]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
7 years agoMerge remote-tracking branch 'dgoulet/ticket27774_035_03'
Nick Mathewson [Fri, 21 Sep 2018 17:02:12 +0000 (13:02 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket27774_035_03'

7 years agoman: Fix format typo for HiddenServiceExportCircuitID
David Goulet [Fri, 21 Sep 2018 13:54:22 +0000 (09:54 -0400)] 
man: Fix format typo for HiddenServiceExportCircuitID

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoMerge remote-tracking branch 'ahf-github/asn/bugs4700_2'
Nick Mathewson [Fri, 21 Sep 2018 13:40:16 +0000 (09:40 -0400)] 
Merge remote-tracking branch 'ahf-github/asn/bugs4700_2'

7 years agoChanges file for #26747
Nick Mathewson [Fri, 21 Sep 2018 13:38:51 +0000 (09:38 -0400)] 
Changes file for #26747

7 years agoMerge branch 'split_mainloop_onion'
Nick Mathewson [Fri, 21 Sep 2018 13:37:23 +0000 (09:37 -0400)] 
Merge branch 'split_mainloop_onion'

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 21 Sep 2018 13:36:31 +0000 (09:36 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 21 Sep 2018 13:35:54 +0000 (09:35 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 21 Sep 2018 13:35:51 +0000 (09:35 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2 maint-0.3.2
Nick Mathewson [Fri, 21 Sep 2018 13:35:23 +0000 (09:35 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoMerge remote-tracking branch 'dgoulet/ticket27797_035_01'
Nick Mathewson [Fri, 21 Sep 2018 13:33:03 +0000 (09:33 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket27797_035_01'

7 years agoSplit main.c into main.c and mainloop.c
Nick Mathewson [Thu, 20 Sep 2018 19:19:43 +0000 (15:19 -0400)] 
Split main.c into main.c and mainloop.c

The main.c code is responsible for initialization and shutdown;
the mainloop.c code is responsible for running the main loop of Tor.

Splitting the "generic event loop" part of mainloop.c from the
event-loop-specific part is not done as part of this patch.

7 years agoMove the non-crypto parts of onion.c out of src/core/crypto
Nick Mathewson [Thu, 20 Sep 2018 17:55:02 +0000 (13:55 -0400)] 
Move the non-crypto parts of onion.c out of src/core/crypto

The parts for handling cell formats should be in src/core/or.

The parts for handling onionskin queues should be in src/core/or.

Only the crypto wrapper belongs in src/core/crypto.

7 years agoBump to 0.3.5.2-alpha-dev
Nick Mathewson [Fri, 21 Sep 2018 13:11:33 +0000 (09:11 -0400)] 
Bump to 0.3.5.2-alpha-dev

7 years agoDocument the haproxy option of HiddenServiceExportCircuitID.
Alexander Færøy [Thu, 20 Sep 2018 19:15:25 +0000 (21:15 +0200)] 
Document the haproxy option of HiddenServiceExportCircuitID.

See: https://bugs.torproject.org/4700

7 years agohs-v3: Don't BUG() if the RP node_t is invalid client side
David Goulet [Thu, 20 Sep 2018 13:32:13 +0000 (09:32 -0400)] 
hs-v3: Don't BUG() if the RP node_t is invalid client side

When sending the INTRODUCE1 cell, we acquire the needed data for the cell but
if the RP node_t has invalid data, we'll fail the send and completely kill the
SOCKS connection.

Instead, close the rendezvous circuit and return a transient error meaning
that Tor can recover by selecting a new rendezvous point. We'll also do the
same when we are unable to encode the INTRODUCE1 cell for which at that point,
we'll simply take another shot at a new rendezvous point.

Fixes #27774

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoSet a release date tor-0.3.5.2-alpha
Nick Mathewson [Fri, 21 Sep 2018 12:12:50 +0000 (08:12 -0400)] 
Set a release date

7 years agoPut dirlist_free_all back in routerlist_free_all for unit tests
Nick Mathewson [Fri, 21 Sep 2018 12:10:39 +0000 (08:10 -0400)] 
Put dirlist_free_all back in routerlist_free_all for unit tests

7 years agoBump to 0.3.5.2-alpha
Nick Mathewson [Thu, 20 Sep 2018 20:36:07 +0000 (16:36 -0400)] 
Bump to 0.3.5.2-alpha

7 years agoStart on an 0.3.5.2-alpha changelog
Nick Mathewson [Thu, 20 Sep 2018 20:35:36 +0000 (16:35 -0400)] 
Start on an 0.3.5.2-alpha changelog

7 years agochanges for 27799
Nick Mathewson [Thu, 20 Sep 2018 20:30:33 +0000 (16:30 -0400)] 
changes for 27799

7 years agoMerge remote-tracking branch 'dgoulet/ticket27410_035_01'
Nick Mathewson [Thu, 20 Sep 2018 20:22:16 +0000 (16:22 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket27410_035_01'

7 years agoMerge remote-tracking branch 'dgoulet/ticket27410_032_01'
Nick Mathewson [Thu, 20 Sep 2018 20:22:02 +0000 (16:22 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket27410_032_01'

7 years agoSupport 'none' in torrc for HiddenServiceExportCircuitID.
Alexander Færøy [Thu, 20 Sep 2018 18:59:42 +0000 (20:59 +0200)] 
Support 'none' in torrc for HiddenServiceExportCircuitID.

See: https://bugs.torproject.org/4700

7 years agoMerge branch 'bug23512-v4-029-fixes'
Nick Mathewson [Thu, 20 Sep 2018 18:41:44 +0000 (14:41 -0400)] 
Merge branch 'bug23512-v4-029-fixes'

7 years agoRemove another needless typedef
Nick Mathewson [Thu, 20 Sep 2018 18:34:44 +0000 (14:34 -0400)] 
Remove another needless typedef

7 years agoMerge branch 'bug23512-v4-029-fixes'
Nick Mathewson [Thu, 20 Sep 2018 18:19:47 +0000 (14:19 -0400)] 
Merge branch 'bug23512-v4-029-fixes'

7 years agoFix a pair of errors in bug23512
Nick Mathewson [Thu, 20 Sep 2018 18:18:09 +0000 (14:18 -0400)] 
Fix a pair of errors in bug23512

7 years agoFix an NSS socket leak-on-error found by dgoulet
Nick Mathewson [Thu, 20 Sep 2018 17:53:04 +0000 (13:53 -0400)] 
Fix an NSS socket leak-on-error found by dgoulet

7 years agoUse the correct macro to detect an invalid socket in tortls_nss.c
Nick Mathewson [Thu, 20 Sep 2018 16:55:31 +0000 (12:55 -0400)] 
Use the correct macro to detect an invalid socket in tortls_nss.c

Fixes bug 27782; bugfix on 0.3.5.1-alpha

7 years agoRelease ownership of the dummy socket that tortls_nss.c will close
Nick Mathewson [Thu, 20 Sep 2018 16:53:39 +0000 (12:53 -0400)] 
Release ownership of the dummy socket that tortls_nss.c will close

Related to #27795 -- since NSS will close the socket, we must not
count it as owned by Tor.

7 years agoFix socket accounting with ORConn sockets.
Nick Mathewson [Thu, 20 Sep 2018 16:52:29 +0000 (12:52 -0400)] 
Fix socket accounting with ORConn sockets.

When we close a socket via tor_tls_free(), we previously had no way
for our socket accounting logic to learn about it.  This meant that
the socket accounting code would think we had run out of sockets,
and freak out.

Fixes bug 27795; bugfix on 0.3.5.1-alpha.

7 years agoAdd a tor_release_socket_ownership() function.
Nick Mathewson [Thu, 20 Sep 2018 16:46:47 +0000 (12:46 -0400)] 
Add a tor_release_socket_ownership() function.

7 years agoMerge branch 'split_routerlist_dirserv_v2'
Nick Mathewson [Thu, 20 Sep 2018 15:07:50 +0000 (11:07 -0400)] 
Merge branch 'split_routerlist_dirserv_v2'

7 years agoSplit most of dirserv.c into several new modules
Nick Mathewson [Thu, 20 Sep 2018 12:09:35 +0000 (08:09 -0400)] 
Split most of dirserv.c into several new modules

In dirauth:
  * bwauth.c reads and uses bandwidth files
  * guardfraction.c reads and uses the guardfraction file
  * reachability.c tests relay reachability
  * recommend_pkg.c handles the recommended-packages lines.
  * recv_descs.c handles fingerprint files and processing incoming
    routerinfos that relays upload to us
  * voteflag.c computes flag thresholds and sets those thresholds on
    routerstatuses when computing votes

In control:
  * fmt_serverstatus.c generates the ancient "v1 server status"
    format that controllers expect.

In nodelist:
  * routerstatus_fmt.c formats routerstatus entries for a consensus,
    a vote, or for the controller.

7 years agohs-v3: Close all SOCKS request on descriptor failure
David Goulet [Wed, 19 Sep 2018 14:56:15 +0000 (10:56 -0400)] 
hs-v3: Close all SOCKS request on descriptor failure

Client side, when a descriptor is finally fetched and stored in the cache, we
then go over all pending SOCKS request for that descriptor. If it turns out
that the intro points are unusable, we close the first SOCKS request but not
the others for the same .onion.

This commit makes it that we'll close all SOCKS requests so we don't let
hanging the other ones.

It also fixes another bug which is having a SOCKS connection in RENDDESC_WAIT
state but with a descriptor in the cache. At some point, tor will expire the
intro failure cache which will make that descriptor usable again. When
retrying all SOCKS connection (retry_all_socks_conn_waiting_for_desc()), we
won't end up in the code path where we have already the descriptor for a
pending request causing a BUG().

Bottom line is that we should never have pending requests (waiting for a
descriptor) with that descriptor in the cache (even if unusable).

Fixees #27410.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoMerge branch 'maint-0.3.2' of https://git.torproject.org/tor into maint-0.3.2
David Goulet [Thu, 20 Sep 2018 14:59:23 +0000 (10:59 -0400)] 
Merge branch 'maint-0.3.2' of https://git.torproject.org/tor into maint-0.3.2

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Thu, 20 Sep 2018 14:43:08 +0000 (10:43 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge remote-tracking branch 'github/bug27139_034' into maint-0.3.4
Nick Mathewson [Thu, 20 Sep 2018 14:43:05 +0000 (10:43 -0400)] 
Merge remote-tracking branch 'github/bug27139_034' into maint-0.3.4

7 years agonode: Make node_supports_v3_rendezvous_point() also check for the key
David Goulet [Thu, 20 Sep 2018 12:50:27 +0000 (08:50 -0400)] 
node: Make node_supports_v3_rendezvous_point() also check for the key

It is not enough to look at protover for v3 rendezvous support but also we
need to make sure that the curve25519 onion key is present or in other words
that the descriptor has been fetched and does contain it.

Fixes #27797.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoSplit routerlist.c into 4 separate modules
Nick Mathewson [Wed, 19 Sep 2018 18:10:15 +0000 (14:10 -0400)] 
Split routerlist.c into 4 separate modules

There are now separate modules for:
    * the list of router descriptors
    * the list of authorities and fallbacks
    * managing authority certificates
    * selecting random nodes

7 years agotest: hs-v3 desc has arrived unit test
David Goulet [Wed, 19 Sep 2018 13:55:57 +0000 (09:55 -0400)] 
test: hs-v3 desc has arrived unit test

That unit test makes sure we don't have pending SOCK request if the descriptor
turns out to be unusable.

Part of #27410.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Close all SOCKS request on descriptor failure
David Goulet [Wed, 19 Sep 2018 14:56:15 +0000 (10:56 -0400)] 
hs-v3: Close all SOCKS request on descriptor failure

Client side, when a descriptor is finally fetched and stored in the cache, we
then go over all pending SOCKS request for that descriptor. If it turns out
that the intro points are unusable, we close the first SOCKS request but not
the others for the same .onion.

This commit makes it that we'll close all SOCKS requests so we don't let
hanging the other ones.

It also fixes another bug which is having a SOCKS connection in RENDDESC_WAIT
state but with a descriptor in the cache. At some point, tor will expire the
intro failure cache which will make that descriptor usable again. When
retrying all SOCKS connection (retry_all_socks_conn_waiting_for_desc()), we
won't end up in the code path where we have already the descriptor for a
pending request causing a BUG().

Bottom line is that we should never have pending requests (waiting for a
descriptor) with that descriptor in the cache (even if unusable).

Fixees #27410.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoComment fix.
Nick Mathewson [Tue, 18 Sep 2018 20:44:24 +0000 (16:44 -0400)] 
Comment fix.

7 years agoMerge branch 'ticket27686_035'
Nick Mathewson [Tue, 18 Sep 2018 20:40:30 +0000 (16:40 -0400)] 
Merge branch 'ticket27686_035'

7 years agoMerge remote-tracking branch 'tor-github/pr/352'
Nick Mathewson [Tue, 18 Sep 2018 12:44:58 +0000 (08:44 -0400)] 
Merge remote-tracking branch 'tor-github/pr/352'

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Tue, 18 Sep 2018 12:33:13 +0000 (08:33 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Tue, 18 Sep 2018 12:31:14 +0000 (08:31 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge remote-tracking branch 'onionk/rust-allsupported1' into maint-0.3.3
Nick Mathewson [Tue, 18 Sep 2018 12:31:08 +0000 (08:31 -0400)] 
Merge remote-tracking branch 'onionk/rust-allsupported1' into maint-0.3.3

7 years agoMerge remote-tracking branch 'github/bug27073_029'
Nick Mathewson [Tue, 18 Sep 2018 12:16:42 +0000 (08:16 -0400)] 
Merge remote-tracking branch 'github/bug27073_029'

7 years agoMerge remote-tracking branch 'tor-github/pr/344'
Nick Mathewson [Tue, 18 Sep 2018 12:15:02 +0000 (08:15 -0400)] 
Merge remote-tracking branch 'tor-github/pr/344'

7 years agoChanges file for 27764
Nick Mathewson [Tue, 18 Sep 2018 12:12:46 +0000 (08:12 -0400)] 
Changes file for 27764

7 years agoMerge remote-tracking branch 'asn-github/bug27764'
Nick Mathewson [Tue, 18 Sep 2018 12:10:25 +0000 (08:10 -0400)] 
Merge remote-tracking branch 'asn-github/bug27764'

7 years agoBump to 0.3.5.1-alpha-dev
Nick Mathewson [Tue, 18 Sep 2018 11:52:27 +0000 (07:52 -0400)] 
Bump to 0.3.5.1-alpha-dev

7 years agoFix minor memleak in edge-case of crypto_rsa.c function.
George Kadianakis [Tue, 18 Sep 2018 11:01:15 +0000 (14:01 +0300)] 
Fix minor memleak in edge-case of crypto_rsa.c function.

7 years agoMerge remote-tracking branch 'teor/ticket27757' tor-0.3.5.1-alpha
Nick Mathewson [Tue, 18 Sep 2018 01:43:34 +0000 (21:43 -0400)] 
Merge remote-tracking branch 'teor/ticket27757'

7 years agoChangeLog: add onion service versions to the Tor2web deprecation notice
teor [Tue, 18 Sep 2018 01:34:58 +0000 (11:34 +1000)] 
ChangeLog: add onion service versions to the Tor2web deprecation notice

Tor2web was never implemented for v3 onion services.

7 years agoChangeLog: the ContactInfo UTF-8 requirement is a major UI change
teor [Tue, 18 Sep 2018 01:29:43 +0000 (11:29 +1000)] 
ChangeLog: the ContactInfo UTF-8 requirement is a major UI change

(Even if it only affects a few relay operators.)

7 years agoChangeLog: bugfixes are on previous releases, not this release
teor [Tue, 18 Sep 2018 00:57:33 +0000 (10:57 +1000)] 
ChangeLog: bugfixes are on previous releases, not this release

7 years agoChangeLog: delete both consensus flavours to un-break nss
teor [Tue, 18 Sep 2018 00:42:59 +0000 (10:42 +1000)] 
ChangeLog: delete both consensus flavours to un-break nss

The required protocol version check occurs before the consensus flavour
check. So on directory mirrors (and some client configs), alpha users need
to delete both consensus flavours to workaround nss bugs.

Closes ticket 27756.

7 years agoMerge branch 'bug23512-v4-033' into bug23512-v4-master
Mike Perry [Tue, 18 Sep 2018 00:17:14 +0000 (00:17 +0000)] 
Merge branch 'bug23512-v4-033' into bug23512-v4-master

7 years agoBug 23512: Test fix: cmux is now allocated by new_fake_channel()
Mike Perry [Fri, 14 Sep 2018 20:45:21 +0000 (20:45 +0000)] 
Bug 23512: Test fix: cmux is now allocated by new_fake_channel()

7 years agoMerge branch 'bug23512-v4-032' into bug23512-v4-033
Mike Perry [Mon, 17 Sep 2018 23:31:34 +0000 (23:31 +0000)] 
Merge branch 'bug23512-v4-032' into bug23512-v4-033

7 years agoRemove duplicate TLS define from kist code.
Mike Perry [Mon, 17 Sep 2018 22:08:45 +0000 (22:08 +0000)] 
Remove duplicate TLS define from kist code.

Duplicate comes from introducing this define into 0.2.9, which did not yet
have KIST.

7 years agoBug 23512: Mock assert_circuit_ok in tests.
Mike Perry [Fri, 14 Sep 2018 20:28:47 +0000 (20:28 +0000)] 
Bug 23512: Mock assert_circuit_ok in tests.

This mocking was not available in 0.2.9.

7 years agoMerge branch 'bug23512-v4-029' into bug23512-v4-032
Mike Perry [Mon, 17 Sep 2018 23:12:45 +0000 (23:12 +0000)] 
Merge branch 'bug23512-v4-029' into bug23512-v4-032

7 years agoBug 23512: Test recording bytes in circ queues.
Mike Perry [Thu, 13 Sep 2018 23:03:32 +0000 (23:03 +0000)] 
Bug 23512: Test recording bytes in circ queues.

7 years agoBug 23512: Changes file.
Mike Perry [Thu, 13 Sep 2018 19:19:03 +0000 (19:19 +0000)] 
Bug 23512: Changes file.

7 years agoBug 23512: Report queued cells on or circs as written.
Mike Perry [Fri, 14 Sep 2018 18:50:40 +0000 (18:50 +0000)] 
Bug 23512: Report queued cells on or circs as written.

This avoids asymmetry in our public relay stats, which can be exploited for
guard discovery and other attacks.

7 years agoPromote rep_hist bw functions to uint64_t.
Mike Perry [Fri, 14 Sep 2018 18:35:44 +0000 (18:35 +0000)] 
Promote rep_hist bw functions to uint64_t.

The rest of rephist uses uint64_t internally. Let's make these take it too,
so we don't have to worry about overflowing size_t on 32 bit systems.

7 years agoMore changelog edits
Nick Mathewson [Mon, 17 Sep 2018 20:35:13 +0000 (16:35 -0400)] 
More changelog edits

7 years agoWrite a blurb, pull UI changes to the front, edit
Nick Mathewson [Mon, 17 Sep 2018 20:04:30 +0000 (16:04 -0400)] 
Write a blurb, pull UI changes to the front, edit

7 years agoLight edits on changelog. mostly combining sections.
Nick Mathewson [Mon, 17 Sep 2018 19:37:35 +0000 (15:37 -0400)] 
Light edits on changelog. mostly combining sections.

7 years agoLower the maximum size of a private key file to 16 MB
Nick Mathewson [Mon, 17 Sep 2018 15:08:56 +0000 (11:08 -0400)] 
Lower the maximum size of a private key file to 16 MB

This shouldn't be a user-visible change: nobody has a 16 MB RSA
key that they're trying to use with Tor.

I'm doing this to fix CID 1439330 / ticket 27730, where coverity
complains (on 64-bit) that we are making a comparison that is never
true.

7 years agoBump to 0.3.5.1-alpha
Nick Mathewson [Mon, 17 Sep 2018 13:12:42 +0000 (09:12 -0400)] 
Bump to 0.3.5.1-alpha

7 years agoStart a changelog for 0.3.5.1-alpha
Nick Mathewson [Mon, 17 Sep 2018 13:10:18 +0000 (09:10 -0400)] 
Start a changelog for 0.3.5.1-alpha

7 years agoAdd tortls.h includes to expose critical macro. Fix #27734.
Nick Mathewson [Mon, 17 Sep 2018 02:08:02 +0000 (22:08 -0400)] 
Add tortls.h includes to expose critical macro. Fix #27734.

7 years agoDon't try to link C from rust doctests for nss detection
Nick Mathewson [Sun, 16 Sep 2018 18:34:31 +0000 (14:34 -0400)] 
Don't try to link C from rust doctests for nss detection

This is really annoying, since we can't use cfg(test) for doctests.

7 years agoMerge branch 'bug25573-034-typefix'
Nick Mathewson [Sun, 16 Sep 2018 17:46:12 +0000 (13:46 -0400)] 
Merge branch 'bug25573-034-typefix'

7 years agoFix duplicate declaration of pathbias_count_valid_cells.
Nick Mathewson [Sun, 16 Sep 2018 17:45:43 +0000 (13:45 -0400)] 
Fix duplicate declaration of pathbias_count_valid_cells.

7 years agoWhen Tor is compiled with NSS, don't claim support for LinkAuth=1
Nick Mathewson [Thu, 23 Aug 2018 15:30:18 +0000 (11:30 -0400)] 
When Tor is compiled with NSS, don't claim support for LinkAuth=1

Closes ticket 27288

7 years agoUpdate description of onion_extend_cpath() (#27333)
traumschule [Sun, 16 Sep 2018 02:01:17 +0000 (04:01 +0200)] 
Update description of onion_extend_cpath() (#27333)

7 years agoAdd proxy headers as early as possible.
Alexander Færøy [Sat, 15 Sep 2018 20:17:57 +0000 (22:17 +0200)] 
Add proxy headers as early as possible.

This patch moves the logic that adds the proxy headers to an earlier
point in the exit connection lifetime, which ensures that the
application data cannot be written to the outbuf before the proxy header
is added.

See: https://bugs.torproject.org/4700

7 years agoChange HiddenServiceExportCircuitID to take a string parameter: the protocol.
Alexander Færøy [Sat, 15 Sep 2018 13:33:31 +0000 (16:33 +0300)] 
Change HiddenServiceExportCircuitID to take a string parameter: the protocol.

This patch changes HiddenServiceExportCircuitID so instead of being a
boolean it takes a string, which is the protocol. Currently only the
'haproxy' protocol is defined.

See: https://bugs.torproject.org/4700

7 years agoEncode the 32-bit Global Identifier as 2 x 16-bit in the IPv6 address.
Alexander Færøy [Fri, 14 Sep 2018 19:37:36 +0000 (21:37 +0200)] 
Encode the 32-bit Global Identifier as 2 x 16-bit in the IPv6 address.

Without this patch we would encode the IPv6 address' last part as
::ffffffff instead of ::ffff:ffff when the GID is UINT32_MAX.

See: https://bugs.torproject.org/4700

7 years agoAdd man page entry.
George Kadianakis [Thu, 13 Sep 2018 14:37:05 +0000 (17:37 +0300)] 
Add man page entry.

7 years agoAdd unittest for HiddenServiceExportCircuitID.
George Kadianakis [Sat, 15 Sep 2018 13:33:05 +0000 (16:33 +0300)] 
Add unittest for HiddenServiceExportCircuitID.

Had to move a function to test helpers.

7 years agoSave original virtual port in edge conn HS ident.
George Kadianakis [Wed, 12 Sep 2018 12:52:41 +0000 (15:52 +0300)] 
Save original virtual port in edge conn HS ident.

7 years agoImprove export_hs_client_circuit_id() function.
George Kadianakis [Wed, 12 Sep 2018 11:43:23 +0000 (14:43 +0300)] 
Improve export_hs_client_circuit_id() function.

- Change default values.
- Beautify.
- Documentation.

7 years agoIntroduce per-service HiddenServiceExportCircuitID torrc option.
George Kadianakis [Wed, 12 Sep 2018 11:40:19 +0000 (14:40 +0300)] 
Introduce per-service HiddenServiceExportCircuitID torrc option.

Moves code to a function, better viewed with --color-moved.

7 years agoAdd a missing function for windows
Nick Mathewson [Fri, 14 Sep 2018 19:02:11 +0000 (15:02 -0400)] 
Add a missing function for windows

7 years agoExplicitly ignore BIO_set_close() return val to fix #27711
Nick Mathewson [Fri, 14 Sep 2018 17:09:10 +0000 (13:09 -0400)] 
Explicitly ignore BIO_set_close() return val to fix #27711

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 14 Sep 2018 16:56:31 +0000 (12:56 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 14 Sep 2018 16:56:30 +0000 (12:56 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 14 Sep 2018 16:56:30 +0000 (12:56 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agohs-v3: Don't BUG() on directory permission check failure
David Goulet [Fri, 14 Sep 2018 14:56:34 +0000 (10:56 -0400)] 
hs-v3: Don't BUG() on directory permission check failure

In hs_config.c, we do validate the permission of the hidden service directory
but we do not try to create it. So, in the event that the directory doesn't
exists, we end up in the loading key code path which checks for the
permission and possibly creates the directory. On failure, don't BUG() since
there is a perfectly valid use case for that function to fail.

Fixes #27335

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoMerge remote-tracking branch 'dgoulet/ticket27040_035_01'
Nick Mathewson [Fri, 14 Sep 2018 16:54:13 +0000 (12:54 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket27040_035_01'

7 years agoMerge branch 'nss_countbytes_squashed'
Nick Mathewson [Fri, 14 Sep 2018 16:45:30 +0000 (12:45 -0400)] 
Merge branch 'nss_countbytes_squashed'

7 years agoAllow malloc includes in tls library
Nick Mathewson [Thu, 13 Sep 2018 14:53:22 +0000 (10:53 -0400)] 
Allow malloc includes in tls library

7 years agoAdd support for lower-level byte counting with NSS
Nick Mathewson [Thu, 13 Sep 2018 14:18:34 +0000 (10:18 -0400)] 
Add support for lower-level byte counting with NSS

This is harder than with OpenSSL, since OpenSSL counts the bytes on
its own and NSS doesn't.  To fix this, we need to define a new
PRFileDesc layer that has its own byte-counting support.

Closes ticket 27289.

7 years agohs-v2: Demote log warning to info when we don't have a consensus
David Goulet [Fri, 14 Sep 2018 16:04:01 +0000 (12:04 -0400)] 
hs-v2: Demote log warning to info when we don't have a consensus

Fixes #27040

Signed-off-by: David Goulet <dgoulet@torproject.org>