]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
4 years agohs: v2 address are now considered a bad hostname
David Goulet [Tue, 19 Oct 2021 14:43:54 +0000 (10:43 -0400)] 
hs: v2 address are now considered a bad hostname

This means that at this commit, tor will stop logging that v2 is
deprecated and treat a v2 address as a bad hostname that we can't use.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge branch 'maint-0.4.6'
David Goulet [Tue, 19 Oct 2021 14:35:40 +0000 (10:35 -0400)] 
Merge branch 'maint-0.4.6'

4 years agoMerge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 19 Oct 2021 14:35:35 +0000 (10:35 -0400)] 
Merge branch 'maint-0.4.5' into maint-0.4.6

4 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Tue, 19 Oct 2021 14:29:15 +0000 (10:29 -0400)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

4 years agohs: Improve warning for bad service version
David Goulet [Thu, 14 Oct 2021 13:56:10 +0000 (09:56 -0400)] 
hs: Improve warning for bad service version

Now that we don't have version 2, it gives us:

  [warn] HiddenServiceVersion must be between 3 and 3, not 2.

This commit changes it to:

  [warn] HiddenServiceVersion must be 3, not 2.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agochanges: Add file for ticket 40476
David Goulet [Thu, 30 Sep 2021 15:21:13 +0000 (11:21 -0400)] 
changes: Add file for ticket 40476

Closes #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agotest: Don't run HSv2 Chutney test networks
David Goulet [Thu, 30 Sep 2021 15:12:46 +0000 (11:12 -0400)] 
test: Don't run HSv2 Chutney test networks

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agotest: Fix unit tests after disabling version 2
David Goulet [Thu, 30 Sep 2021 15:09:48 +0000 (11:09 -0400)] 
test: Fix unit tests after disabling version 2

Some tests were removed because they were testing something not usable
anymore.

Some tests remains to make sure that things are indeed disabled.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs: Improve warning for bad service version
David Goulet [Thu, 14 Oct 2021 13:56:10 +0000 (09:56 -0400)] 
hs: Improve warning for bad service version

Now that we don't have version 2, it gives us:

  [warn] HiddenServiceVersion must be between 3 and 3, not 2.

This commit changes it to:

  [warn] HiddenServiceVersion must be 3, not 2.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agochanges: Add file for ticket 40476
David Goulet [Thu, 30 Sep 2021 15:21:13 +0000 (11:21 -0400)] 
changes: Add file for ticket 40476

Closes #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agotest: Don't run HSv2 Chutney test networks
David Goulet [Thu, 30 Sep 2021 15:12:46 +0000 (11:12 -0400)] 
test: Don't run HSv2 Chutney test networks

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agotest: Fix unit tests after disabling version 2
David Goulet [Thu, 30 Sep 2021 15:09:48 +0000 (11:09 -0400)] 
test: Fix unit tests after disabling version 2

Some tests were removed because they were testing something not usable
anymore.

Some tests remains to make sure that things are indeed disabled.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 HSPOST and HSFETCH command
David Goulet [Tue, 19 Oct 2021 13:20:53 +0000 (09:20 -0400)] 
hs-v2: Disable version 2 HSPOST and HSFETCH command

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 directory
David Goulet [Thu, 30 Sep 2021 14:46:17 +0000 (10:46 -0400)] 
hs-v2: Disable version 2 directory

Relay do not accept both stores and lookups of version 2 descriptor.
This effectively disable version 2 HSDir supports for relays.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge branch 'ticket40476_045_01' into ticket40476_046_01
David Goulet [Tue, 19 Oct 2021 13:48:13 +0000 (09:48 -0400)] 
Merge branch 'ticket40476_045_01' into ticket40476_046_01

4 years agohs: Improve warning for bad service version
David Goulet [Thu, 14 Oct 2021 13:56:10 +0000 (09:56 -0400)] 
hs: Improve warning for bad service version

Now that we don't have version 2, it gives us:

  [warn] HiddenServiceVersion must be between 3 and 3, not 2.

This commit changes it to:

  [warn] HiddenServiceVersion must be 3, not 2.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agochanges: Add file for ticket 40476
David Goulet [Thu, 30 Sep 2021 15:21:13 +0000 (11:21 -0400)] 
changes: Add file for ticket 40476

Closes #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agotest: Don't run HSv2 Chutney test networks
David Goulet [Thu, 30 Sep 2021 15:12:46 +0000 (11:12 -0400)] 
test: Don't run HSv2 Chutney test networks

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agotest: Fix unit tests after disabling version 2
David Goulet [Thu, 30 Sep 2021 15:09:48 +0000 (11:09 -0400)] 
test: Fix unit tests after disabling version 2

Some tests were removed because they were testing something not usable
anymore.

Some tests remains to make sure that things are indeed disabled.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 HSPOST and HSFETCH command
David Goulet [Tue, 19 Oct 2021 13:20:53 +0000 (09:20 -0400)] 
hs-v2: Disable version 2 HSPOST and HSFETCH command

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 directory
David Goulet [Thu, 30 Sep 2021 14:46:17 +0000 (10:46 -0400)] 
hs-v2: Disable version 2 directory

Relay do not accept both stores and lookups of version 2 descriptor.
This effectively disable version 2 HSDir supports for relays.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 introduction point
David Goulet [Thu, 30 Sep 2021 14:40:19 +0000 (10:40 -0400)] 
hs-v2: Disable version 2 introduction point

Upon receiving a v2 introduction request, the relay will close the
circuit and send back a tor protocol error.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 service
David Goulet [Tue, 19 Oct 2021 13:11:12 +0000 (09:11 -0400)] 
hs-v2: Disable version 2 service

The minimum service version is raised from 2 to 3 which effectively
disable loading or creating an onion service v2.

As for ADD_ONION, for version 2, a 551 error is returned:

  "551 Failed to add Onion Service"

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable SOCKS connection for v2 addresses
David Goulet [Thu, 30 Sep 2021 14:26:37 +0000 (10:26 -0400)] 
hs-v2: Disable SOCKS connection for v2 addresses

This effectively turns off the ability of tor to use HSv2 as a client by
invalidating the v2 onion hostname passed through a SOCKS request.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoChanges file for new fuzzers
Nick Mathewson [Sat, 16 Oct 2021 14:51:41 +0000 (10:51 -0400)] 
Changes file for new fuzzers

4 years agoMerge branch 'hs_fuzzing'
Nick Mathewson [Sat, 16 Oct 2021 14:49:41 +0000 (10:49 -0400)] 
Merge branch 'hs_fuzzing'

4 years agoMerge remote-tracking branch 'asn-private/hsfuz' into hs_fuzzing
Nick Mathewson [Fri, 15 Oct 2021 15:20:06 +0000 (11:20 -0400)] 
Merge remote-tracking branch 'asn-private/hsfuz' into hs_fuzzing

4 years agoMerge remote-tracking branch 'tor-gitlab/mr/459' into main
Alexander Færøy [Thu, 14 Oct 2021 19:19:32 +0000 (19:19 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/459' into main

4 years agoMerge remote-tracking branch 'tor-gitlab/mr/456' into main
Alexander Færøy [Thu, 14 Oct 2021 19:18:22 +0000 (19:18 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/456' into main

4 years agoMerge branch 'tor-gitlab/mr/458'
David Goulet [Thu, 14 Oct 2021 17:09:21 +0000 (13:09 -0400)] 
Merge branch 'tor-gitlab/mr/458'

4 years agoLower maximum value for guard-extreme-restriction-percent to 100.
Nick Mathewson [Thu, 14 Oct 2021 16:39:05 +0000 (12:39 -0400)] 
Lower maximum value for guard-extreme-restriction-percent to 100.

Values greater than 100 would have had the same effect as 100, so
this doesn't actually change Tor's behavior; it just makes the
intent clearer.  Fixes #40486; see also torspec#66.

4 years agoMerge remote-tracking branch 'tor-gitlab/mr/457'
Nick Mathewson [Thu, 14 Oct 2021 16:25:22 +0000 (12:25 -0400)] 
Merge remote-tracking branch 'tor-gitlab/mr/457'

4 years agoCorrect a version number.
Nick Mathewson [Thu, 14 Oct 2021 16:23:36 +0000 (12:23 -0400)] 
Correct a version number.

4 years agoDowngrade "Rejecting RENDEZVOUS1 cell with unrecognized cookie"
Nick Mathewson [Thu, 14 Oct 2021 16:21:30 +0000 (12:21 -0400)] 
Downgrade "Rejecting RENDEZVOUS1 cell with unrecognized cookie"

This is the loudest of our LOG_PROTOCOL_WARN messages, it can occur
naturally, and there doesn't seem to be a great response to it.

Partial fix for 40400; bugfix on 0.1.1.13-alpha.

4 years agoci: Set 5MB data for all chutney tests
David Goulet [Thu, 14 Oct 2021 15:39:10 +0000 (11:39 -0400)] 
ci: Set 5MB data for all chutney tests

Closes #40485

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs: Fix memory leak if service failed to configure
David Goulet [Thu, 14 Oct 2021 14:09:25 +0000 (10:09 -0400)] 
hs: Fix memory leak if service failed to configure

Closes #40484

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge remote-tracking branch 'tor-gitlab/mr/432' into main
Alexander Færøy [Thu, 14 Oct 2021 13:03:03 +0000 (13:03 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/432' into main

4 years agoMerge remote-tracking branch 'tor-gitlab/mr/433' into main
Alexander Færøy [Thu, 14 Oct 2021 13:01:41 +0000 (13:01 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/433' into main

4 years agoMerge remote-tracking branch 'tor-gitlab/mr/451' into main
Alexander Færøy [Thu, 14 Oct 2021 12:59:25 +0000 (12:59 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/451' into main

4 years agoMerge branch 'tor-gitlab/mr/455'
David Goulet [Thu, 14 Oct 2021 12:40:38 +0000 (08:40 -0400)] 
Merge branch 'tor-gitlab/mr/455'

4 years agoDowngrade a PROTOCOL_WARN log message.
Nick Mathewson [Wed, 13 Oct 2021 20:51:46 +0000 (16:51 -0400)] 
Downgrade a PROTOCOL_WARN log message.

This one happens every time we get a failure from
circuit_receive_relay_cell -- but for all the relevant failing cases
in that function, we already log in that function.

This resolves one case of #40400.  Two cases remain.

4 years agoRemove unused debugging code used for tor#17659
Alexander Færøy [Mon, 11 Oct 2021 19:29:49 +0000 (21:29 +0200)] 
Remove unused debugging code used for tor#17659

See: tpo/core/tor#17659

4 years agodirauth: Reject EOL relays
David Goulet [Fri, 8 Oct 2021 15:04:11 +0000 (11:04 -0400)] 
dirauth: Reject EOL relays

Series 0.4.2.x, 0.4.3.x and 0.4.4.x will all be rejected at the
authority level at this commit.

Futhermore, the 0.4.5.x alphas and rc will also be rejected.

Closes #40480

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge branch 'tor-gitlab/mr/447'
David Goulet [Fri, 8 Oct 2021 14:43:53 +0000 (10:43 -0400)] 
Merge branch 'tor-gitlab/mr/447'

4 years agoMerge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 19:45:19 +0000 (15:45 -0400)] 
Merge branch 'maint-0.4.5' into maint-0.4.6

4 years agoMerge branch 'maint-0.4.6'
David Goulet [Wed, 6 Oct 2021 19:45:19 +0000 (15:45 -0400)] 
Merge branch 'maint-0.4.6'

4 years agoMerge branch 'tor-gitlab/mr/392' into maint-0.4.5
David Goulet [Wed, 6 Oct 2021 19:45:13 +0000 (15:45 -0400)] 
Merge branch 'tor-gitlab/mr/392' into maint-0.4.5

4 years agoMerge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 19:41:17 +0000 (15:41 -0400)] 
Merge branch 'maint-0.4.5' into maint-0.4.6

4 years agoMerge branch 'maint-0.4.6'
David Goulet [Wed, 6 Oct 2021 19:41:17 +0000 (15:41 -0400)] 
Merge branch 'maint-0.4.6'

4 years agoMerge branch 'tor-gitlab/mr/393' into maint-0.4.5
David Goulet [Wed, 6 Oct 2021 19:41:12 +0000 (15:41 -0400)] 
Merge branch 'tor-gitlab/mr/393' into maint-0.4.5

4 years agoMerge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 19:35:43 +0000 (15:35 -0400)] 
Merge branch 'maint-0.4.5' into maint-0.4.6

4 years agoMerge branch 'maint-0.4.6'
David Goulet [Wed, 6 Oct 2021 19:35:43 +0000 (15:35 -0400)] 
Merge branch 'maint-0.4.6'

4 years agoMerge branch 'tor-gitlab/mr/420' into maint-0.4.5
David Goulet [Wed, 6 Oct 2021 19:35:30 +0000 (15:35 -0400)] 
Merge branch 'tor-gitlab/mr/420' into maint-0.4.5

4 years agoRemove last artifacts of Rust related code
David Goulet [Wed, 6 Oct 2021 19:06:56 +0000 (15:06 -0400)] 
Remove last artifacts of Rust related code

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agorust: Remove Rust support from tree
David Goulet [Tue, 14 Sep 2021 15:03:00 +0000 (11:03 -0400)] 
rust: Remove Rust support from tree

Closes #40469

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge branch 'maint-0.4.6'
David Goulet [Wed, 6 Oct 2021 17:25:08 +0000 (13:25 -0400)] 
Merge branch 'maint-0.4.6'

4 years agoMerge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 17:25:02 +0000 (13:25 -0400)] 
Merge branch 'maint-0.4.5' into maint-0.4.6

4 years agohs-v2: Only log once the connection warning to v2
David Goulet [Mon, 4 Oct 2021 18:36:05 +0000 (14:36 -0400)] 
hs-v2: Only log once the connection warning to v2

Closes #40474

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Only log once the connection warning to v2
David Goulet [Mon, 4 Oct 2021 18:38:50 +0000 (14:38 -0400)] 
hs-v2: Only log once the connection warning to v2

Closes #40474

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agocc: Fix 32bit arithmetic to actually be 64bit
David Goulet [Tue, 5 Oct 2021 17:47:49 +0000 (13:47 -0400)] 
cc: Fix 32bit arithmetic to actually be 64bit

Coverity report: CID 1492322

________________________________________________________________________________________________________
*** CID 1492322:  Integer handling issues  (OVERFLOW_BEFORE_WIDEN)
/src/core/or/congestion_control_flow.c: 399 in circuit_process_stream_xon()
393       }
394
395       log_info(LD_EDGE, "Got XON: %d", xon->kbps_ewma);
396
397       /* Adjust the token bucket of this edge connection with the drain rate in
398        * the XON. Rate is in bytes from kilobit (kpbs). */
>>>     CID 1492322:  Integer handling issues  (OVERFLOW_BEFORE_WIDEN)
>>>     Potentially overflowing expression "xon_cell_get_kbps_ewma(xon) * 1000U" with type "unsigned int" (32 bits, unsigned) is evaluated using 32-bit arithmetic, and then used in a context that expects an expression of type "uint64_t" (64 bits, unsigned).
399       uint64_t rate = xon_cell_get_kbps_ewma(xon) * 1000;
400       if (rate == 0 || INT32_MAX < rate) {
401         /* No rate. */
402         rate = INT32_MAX;
403       }
404       token_bucket_rw_adjust(&conn->bucket, (uint32_t) rate, (uint32_t) rate);

Fixes #40478

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agonet: Reject invalid characters in port ranges
c [Fri, 9 Oct 2020 03:10:24 +0000 (03:10 +0000)] 
net: Reject invalid characters in port ranges

Fixes issue #22469 where port strings such as '0x00' get accepted, not
because the string gets converted to hex, but because the string is
silently truncated past the invalid character 'x'. This also causes
issues for strings such as '0x01-0x02' which look like a hex port range,
but in reality gets truncated to '0', which is definitely not what a
user intends.

Warn and reject such port strings as invalid.

Also, since we're throwing that "malformed port" warning a lot in the
function, wrap it up in a nice goto.

Fixes #22469

4 years agochanges: Fix file for ticket 40182
David Goulet [Mon, 4 Oct 2021 19:02:32 +0000 (15:02 -0400)] 
changes: Fix file for ticket 40182

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge branch 'tor-gitlab/mr/228'
David Goulet [Mon, 4 Oct 2021 18:59:04 +0000 (14:59 -0400)] 
Merge branch 'tor-gitlab/mr/228'

4 years agoedge: Remove wrong bug warn when processing pending streams
David Goulet [Mon, 4 Oct 2021 18:11:18 +0000 (14:11 -0400)] 
edge: Remove wrong bug warn when processing pending streams

The connection_ap_attach_pending() function processes all pending
streams in the pending_entry_connections list. It first copy the pointer
and then allocates a brand new empty list.

It then iterates over that copy pointer to try to attach entry
connections onto any fitting circuits using
connection_ap_handshake_attach_circuit().

That very function, for onion service, can lead to flagging _all_
streams of the same onion service to be put in state RENDDESC_WAIT from
CIRCUIT_WAIT. By doing so, it also tries to remove them from the
pending_entry_connections but at that point it is already empty.

Problem is that the we are iterating over the previous
pending_entry_connections which contains the streams that have just
changed state and are no longer in CIRCUIT_WAIT.

This lead to this bug warning occuring a lot on busy services:

  May 01 08:55:43.000 [warn] connection_ap_attach_pending(): Bug:
  0x55d8764ae550 is no longer in circuit_wait. Its current state is
  waiting for rendezvous desc. Why is it on pending_entry_connections?
  (on Tor 0.4.4.0-alpha-dev )

This fix is minimal and basically allow a state to be not CIRCUIT_WAIT
and move on to the next one without logging a warning. Because the
pending_entry_connections is emptied before processing, there is no
chance for a streams to be stuck there forever thus it is OK to ignore
streams not in the right state.

Fixes #34083

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge branch 'tor-gitlab/mr/444'
David Goulet [Mon, 4 Oct 2021 14:49:27 +0000 (10:49 -0400)] 
Merge branch 'tor-gitlab/mr/444'

4 years agochanges: Add file for ticket 40450 (prop324)
David Goulet [Mon, 4 Oct 2021 14:40:18 +0000 (10:40 -0400)] 
changes: Add file for ticket 40450 (prop324)

Closes #40450

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agocc: Add comments and clean up some syntax
David Goulet [Mon, 4 Oct 2021 14:32:59 +0000 (10:32 -0400)] 
cc: Add comments and clean up some syntax

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoTurn cell queue watermark limits into consensus params.
Mike Perry [Wed, 29 Sep 2021 02:12:56 +0000 (02:12 +0000)] 
Turn cell queue watermark limits into consensus params.

This allows us to have quicker reaction to blocked orconns as
a congestion signal.

4 years agoAdd a max cwnd consensus parameter and clamp.
Mike Perry [Tue, 28 Sep 2021 15:17:34 +0000 (15:17 +0000)] 
Add a max cwnd consensus parameter and clamp.

4 years agoTurn orconn watermarks into consensus parameters.
Mike Perry [Tue, 28 Sep 2021 21:19:27 +0000 (21:19 +0000)] 
Turn orconn watermarks into consensus parameters.

Tuning these may reduce memory usage and latency.

4 years agoTurn CircEWMA tick len into consensus parameter.
Mike Perry [Tue, 28 Sep 2021 17:44:33 +0000 (17:44 +0000)] 
Turn CircEWMA tick len into consensus parameter.

This will assist tuning of CircEWMA in Shadow and Live.

4 years agoSupport time-based half-closed connection handling.
Mike Perry [Thu, 23 Sep 2021 19:36:11 +0000 (19:36 +0000)] 
Support time-based half-closed connection handling.

Since we no longer use stream SENDMEs for congestion control, we must now use
time to decide when data should stop arriving on a half-closed stream.

4 years agooom: Consider edge connections as well
David Goulet [Thu, 9 Sep 2021 14:32:55 +0000 (10:32 -0400)] 
oom: Consider edge connections as well

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMAKEFILE: Add flow control files to makefile
Mike Perry [Tue, 10 Aug 2021 21:20:28 +0000 (21:20 +0000)] 
MAKEFILE: Add flow control files to makefile

4 years agoProp#324: Hook up flow control
Mike Perry [Tue, 10 Aug 2021 21:35:46 +0000 (21:35 +0000)] 
Prop#324: Hook up flow control

4 years agoProp#324: Stream flow control functions
Mike Perry [Tue, 28 Sep 2021 22:28:26 +0000 (22:28 +0000)] 
Prop#324: Stream flow control functions

4 years agotrace: Add congestion control BDP update tracepoints
David Goulet [Tue, 28 Sep 2021 22:37:25 +0000 (22:37 +0000)] 
trace: Add congestion control BDP update tracepoints

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoAdd lttng trace support.
David Goulet [Tue, 28 Sep 2021 22:27:51 +0000 (22:27 +0000)] 
Add lttng trace support.

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoSupport rate limiting of edge connections reads.
David Goulet [Tue, 28 Sep 2021 22:23:32 +0000 (22:23 +0000)] 
Support rate limiting of edge connections reads.

We only need to rate limit reading on edges for flow control, as per the rate
that comes in the XON from the other side. When we rate limit reading from the
edge source to this rate, we will only deliver that fast to the other side,
thus satisfying its rate request.

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoProp#324: Add fields to edge connection.
Mike Perry [Tue, 10 Aug 2021 21:35:22 +0000 (21:35 +0000)] 
Prop#324: Add fields to edge connection.

4 years agohs-v2: Disable version 2 HSPOST and HSFETCH command
David Goulet [Thu, 30 Sep 2021 14:59:24 +0000 (10:59 -0400)] 
hs-v2: Disable version 2 HSPOST and HSFETCH command

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 directory
David Goulet [Thu, 30 Sep 2021 14:46:17 +0000 (10:46 -0400)] 
hs-v2: Disable version 2 directory

Relay do not accept both stores and lookups of version 2 descriptor.
This effectively disable version 2 HSDir supports for relays.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 introduction point
David Goulet [Thu, 30 Sep 2021 14:40:19 +0000 (10:40 -0400)] 
hs-v2: Disable version 2 introduction point

Upon receiving a v2 introduction request, the relay will close the
circuit and send back a tor protocol error.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable version 2 service
David Goulet [Thu, 30 Sep 2021 14:32:05 +0000 (10:32 -0400)] 
hs-v2: Disable version 2 service

The minimum service version is raised from 2 to 3 which effectively
disable loading or creating an onion service v2.

As for ADD_ONION, for version 2, a 551 error is returned:

  "551 Failed to add Onion Service"

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agohs-v2: Disable SOCKS connection for v2 addresses
David Goulet [Thu, 30 Sep 2021 14:26:37 +0000 (10:26 -0400)] 
hs-v2: Disable SOCKS connection for v2 addresses

This effectively turns off the ability of tor to use HSv2 as a client by
invalidating the v2 onion hostname passed through a SOCKS request.

Part of #40476

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoExport the n_ewma function for flow control use.
Mike Perry [Sat, 21 Aug 2021 00:02:30 +0000 (00:02 +0000)] 
Export the n_ewma function for flow control use.

4 years agoExport a global notion of monotime clock stall/jump.
Mike Perry [Fri, 20 Aug 2021 15:44:16 +0000 (15:44 +0000)] 
Export a global notion of monotime clock stall/jump.

Monotime clock functionality is a global property, and flow control
also needs to know if it can trust the clock.

4 years agoAdd trunnel definitions for xon/xoff cells.
Mike Perry [Fri, 6 Aug 2021 18:47:05 +0000 (18:47 +0000)] 
Add trunnel definitions for xon/xoff cells.

4 years agotest: Add sandbox unit tests
Simon South [Thu, 2 Sep 2021 15:04:23 +0000 (11:04 -0400)] 
test: Add sandbox unit tests

4 years agoconfigure.ac: Define ENABLE_COVERAGE macro
Simon South [Thu, 23 Sep 2021 13:21:13 +0000 (09:21 -0400)] 
configure.ac: Define ENABLE_COVERAGE macro

Allow conditional compilation based on whether the "--enable-coverage"
configure option was specified.

4 years agosandbox: Allow use with fragile hardening
Simon South [Fri, 24 Sep 2021 18:08:58 +0000 (14:08 -0400)] 
sandbox: Allow use with fragile hardening

When building with --enable-fragile-hardening, add or relax Linux
seccomp rules to allow AddressSanitizer to execute normally if the
process terminates with the sandbox active.

Further resolves issue 11477.

4 years agoconfigure.ac: Define ENABLE_FRAGILE_HARDENING macro
Simon South [Wed, 22 Sep 2021 18:42:45 +0000 (14:42 -0400)] 
configure.ac: Define ENABLE_FRAGILE_HARDENING macro

Allow conditional compilation based on whether the
"--enable-fragile-hardening" configure option was specified.

4 years agoone more pass over the changelog tor-0.4.7.1-alpha
Roger Dingledine [Fri, 17 Sep 2021 15:01:37 +0000 (11:01 -0400)] 
one more pass over the changelog

4 years agoRun format_changelog.
Nick Mathewson [Fri, 17 Sep 2021 14:50:40 +0000 (10:50 -0400)] 
Run format_changelog.

4 years agoEdit changelog with a few grammar and simplicity fixes.
Nick Mathewson [Fri, 17 Sep 2021 14:50:23 +0000 (10:50 -0400)] 
Edit changelog with a few grammar and simplicity fixes.

4 years agoBump version to 0.4.7.1-alpha
David Goulet [Fri, 17 Sep 2021 13:32:57 +0000 (09:32 -0400)] 
Bump version to 0.4.7.1-alpha

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agochangelog: ChangeLog for 0.4.7.1-alpha release
David Goulet [Fri, 17 Sep 2021 13:20:00 +0000 (09:20 -0400)] 
changelog: ChangeLog for 0.4.7.1-alpha release

Signed-off-by: David Goulet <dgoulet@torproject.org>
4 years agoMerge remote-tracking branches 'tor-gitlab/mr/439' and 'tor-gitlab/mr/441'
Nick Mathewson [Thu, 16 Sep 2021 12:53:28 +0000 (08:53 -0400)] 
Merge remote-tracking branches 'tor-gitlab/mr/439' and 'tor-gitlab/mr/441'

4 years agoUpdate Tor's man 1 page
skaluzka [Wed, 15 Sep 2021 17:16:07 +0000 (19:16 +0200)] 
Update Tor's man 1 page

Add few missing periods, convert tabs to spaces.
No new significant content added.

Signed-off-by: skaluzka <skaluzka@protonmail.com>
4 years agotor.1 man page: Add mention of fingerprint-ed25519, and clarify differences
Neel Chauhan [Tue, 14 Sep 2021 18:10:11 +0000 (11:10 -0700)] 
tor.1 man page: Add mention of fingerprint-ed25519, and clarify differences