]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Tue, 19 Oct 2021 18:13:33 +0000 (14:13 -0400)]
relay: Overload state on DNS timeout is now X% over Y secs
With this commit, we will only report a general overload state if we've
seen more than X% of DNS timeout errors over Y seconds. Previous
behavior was to report when a single timeout occured which is really too
small of a threshold.
The value X is a consensus parameters called
"overload_dns_timeout_scale_percent" which is a scaled percentage
(factor of 1000) so we can represent decimal points for X like 0.5% for
instance. Its default is 1000 which ends up being 1%.
The value Y is a consensus parameters called
"overload_dns_timeout_period_secs" which is the time period for which
will gather DNS errors and once over, we assess if that X% has been
reached ultimately triggering a general overload signal.
Closes #40491
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Oct 2021 14:55:29 +0000 (10:55 -0400)]
hs: Fix merge conflicts after merging forward 40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Oct 2021 14:35:35 +0000 (10:35 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 19 Oct 2021 14:29:15 +0000 (10:29 -0400)]
Merge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Thu, 14 Oct 2021 13:56:10 +0000 (09:56 -0400)]
hs: Improve warning for bad service version
Now that we don't have version 2, it gives us:
[warn] HiddenServiceVersion must be between 3 and 3, not 2.
This commit changes it to:
[warn] HiddenServiceVersion must be 3, not 2.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:21:13 +0000 (11:21 -0400)]
changes: Add file for ticket 40476
Closes #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:12:46 +0000 (11:12 -0400)]
test: Don't run HSv2 Chutney test networks
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:09:48 +0000 (11:09 -0400)]
test: Fix unit tests after disabling version 2
Some tests were removed because they were testing something not usable
anymore.
Some tests remains to make sure that things are indeed disabled.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 14 Oct 2021 13:56:10 +0000 (09:56 -0400)]
hs: Improve warning for bad service version
Now that we don't have version 2, it gives us:
[warn] HiddenServiceVersion must be between 3 and 3, not 2.
This commit changes it to:
[warn] HiddenServiceVersion must be 3, not 2.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:21:13 +0000 (11:21 -0400)]
changes: Add file for ticket 40476
Closes #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:12:46 +0000 (11:12 -0400)]
test: Don't run HSv2 Chutney test networks
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:09:48 +0000 (11:09 -0400)]
test: Fix unit tests after disabling version 2
Some tests were removed because they were testing something not usable
anymore.
Some tests remains to make sure that things are indeed disabled.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Oct 2021 13:20:53 +0000 (09:20 -0400)]
hs-v2: Disable version 2 HSPOST and HSFETCH command
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:46:17 +0000 (10:46 -0400)]
hs-v2: Disable version 2 directory
Relay do not accept both stores and lookups of version 2 descriptor.
This effectively disable version 2 HSDir supports for relays.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Oct 2021 13:48:13 +0000 (09:48 -0400)]
Merge branch 'ticket40476_045_01' into ticket40476_046_01
David Goulet [Thu, 14 Oct 2021 13:56:10 +0000 (09:56 -0400)]
hs: Improve warning for bad service version
Now that we don't have version 2, it gives us:
[warn] HiddenServiceVersion must be between 3 and 3, not 2.
This commit changes it to:
[warn] HiddenServiceVersion must be 3, not 2.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:21:13 +0000 (11:21 -0400)]
changes: Add file for ticket 40476
Closes #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:12:46 +0000 (11:12 -0400)]
test: Don't run HSv2 Chutney test networks
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 15:09:48 +0000 (11:09 -0400)]
test: Fix unit tests after disabling version 2
Some tests were removed because they were testing something not usable
anymore.
Some tests remains to make sure that things are indeed disabled.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Oct 2021 13:20:53 +0000 (09:20 -0400)]
hs-v2: Disable version 2 HSPOST and HSFETCH command
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:46:17 +0000 (10:46 -0400)]
hs-v2: Disable version 2 directory
Relay do not accept both stores and lookups of version 2 descriptor.
This effectively disable version 2 HSDir supports for relays.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:40:19 +0000 (10:40 -0400)]
hs-v2: Disable version 2 introduction point
Upon receiving a v2 introduction request, the relay will close the
circuit and send back a tor protocol error.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 19 Oct 2021 13:11:12 +0000 (09:11 -0400)]
hs-v2: Disable version 2 service
The minimum service version is raised from 2 to 3 which effectively
disable loading or creating an onion service v2.
As for ADD_ONION, for version 2, a 551 error is returned:
"551 Failed to add Onion Service"
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:26:37 +0000 (10:26 -0400)]
hs-v2: Disable SOCKS connection for v2 addresses
This effectively turns off the ability of tor to use HSv2 as a client by
invalidating the v2 onion hostname passed through a SOCKS request.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 6 Oct 2021 19:45:19 +0000 (15:45 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 19:45:13 +0000 (15:45 -0400)]
Merge branch 'tor-gitlab/mr/392' into maint-0.4.5
David Goulet [Wed, 6 Oct 2021 19:41:17 +0000 (15:41 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 19:41:12 +0000 (15:41 -0400)]
Merge branch 'tor-gitlab/mr/393' into maint-0.4.5
David Goulet [Wed, 6 Oct 2021 19:35:43 +0000 (15:35 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 6 Oct 2021 19:35:30 +0000 (15:35 -0400)]
Merge branch 'tor-gitlab/mr/420' into maint-0.4.5
David Goulet [Wed, 6 Oct 2021 17:25:02 +0000 (13:25 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Mon, 4 Oct 2021 18:36:05 +0000 (14:36 -0400)]
hs-v2: Only log once the connection warning to v2
Closes #40474
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 4 Oct 2021 18:38:50 +0000 (14:38 -0400)]
hs-v2: Only log once the connection warning to v2
Closes #40474
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:59:24 +0000 (10:59 -0400)]
hs-v2: Disable version 2 HSPOST and HSFETCH command
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:46:17 +0000 (10:46 -0400)]
hs-v2: Disable version 2 directory
Relay do not accept both stores and lookups of version 2 descriptor.
This effectively disable version 2 HSDir supports for relays.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:40:19 +0000 (10:40 -0400)]
hs-v2: Disable version 2 introduction point
Upon receiving a v2 introduction request, the relay will close the
circuit and send back a tor protocol error.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:32:05 +0000 (10:32 -0400)]
hs-v2: Disable version 2 service
The minimum service version is raised from 2 to 3 which effectively
disable loading or creating an onion service v2.
As for ADD_ONION, for version 2, a 551 error is returned:
"551 Failed to add Onion Service"
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 30 Sep 2021 14:26:37 +0000 (10:26 -0400)]
hs-v2: Disable SOCKS connection for v2 addresses
This effectively turns off the ability of tor to use HSv2 as a client by
invalidating the v2 onion hostname passed through a SOCKS request.
Part of #40476
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 13 Sep 2021 17:34:48 +0000 (13:34 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Mon, 13 Sep 2021 17:34:44 +0000 (13:34 -0400)]
Merge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Thu, 4 Feb 2021 23:11:11 +0000 (23:11 +0000)]
Only check for bindable ports if we are unsure if it will fail.
We currently assume that the only way for Tor to listen on ports in the
privileged port range (1 to 1023), on Linux, is if we are granted the
NET_BIND_SERVICE capability. Today on Linux, it's possible to specify
the beginning of the unprivileged port range using a sysctl
configuration option. Docker (and thus the CI service Tor uses) recently
changed this sysctl value to 0, which causes our tests to fail as they
assume that we should NOT be able to bind to a privileged port *without*
the NET_BIND_SERVICE capability.
In this patch, we read the value of the sysctl value via the /proc/sys/
filesystem iff it's present, otherwise we assume the default
unprivileged port range begins at port 1024.
See: tor#40275
Alexander Færøy [Mon, 16 Aug 2021 13:52:58 +0000 (13:52 +0000)]
Use Debian bullseye for our hardened build.
Alexander Færøy [Mon, 13 Sep 2021 16:05:58 +0000 (18:05 +0200)]
Force amd64 for CI builds.
David Goulet [Tue, 17 Aug 2021 16:43:58 +0000 (12:43 -0400)]
dir: Do not flag non-running failing HSDir
When a directory request fails, we flag the relay as non Running so we
don't use it anymore.
This can be problematic with onion services because there are cases
where a tor instance could have a lot of services, ephemeral ones, and
keeps failing to upload descriptors, let say due to a bad network, and
thus flag a lot of nodes as non Running which then in turn can not be
used for circuit building.
This commit makes it that we never flag nodes as non Running on a onion
service directory request (upload or fetch) failure as to keep the
hashring intact and not affect other parts of tor.
Fortunately, the onion service hashring is _not_ selected by looking at
the Running flag but since we do a 3-hop circuit to the HSDir, other
services on the same instance can influence each other by removing nodes
from the consensus for path selection.
This was made apparent with a small network that ran out of nodes to
used due to rapid succession of onion services uploading and failing.
See #40434 for details.
Fixes #40434
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 16 Aug 2021 20:34:39 +0000 (16:34 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Mon, 16 Aug 2021 20:34:33 +0000 (16:34 -0400)]
Bump version to -dev
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 16 Aug 2021 20:34:19 +0000 (16:34 -0400)]
Merge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Mon, 16 Aug 2021 20:34:10 +0000 (16:34 -0400)]
Bump version to -dev
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 16 Aug 2021 20:33:58 +0000 (16:33 -0400)]
Bump version to -dev
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alexander Færøy [Mon, 16 Aug 2021 15:28:22 +0000 (15:28 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Mon, 16 Aug 2021 15:27:38 +0000 (15:27 +0000)]
Always teardown capture of logs in CAPTURE().
This will hopefully solve an issue where our gmtime related tests are
failing on 32-bit builds.
Alexander Færøy [Mon, 16 Aug 2021 13:58:32 +0000 (13:58 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Mon, 16 Aug 2021 13:58:32 +0000 (13:58 +0000)]
Merge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Mon, 16 Aug 2021 13:57:56 +0000 (13:57 +0000)]
Use debian:buster instead of debian:stable for now.
Nick Mathewson [Mon, 16 Aug 2021 13:51:27 +0000 (09:51 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Nick Mathewson [Mon, 16 Aug 2021 13:46:56 +0000 (09:46 -0400)]
Disable message checking for some 32-bit tests about timegm failure.
Since we merged 40383, we don't expect these to give the same
warning on every platform.
Nick Mathewson [Mon, 16 Aug 2021 12:21:04 +0000 (08:21 -0400)]
Make the version 0.4.6.7, not 0.4.6.7-dev.
Nick Mathewson [Mon, 16 Aug 2021 12:19:17 +0000 (08:19 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
"ours" to avoid version bump
Nick Mathewson [Mon, 16 Aug 2021 12:18:57 +0000 (08:18 -0400)]
Make the version 0.4.5.10, not 0.4.5.10-dev.
Nick Mathewson [Mon, 16 Aug 2021 12:18:09 +0000 (08:18 -0400)]
Merge branch 'maint-0.3.5' into maint-0.4.5
"ours" to avoid version bump
Nick Mathewson [Mon, 16 Aug 2021 12:17:59 +0000 (08:17 -0400)]
Make the version 0.3.6.16, not 0.3.6.16-dev.
David Goulet [Fri, 13 Aug 2021 13:46:31 +0000 (09:46 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Fri, 13 Aug 2021 13:44:53 +0000 (09:44 -0400)]
Merge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Fri, 13 Aug 2021 13:43:44 +0000 (09:43 -0400)]
Update version to 0.3.5.16
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 13 Aug 2021 13:42:52 +0000 (09:42 -0400)]
Update version to 0.4.5.10
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Fri, 13 Aug 2021 13:42:26 +0000 (09:42 -0400)]
Update version to 0.4.6.7
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 12 Aug 2021 16:13:26 +0000 (12:13 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Thu, 12 Aug 2021 16:13:25 +0000 (12:13 -0400)]
Merge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Thu, 12 Aug 2021 15:36:52 +0000 (15:36 +0000)]
Update GeoIP files to match IPFire location DB as per 2021/08/12.
Alexander Færøy [Wed, 11 Aug 2021 13:15:59 +0000 (13:15 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Wed, 11 Aug 2021 13:15:58 +0000 (13:15 +0000)]
Merge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Wed, 11 Aug 2021 13:15:35 +0000 (13:15 +0000)]
Merge remote-tracking branch 'tor-gitlab/mr/417' into maint-0.3.5
Alexander Færøy [Wed, 11 Aug 2021 13:14:26 +0000 (13:14 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Wed, 11 Aug 2021 13:14:26 +0000 (13:14 +0000)]
Merge branch 'maint-0.3.5' into maint-0.4.5
George Kadianakis [Fri, 30 Jul 2021 13:35:48 +0000 (16:35 +0300)]
Disable
ed25519 -donna's batch verification.
Fixes bug 40078.
As reported by hdevalence our batch verification logic can cause an assert
crash.
The assert happens because when the batch verification of
ed25519 -donna fails,
the code in `ed25519_checksig_batch()` falls back to doing a single
verification for each signature.
The crash occurs because batch verification failed, but then all signatures
individually verified just fine.
That's because batch verification and single verification use a different
equation which means that there are sigs that can pass single verification
but fail batch verification.
Fixing this would require modding
ed25519 -donna which is not in scope for
this ticket, and will be soon deprecated in favor of arti and
ed25519 -dalek, so my branch instead removes batch verification.
Alexander Færøy [Wed, 11 Aug 2021 13:07:46 +0000 (13:07 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Wed, 11 Aug 2021 13:04:40 +0000 (09:04 -0400)]
fallbackdir: Regenerate list
New list for all stable releases.
Closes #40447
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alexander Færøy [Wed, 11 Aug 2021 13:06:12 +0000 (13:06 +0000)]
Merge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Thu, 18 Feb 2021 17:49:33 +0000 (12:49 -0500)]
relay: Reduce streaming compression ratio from HIGH to LOW
Fixes #40301
Signed-off-by: David Goulet <dgoulet@torproject.org>
Alexander Færøy [Wed, 11 Aug 2021 12:48:04 +0000 (12:48 +0000)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Thu, 18 Feb 2021 17:49:33 +0000 (12:49 -0500)]
relay: Reduce streaming compression ratio from HIGH to LOW
Fixes #40301
Signed-off-by: David Goulet <dgoulet@torproject.org>
George Kadianakis [Wed, 7 Jul 2021 10:04:24 +0000 (13:04 +0300)]
Merge remote-tracking branch 'tor-gitlab/mr/406' into maint-0.4.6
George Kadianakis [Tue, 6 Jul 2021 10:52:15 +0000 (13:52 +0300)]
Merge branch 'maint-0.4.5' into maint-0.4.6
George Kadianakis [Tue, 6 Jul 2021 10:51:58 +0000 (13:51 +0300)]
Merge remote-tracking branch 'tor-gitlab/mr/409' into maint-0.4.5
George Kadianakis [Tue, 6 Jul 2021 10:42:53 +0000 (13:42 +0300)]
Merge branch 'maint-0.4.5' into maint-0.4.6
George Kadianakis [Tue, 6 Jul 2021 10:42:29 +0000 (13:42 +0300)]
Merge branch 'mr/395' into maint-0.4.5
Nick Mathewson [Tue, 1 Jun 2021 20:18:23 +0000 (16:18 -0400)]
Use native timegm when available.
Continue having a tor_gmtime_impl() unit test so that we can detect
any problems in our replacement function; add a new test function to
make sure that gmtime<->timegm are a round-trip on now-ish times.
This is a fix for bug #40383, wherein we ran into trouble because
tor_timegm() does not believe that time_t should include a count of
leap seconds, but FreeBSD's gmtime believes that it should. This
disagreement meant that for a certain amount of time each day,
instead of calculating the most recent midnight, our voting-schedule
functions would calculate the second-most-recent midnight, and lead
to an assertion failure.
I am calling this a bugfix on 0.2.0.3-alpha when we first started
calculating our voting schedule in this way.
Nick Mathewson [Thu, 1 Jul 2021 17:03:19 +0000 (13:03 -0400)]
Suppress a clang 12 warning about "suspicious concatenation".
My clang doesn't like it when we write code like this:
char *list[] = {
"abc",
"def",
"ghi"
"jkl"
}
It wonders whether we meant to put a comma between "ghi" and "jkl"
or not, and gives a warning.
To suppress this warning (since in this case, we did mean to omit
the comma), we just wrap the two strings in parentheses.
Closes #40426; bugfix on 0.4.0.4-rc.
Nick Mathewson [Wed, 30 Jun 2021 16:01:21 +0000 (12:01 -0400)]
Bump to 0.4.6.6-dev
Nick Mathewson [Wed, 30 Jun 2021 12:17:56 +0000 (08:17 -0400)]
Update version to 0.4.6.6.
Nick Mathewson [Wed, 30 Jun 2021 12:15:41 +0000 (08:15 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Nick Mathewson [Wed, 30 Jun 2021 12:14:57 +0000 (08:14 -0400)]
Missing changes file for #40409
David Goulet [Tue, 29 Jun 2021 14:41:36 +0000 (10:41 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
David Goulet [Tue, 29 Jun 2021 13:56:44 +0000 (09:56 -0400)]
hs: Send back 0xF6 for a v2 onion address
Fixes #40421
Signed-off-by: David Goulet <dgoulet@torproject.org>
Nick Mathewson [Mon, 28 Jun 2021 13:08:31 +0000 (09:08 -0400)]
Suppress strict-prototypes warning on NSS pk11pub.h header
We already did this in a couple of places, but there are more that
we didn't get. This is necessary for systems with versions of
NSS that don't do their prototypes properly.
Fixes #40409; bugfix on 0.3.5.1-alpha.
Nick Mathewson [Sat, 26 Jun 2021 14:04:38 +0000 (10:04 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
Alexander Færøy [Fri, 25 Jun 2021 16:29:53 +0000 (16:29 +0000)]
Enable deterministic RNG for address set tests.
This patch enables the deterministic RNG for address set tests,
including the tests which uses address set indirectly via the nodelist
API.
This should prevent random test failures in the highly unlikely case of
a false positive which was seen in tor#40419.
See: tpo/core/tor#40419.
Alexander Færøy [Thu, 10 Jun 2021 20:04:13 +0000 (20:04 +0000)]
Fix compilation on systems with older compilers.
This patch fixes a build error with GCC 7.x which doesn't seem to accept
const int's as constants in macro initialization.
See: tpo/core/tor#40410
Nick Mathewson [Mon, 14 Jun 2021 15:48:30 +0000 (11:48 -0400)]
Bump to 0.4.6.5-dev
Nick Mathewson [Mon, 14 Jun 2021 15:47:54 +0000 (11:47 -0400)]
Merge branch 'maint-0.4.5' into maint-0.4.6
"Ours" to avoid version bump.