mon, 30 Jul 2018 23:10:23 +0000 (16:10 -0700)]
Encode Circuit ID as src IP in Proxy Protocol for Opportunistic Onions
Nick Mathewson [Wed, 12 Sep 2018 12:17:45 +0000 (08:17 -0400)]
Merge branch 'maint-0.3.4'
Nick Mathewson [Wed, 12 Sep 2018 12:17:42 +0000 (08:17 -0400)]
Merge remote-tracking branch 'teor/bug27464-034' into maint-0.3.4
Nick Mathewson [Wed, 12 Sep 2018 12:12:19 +0000 (08:12 -0400)]
Merge remote-tracking branch 'tor-github/pr/318'
Nick Mathewson [Tue, 11 Sep 2018 19:55:30 +0000 (15:55 -0400)]
Merge remote-tracking branch 'tor-github/pr/315'
Nick Mathewson [Tue, 11 Sep 2018 19:53:06 +0000 (15:53 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 11 Sep 2018 19:53:06 +0000 (15:53 -0400)]
Merge branch 'maint-0.3.4'
Mike Perry [Tue, 13 Mar 2018 13:50:35 +0000 (13:50 +0000)]
Bug 25505: Check circuitmux queues before padding.
Nick Mathewson [Tue, 11 Sep 2018 18:32:39 +0000 (14:32 -0400)]
Merge remote-tracking branch 'mikeperry/bug25505'
Nick Mathewson [Tue, 11 Sep 2018 18:05:16 +0000 (14:05 -0400)]
Merge remote-tracking branch 'tor-github/pr/312'
Nick Mathewson [Tue, 11 Sep 2018 17:16:49 +0000 (13:16 -0400)]
Merge remote-tracking branch 'onionk/doublevote1'
Nick Mathewson [Tue, 11 Sep 2018 17:09:21 +0000 (13:09 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 11 Sep 2018 17:09:21 +0000 (13:09 -0400)]
Merge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Tue, 11 Sep 2018 17:09:21 +0000 (13:09 -0400)]
Merge branch 'maint-0.3.4'
Nick Mathewson [Tue, 11 Sep 2018 17:09:21 +0000 (13:09 -0400)]
Merge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Tue, 11 Sep 2018 17:09:18 +0000 (13:09 -0400)]
Merge remote-tracking branch 'teor/ticket27252-034' into maint-0.3.4
Nick Mathewson [Tue, 11 Sep 2018 17:09:09 +0000 (13:09 -0400)]
Merge remote-tracking branch 'teor/ticket27252-033' into maint-0.3.3
Nick Mathewson [Tue, 11 Sep 2018 17:09:04 +0000 (13:09 -0400)]
Merge remote-tracking branch 'teor/ticket27252-032' into maint-0.3.2
Nick Mathewson [Tue, 11 Sep 2018 17:08:57 +0000 (13:08 -0400)]
Merge remote-tracking branch 'teor/ticket27252-029' into maint-0.2.9
Nick Mathewson [Tue, 11 Sep 2018 16:23:21 +0000 (12:23 -0400)]
Merge remote-tracking branch 'tor-github/pr/313'
Nick Mathewson [Tue, 11 Sep 2018 16:19:13 +0000 (12:19 -0400)]
Merge remote-tracking branch 'tor-github/pr/314'
Nick Mathewson [Tue, 11 Sep 2018 16:04:56 +0000 (12:04 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 11 Sep 2018 16:04:56 +0000 (12:04 -0400)]
Merge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Tue, 11 Sep 2018 16:04:56 +0000 (12:04 -0400)]
Merge branch 'maint-0.3.4'
Nick Mathewson [Tue, 11 Sep 2018 16:04:55 +0000 (12:04 -0400)]
Merge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Tue, 11 Sep 2018 14:35:18 +0000 (10:35 -0400)]
Initialize 't' in ge25519_scalarmult_base_niels()
OSS-Fuzz's version of memorysanitizer can't tell that this value is
not going to be used unsafely.
Karsten Loesing [Tue, 11 Sep 2018 07:26:59 +0000 (09:26 +0200)]
Update geoip and geoip6 to the September 6 2018 database.
Taylor Yu [Fri, 31 Aug 2018 17:56:23 +0000 (12:56 -0500)]
Defer reporting directory bootstrap progress
Existing cached directory information can cause misleadingly high
bootstrap percentages. To improve user experience, defer reporting of
directory information progress until at least one connection has
succeeded to a relay or bridge.
Closes ticket 27169.
rl1987 [Mon, 10 Sep 2018 18:50:30 +0000 (21:50 +0300)]
Bugfix: sizeof(socklen) doesn't make sense when calling connect()
Bugfix on
2f657a1416f2f81dd1be900269c4ae9bdb29f52d ; bug not in
any Tor release.
Taylor Yu [Fri, 31 Aug 2018 22:54:09 +0000 (17:54 -0500)]
Track bootstrap phase independently of progress
Track bootstrap phase (enumerated by bootstrap_status_t) independently
from the bootstrap progress (which can represent intermediate
progress). This allows control_event_bootstrap_problem() to avoid
doing a linear search through the bootstrap progress space to find the
current bootstrap phase.
Taylor Yu [Tue, 28 Aug 2018 19:52:44 +0000 (14:52 -0500)]
Refactor control_event_bootstrap_core() more
Eliminate a few conditional expressions in
control_event_bootstrap_core() by overwriting the status parameter.
Taylor Yu [Tue, 28 Aug 2018 19:31:51 +0000 (14:31 -0500)]
Refactor control_event_bootstrap() somewhat
Move the mostly-invariant part of control_event_boostrap() into a
helper control_event_bootstrap_core(). The helper doesn't modify any
state beyond doing logging and control port notifications.
Taylor Yu [Tue, 28 Aug 2018 19:18:10 +0000 (14:18 -0500)]
Deindent much of control_event_bootstrap
Taylor Yu [Tue, 28 Aug 2018 18:30:58 +0000 (13:30 -0500)]
Make control_event_bootstrap() return void
Simplify control_event_bootstrap() by making it return void again. It
is currently a fairly complicated function, and it's made more
complicated by returning an int to signal whether it logged at NOTICE
or INFO.
The callers conditionally log messages at level NOTICE based on this
return value. Change the callers to unconditionally log their verbose
human-readable messages at level INFO to keep NOTICE logs less
cluttered.
This partially reverts the changes of #14950.
David Goulet [Mon, 10 Sep 2018 14:28:35 +0000 (10:28 -0400)]
test: Fix coverity CID
1439129
One HSv3 unit test used "tor_memeq()" without checking the return value. This
commit changes that to use "tt_mem_op()" to actually make the test validate
something :).
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 10 Sep 2018 14:22:31 +0000 (10:22 -0400)]
test: Fix coverity CID
1439130
Trivial fix of removing an uneeded NULL check in an HS v3 unit test.
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 10 Sep 2018 14:20:58 +0000 (10:20 -0400)]
test: Fix coverity CID
1439131
Simple uninitialized object that we could free in an HS v3 unit test.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Mon, 10 Sep 2018 14:03:01 +0000 (10:03 -0400)]
Copy changelogs and releasenotes to master
George Kadianakis [Mon, 10 Sep 2018 13:47:28 +0000 (16:47 +0300)]
Address coverity warnings (CID
1439133 /
1439132 ).
>>>> CID
1439133 : Null pointer dereferences (REVERSE_INULL)
>>>> Null-checking "fields" suggests that it may be null, but it
>>>> has already been dereferenced on all paths leading to the check.
>>>> CID
1439132 : Null pointer dereferences (REVERSE_INULL)
>>>> Null-checking "fields" suggests that it may be null, but it
>>>> has already been dereferenced on all paths leading to the check.
Nick Mathewson [Mon, 10 Sep 2018 13:42:50 +0000 (09:42 -0400)]
Merge branch 'maint-0.3.4'
"ours" to avoid version bump.
Nick Mathewson [Mon, 10 Sep 2018 13:42:40 +0000 (09:42 -0400)]
Bump to 0.3.4.8-dev
Nick Mathewson [Mon, 10 Sep 2018 13:42:22 +0000 (09:42 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
"ours" to avoid version bump.
Nick Mathewson [Mon, 10 Sep 2018 13:42:12 +0000 (09:42 -0400)]
Bump to 0.3.3.10-dev.
Nick Mathewson [Mon, 10 Sep 2018 13:41:55 +0000 (09:41 -0400)]
Merge branch 'maint-0.3.2' into maint-0.3.3
"ours" to avoid version bump.
Nick Mathewson [Mon, 10 Sep 2018 13:41:39 +0000 (09:41 -0400)]
Merge branch 'maint-0.2.9' into maint-0.3.2
"ours" to avoid version bump.
Nick Mathewson [Mon, 10 Sep 2018 13:41:34 +0000 (09:41 -0400)]
Bump to 0.3.2.12-dev
Nick Mathewson [Mon, 10 Sep 2018 13:41:22 +0000 (09:41 -0400)]
Bump to 0.2.9.17-dev
rl1987 [Tue, 4 Sep 2018 18:39:11 +0000 (21:39 +0300)]
Call event_set_mem_functions during initialization
Nick Mathewson [Sun, 9 Sep 2018 14:15:44 +0000 (10:15 -0400)]
Refactor initialization in curve25519_basepoint_spot_check
This is an attempt to work around what I think may be a bug in
OSS-Fuzz, which thinks that uninitialized data might be passed to
the curve25519 functions.
Roger Dingledine [Sat, 8 Sep 2018 21:08:22 +0000 (17:08 -0400)]
make ipv6-only config complaint clearer
(a relay operator hit this on #tor-relays and couldn't make sense
of it. i couldn't either until i went to go read the code.)
Nick Mathewson [Fri, 7 Sep 2018 19:14:03 +0000 (15:14 -0400)]
Merge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 19:12:27 +0000 (15:12 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
"ours" to avoid bump.
Nick Mathewson [Fri, 7 Sep 2018 19:12:09 +0000 (15:12 -0400)]
Merge branch 'maint-0.3.2' into maint-0.3.3
"ours" to avoid bump
Nick Mathewson [Fri, 7 Sep 2018 19:11:49 +0000 (15:11 -0400)]
Merge branch 'maint-0.2.9' into maint-0.3.2
"ours" to avoid bump
Nick Mathewson [Fri, 7 Sep 2018 19:11:18 +0000 (15:11 -0400)]
Bump to 0.3.3.10
Nick Mathewson [Fri, 7 Sep 2018 19:11:07 +0000 (15:11 -0400)]
Bump to 0.3.2.12
Nick Mathewson [Fri, 7 Sep 2018 19:10:49 +0000 (15:10 -0400)]
Bump to 0.2.9.17
Nick Mathewson [Fri, 7 Sep 2018 19:03:32 +0000 (15:03 -0400)]
Merge remote-tracking branch 'dgoulet/ticket20700_035_03'
George Kadianakis [Fri, 7 Sep 2018 15:06:44 +0000 (18:06 +0300)]
HSv3: Don't assert when reading bad client-side privkeys.
George Kadianakis [Thu, 6 Sep 2018 13:25:31 +0000 (16:25 +0300)]
HSv3: Add subcredential in client auth KDF on the client-side.
George Kadianakis [Thu, 6 Sep 2018 13:07:27 +0000 (16:07 +0300)]
HSv3: Add subcredential in client auth KDF on the service-side.
Also update some client auth test vectors that broke...
David Goulet [Wed, 5 Sep 2018 17:37:37 +0000 (13:37 -0400)]
hs-v3: Make hs_desc_build_fake_authorized_client() return an object
Return a newly allocated fake client authorization object instead of taking
the object as a parameter.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sun, 2 Sep 2018 20:19:24 +0000 (03:19 +0700)]
bug: Use PATH_SEPARATOR instead of slash
In function get_fname_suffix, previously it uses /, but in fact it
should use PATH_SEPARATOR.
David Goulet [Thu, 30 Aug 2018 13:16:48 +0000 (09:16 -0400)]
hs-v3: Improve v3 client authorization logging
Part of #20700.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sun, 19 Aug 2018 12:47:46 +0000 (19:47 +0700)]
hs-v3: Log client auth load activities client side
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sun, 19 Aug 2018 12:37:38 +0000 (19:37 +0700)]
hs-v3: Log client auth load activities service side
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Mon, 21 May 2018 17:09:40 +0000 (00:09 +0700)]
hs-v3: Rename client_pk to client_auth_pk
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Mon, 21 May 2018 17:01:52 +0000 (00:01 +0700)]
hs-v3: Rename client_sk to client_auth_sk
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Wed, 16 May 2018 14:57:24 +0000 (21:57 +0700)]
test: HS v3 client auth is config equal function
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Wed, 9 May 2018 20:35:29 +0000 (03:35 +0700)]
hs-v3: Republish descriptors if client auth changes
When reloading tor, check if our the configured client authorization have
changed from what we previously had. If so, republish the updated descriptor.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Wed, 9 May 2018 20:14:01 +0000 (03:14 +0700)]
hs-v3: Make all descriptor content free functions public
Series of functions that we now need in hs_service.c.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sun, 22 Apr 2018 13:51:21 +0000 (20:51 +0700)]
hs-v3: Re-enable the decoding in the encoding function
Previously, the validation by decoding a created descriptor was disabled
because the interface had to be entirely changed and not implemented at the
time.
This commit re-enabled it because it is now implemented.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sat, 21 Apr 2018 18:13:50 +0000 (01:13 +0700)]
test: HS v3 descriptor decoding with client authorization
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Thu, 19 Apr 2018 19:10:19 +0000 (02:10 +0700)]
hs-v3: Decrypt the descriptor with client private key
Parse the client authorization section from the descriptor, use the client
private key to decrypt the auth clients, and then use the descriptor cookie to
decrypt the descriptor.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Thu, 19 Apr 2018 15:44:17 +0000 (22:44 +0700)]
hs-v3: Refactor the descriptor decryption/decoding
This commit refactors the existing decryption code to make it compatible with
a new logic for when the client authorization is enabled.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Thu, 19 Apr 2018 15:36:59 +0000 (22:36 +0700)]
hs-v3: Refactor secret data building logic
Because this secret data building logic is not only used by the descriptor
encoding process but also by the descriptor decoding, refactor the function to
take both steps into account.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sun, 19 Aug 2018 01:26:43 +0000 (08:26 +0700)]
test: HS v3 client authorization loading secret key
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sun, 19 Aug 2018 01:22:13 +0000 (08:22 +0700)]
hs-v3: Load client authorization secret key from file
The new ClientOnionAuthDir option is introduced which is where tor looks to
find the HS v3 client authorization files containing the client private key
material.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sat, 14 Apr 2018 10:50:07 +0000 (17:50 +0700)]
test: HS v3 descriptor encoding with client authorization
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Fri, 13 Apr 2018 21:04:31 +0000 (04:04 +0700)]
hs-v3: Encrypt the descriptor using a cookie
Previously, we encrypted the descriptor without the descriptor cookie. This
commit, when the client auth is enabled, the descriptor cookie is always used.
I also removed the code that is used to generate fake auth clients because it
will not be used anymore.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Thu, 12 Apr 2018 21:56:17 +0000 (04:56 +0700)]
test: Build an HSv3 descriptor with authorized client
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Thu, 12 Apr 2018 21:52:46 +0000 (04:52 +0700)]
test: HS v3 building a descriptor with client auth
This commit tests that the descriptor building result, when the client
authorization is enabled, includes everything that is needed.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Mon, 9 Apr 2018 16:09:41 +0000 (23:09 +0700)]
hs-v3: Generate all descriptor related keys
We need to generate all the related keys when building the descriptor, so that
we can encrypt the descriptor.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sat, 18 Aug 2018 14:24:26 +0000 (21:24 +0700)]
test: HS v3 loading client auth keys service side
Signed-off-by: David Goulet <dgoulet@torproject.org>
Suphanat Chunhapanya [Sat, 18 Aug 2018 05:28:12 +0000 (12:28 +0700)]
hs-v3: Load all client auth keys to the service
This commit loads all client public keys from every file in
`authorized_clients/` directory.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Fri, 7 Sep 2018 14:29:45 +0000 (10:29 -0400)]
Merge remote-tracking branch 'teor/bug27521'
Nick Mathewson [Fri, 7 Sep 2018 13:49:41 +0000 (09:49 -0400)]
Merge branch 'maint-0.3.4'
"ours" to avoid version bump
Nick Mathewson [Fri, 7 Sep 2018 13:49:29 +0000 (09:49 -0400)]
Bump to 0.3.4.8
Nick Mathewson [Fri, 7 Sep 2018 13:39:54 +0000 (09:39 -0400)]
in master, remove changes files for already-merged changes
Nick Mathewson [Fri, 7 Sep 2018 13:32:31 +0000 (09:32 -0400)]
Copy updated 0.3.4.6-rc changelog to master
Forward-ports fix for 27488.
Nick Mathewson [Fri, 7 Sep 2018 13:15:56 +0000 (09:15 -0400)]
Merge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 7 Sep 2018 13:15:56 +0000 (09:15 -0400)]
Merge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 13:15:56 +0000 (09:15 -0400)]
Merge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 13:15:52 +0000 (09:15 -0400)]
Merge branch 'maint-0.2.9' into maint-0.3.2