]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
2 years agocompress_lzma: New enum values from liblzma 5.3.x maint-0.4.5
Micah Elizabeth Scott [Wed, 18 Jan 2023 22:14:47 +0000 (14:14 -0800)] 
compress_lzma: New enum values from liblzma 5.3.x

Add new liblzma enums (LZMA_SEEK_NEEDED and LZMA_RET_INTERNAL*)
conditional to the API version they arrived in. The first stable
version of liblzma this affects is 5.4.0

Fixes #40741

Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2 years agoversion: Bump version to 0.4.5.16-dev
Tor CI Release [Thu, 12 Jan 2023 16:26:31 +0000 (16:26 +0000)] 
version: Bump version to 0.4.5.16-dev

2 years agoversion: Bump version to 0.4.5.16
Tor CI Release [Thu, 12 Jan 2023 16:01:04 +0000 (16:01 +0000)] 
version: Bump version to 0.4.5.16

2 years agofallbackdir: Update list generated on January 12, 2023
Tor CI Release [Thu, 12 Jan 2023 16:00:16 +0000 (16:00 +0000)] 
fallbackdir: Update list generated on January 12, 2023

2 years agoUpdate geoip files to match ipfire location db, 2023/01/12.
Tor CI Release [Thu, 12 Jan 2023 16:00:06 +0000 (16:00 +0000)] 
Update geoip files to match ipfire location db, 2023/01/12.

2 years agoMerge branch 'ticket40730_045_01' into maint-0.4.5
David Goulet [Thu, 12 Jan 2023 15:52:31 +0000 (10:52 -0500)] 
Merge branch 'ticket40730_045_01' into maint-0.4.5

2 years agoMerge branch 'tor-gitlab/mr/538' into maint-0.4.5
David Goulet [Wed, 11 Jan 2023 14:03:26 +0000 (09:03 -0500)] 
Merge branch 'tor-gitlab/mr/538' into maint-0.4.5

2 years agosocks: Make SafeSocks refuse SOCKS4 and accept SOCKS4a
David Goulet [Mon, 12 Dec 2022 15:02:07 +0000 (10:02 -0500)] 
socks: Make SafeSocks refuse SOCKS4 and accept SOCKS4a

The logic was inverted. Introduced in commit
9155e08450fe7a609f8223202e8aa7dfbca20a6d.

This was reported through our bug bounty program on H1. It fixes the
TROVE-2022-002.

Fixes #40730

Signed-off-by: David Goulet <dgoulet@torproject.org>
2 years agoversion: Bump version to 0.4.5.15-dev
Tor CI Release [Tue, 6 Dec 2022 15:34:07 +0000 (15:34 +0000)] 
version: Bump version to 0.4.5.15-dev

2 years agoversion: Bump version to 0.4.5.15
Tor CI Release [Tue, 6 Dec 2022 15:05:24 +0000 (15:05 +0000)] 
version: Bump version to 0.4.5.15

2 years agofallbackdir: Update list generated on December 06, 2022
Tor CI Release [Tue, 6 Dec 2022 15:03:57 +0000 (15:03 +0000)] 
fallbackdir: Update list generated on December 06, 2022

2 years agoUpdate geoip files to match ipfire location db, 2022/12/06.
Tor CI Release [Tue, 6 Dec 2022 14:56:15 +0000 (14:56 +0000)] 
Update geoip files to match ipfire location db, 2022/12/06.

2 years agofallbackdir: Update files from latest 047 release
David Goulet [Tue, 6 Dec 2022 14:59:27 +0000 (09:59 -0500)] 
fallbackdir: Update files from latest 047 release

We need the fallbackdir file to be the same so our release CI can
generate a new list and apply it uniformly on all series.

(Same as geoip)

Signed-off-by: David Goulet <dgoulet@torproject.org>
2 years agogeoip: Update files from latest 047 release
David Goulet [Tue, 6 Dec 2022 14:47:55 +0000 (09:47 -0500)] 
geoip: Update files from latest 047 release

We need all geoip files to be the same so our release CI can generate a
new list and apply it uniformly on all series.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2 years agodirauth: rotate moria1 keys and ports
Roger Dingledine [Wed, 30 Nov 2022 01:33:58 +0000 (20:33 -0500)] 
dirauth: rotate moria1 keys and ports

Rotate the relay identity key and v3 identity key for moria1. They
have been online for more than a decade, there was a known potential
compromise, and anyway refreshing keys periodically is good practice.

Advertise new ports too, to avoid confusion.

Closes ticket 40722.

2 years agochanges: Add file for ticket 40674
David Goulet [Mon, 28 Nov 2022 15:25:48 +0000 (10:25 -0500)] 
changes: Add file for ticket 40674

Signed-off-by: David Goulet <dgoulet@torproject.org>
2 years agodns: Make TTLs fuzzy at exit relays
Rasmus Dahlberg [Wed, 12 Oct 2022 18:29:11 +0000 (20:29 +0200)] 
dns: Make TTLs fuzzy at exit relays

This change mitigates DNS-based website oracles by making the time that
a domain name is cached uncertain (+- 4 minutes of what's measurable).

Resolves TROVE-2021-009.

Fixes #40674

2 years agoClip DNS TTL values once in event callback
Rasmus Dahlberg [Wed, 12 Oct 2022 18:29:11 +0000 (20:29 +0200)] 
Clip DNS TTL values once in event callback

This change ensures that other parts of the code base always operate on
the same clipped TTL values, notably without being aware of clipping.

2 years agobuild: fix -Wstrict-prototypes (Clang 16)
Sam James [Tue, 8 Nov 2022 06:42:59 +0000 (06:42 +0000)] 
build: fix -Wstrict-prototypes (Clang 16)

Clang 16 warns on -Wstrict-prototypes in preparation for C23 which can
among other things, lead to some configure tests silently failing/returning the wrong result.

Fixes this error:
```
-ignoreme: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes]
+ignoreme: error: a function declaration without a prototype is deprecated in all versions of C [-Werror,-Wstrict-prototypes]
 main ()
```

For more information, see LWN.net [0] or LLVM's Discourse [1], gentoo-dev@ [2],
or the (new) c-std-porting mailing list [3].

[0] https://lwn.net/Articles/913505/
[1] https://discourse.llvm.org/t/configure-script-breakage-with-the-new-werror-implicit-function-declaration/65213
[2] https://archives.gentoo.org/gentoo-dev/message/dd9f2d3082b8b6f8dfbccb0639e6e240
[3] hosted at lists.linux.dev.

Bug: https://bugs.gentoo.org/879747
Signed-off-by: Sam James <sam@gentoo.org>
---

2 years agoMerge branch 'tor-gitlab/mr/631' into maint-0.4.5
David Goulet [Wed, 26 Oct 2022 18:21:35 +0000 (14:21 -0400)] 
Merge branch 'tor-gitlab/mr/631' into maint-0.4.5

2 years agodirauth: Remove Faravahar
David Goulet [Tue, 18 Oct 2022 14:45:17 +0000 (10:45 -0400)] 
dirauth: Remove Faravahar

Closes #40688

Signed-off-by: David Goulet <dgoulet@torproject.org>
2 years agodirauth: Change dizum IP address
David Goulet [Tue, 18 Oct 2022 14:35:45 +0000 (10:35 -0400)] 
dirauth: Change dizum IP address

Closes #40687

Signed-off-by: David Goulet <dgoulet@torproject.org>
2 years agoFix a completely wrong calculation in mach monotime_init_internal()
Nick Mathewson [Thu, 13 Oct 2022 17:40:10 +0000 (13:40 -0400)] 
Fix a completely wrong calculation in mach monotime_init_internal()

Bug 1: We were purporting to calculate milliseconds per tick, when we
*should* have been computing ticks per millisecond.

Bug 2: Instead of computing either one of those, we were _actually_
computing femtoseconds per tick.

These two bugs covered for one another on x86 hardware, where 1 tick
== 1 nanosecond.  But on M1 OSX, 1 tick is about 41 nanoseconds,
causing surprising results.

Fixes bug 40684; bugfix on 0.3.3.1-alpha.

3 years agoversion: Bump version to 0.4.5.14-dev
Tor CI Release [Fri, 12 Aug 2022 14:33:25 +0000 (14:33 +0000)] 
version: Bump version to 0.4.5.14-dev

3 years agoversion: Bump version to 0.4.5.14 tor-0.4.5.14
Tor CI Release [Fri, 12 Aug 2022 13:37:49 +0000 (13:37 +0000)] 
version: Bump version to 0.4.5.14

3 years agogeoip: Update geoip files with August 9th, 2022 database
David Goulet [Fri, 12 Aug 2022 13:55:24 +0000 (09:55 -0400)] 
geoip: Update geoip files with August 9th, 2022 database

Fixes #40658

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoversion: Bump version to 0.4.5.13-dev
Tor CI Release [Thu, 11 Aug 2022 14:37:39 +0000 (14:37 +0000)] 
version: Bump version to 0.4.5.13-dev

3 years agoversion: Bump version to 0.4.5.13
Tor CI Release [Thu, 11 Aug 2022 13:40:32 +0000 (13:40 +0000)] 
version: Bump version to 0.4.5.13

3 years agofallbackdir: Update list generated on August 11, 2022
Tor CI Release [Thu, 11 Aug 2022 13:39:29 +0000 (13:39 +0000)] 
fallbackdir: Update list generated on August 11, 2022

3 years agoUpdate geoip files to match ipfire location db, 2022/08/11.
Tor CI Release [Thu, 11 Aug 2022 13:38:23 +0000 (13:38 +0000)] 
Update geoip files to match ipfire location db, 2022/08/11.

3 years agofallbackdirs: Update list from maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:59:14 +0000 (13:59 -0400)] 
fallbackdirs: Update list from maint-0.4.7

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agogeoip: Update files from maint-0.4.7
David Goulet [Wed, 10 Aug 2022 17:41:22 +0000 (13:41 -0400)] 
geoip: Update files from maint-0.4.7

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoMerge branch 'tor-gitlab/mr/608' into maint-0.4.5
David Goulet [Tue, 2 Aug 2022 20:13:58 +0000 (16:13 -0400)] 
Merge branch 'tor-gitlab/mr/608' into maint-0.4.5

3 years agorelay: Don't send DESTROY remote reason backward or forward
David Goulet [Tue, 2 Aug 2022 19:49:03 +0000 (15:49 -0400)] 
relay: Don't send DESTROY remote reason backward or forward

Fixes #40649

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoconn: Notify btrack subsys on normal OR conn close
David Goulet [Mon, 1 Aug 2022 14:58:40 +0000 (10:58 -0400)] 
conn: Notify btrack subsys on normal OR conn close

Fixes #40604

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoMerge branch 'tor-gitlab/mr/605' into maint-0.4.5
David Goulet [Wed, 27 Jul 2022 15:33:16 +0000 (11:33 -0400)] 
Merge branch 'tor-gitlab/mr/605' into maint-0.4.5

3 years agoFix a check, make a netflow padding function more safe.
Nick Mathewson [Wed, 27 Jul 2022 13:16:50 +0000 (09:16 -0400)] 
Fix a check, make a netflow padding function more safe.

Previously, `channelpadding_get_netflow_inactive_timeout_ms` would
crash with an assertion failure if `low_timeout` was greater than
`high_timeout`. That wasn't possible in practice because of checks
in `channelpadding_update_padding_for_channel`, but it's better not
to have a function whose correctness is this tricky to prove.

Fixes #40645.  Bugfix on 0.3.1.1-alpha.

3 years agorelay: Use remote reason when sending back a DESTROY
David Goulet [Wed, 27 Jul 2022 12:32:01 +0000 (08:32 -0400)] 
relay: Use remote reason when sending back a DESTROY

Fix from previous commit where a DESTROY cell is sent instead of a
TRUNCATED.

Related to #40623

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agorelay: Send DESTROY cell instead of TRUNCATED cell
David Goulet [Fri, 22 Jul 2022 17:53:52 +0000 (13:53 -0400)] 
relay: Send DESTROY cell instead of TRUNCATED cell

Note that with this commit, TRUNCATED cells won't be used anymore that
is client and relays won't emit them.

Fixes #40623

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoAdd changes entry to tor!575.
Alexander Færøy [Mon, 9 May 2022 14:35:42 +0000 (14:35 +0000)] 
Add changes entry to tor!575.

See: tpo/core/tor#40601.

3 years agosandbox: Permit rseq syscall as well
pmu-ipf [Sat, 30 Apr 2022 11:10:04 +0000 (11:10 +0000)] 
sandbox: Permit rseq syscall as well

This was found to be necessary in conjunction with glibc 2.35 on Linux.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
3 years agoMerge branch 'tor-gitlab/mr/491' into maint-0.4.5
David Goulet [Thu, 14 Apr 2022 13:37:43 +0000 (09:37 -0400)] 
Merge branch 'tor-gitlab/mr/491' into maint-0.4.5

3 years agoMerge branch 'tor-gitlab/mr/497' into maint-0.4.5
David Goulet [Thu, 14 Apr 2022 13:34:46 +0000 (09:34 -0400)] 
Merge branch 'tor-gitlab/mr/497' into maint-0.4.5

3 years agoMerge branch 'tor-gitlab/mr/556' into maint-0.4.5
David Goulet [Mon, 28 Mar 2022 13:44:31 +0000 (09:44 -0400)] 
Merge branch 'tor-gitlab/mr/556' into maint-0.4.5

3 years agoSandbox: Permit the clone3 system call
Nick Mathewson [Sun, 27 Mar 2022 22:34:25 +0000 (18:34 -0400)] 
Sandbox: Permit the clone3 system call

Apparently glibc-2.34 uses clone3, when previously it just used
clone.

Closes ticket #40590.

3 years agoMerge branch 'tor-gitlab/mr/533' into maint-0.4.5
David Goulet [Wed, 16 Mar 2022 17:27:27 +0000 (13:27 -0400)] 
Merge branch 'tor-gitlab/mr/533' into maint-0.4.5

3 years agohs: Schedule mainloop event on dirinfo change
David Goulet [Wed, 9 Mar 2022 18:47:27 +0000 (13:47 -0500)] 
hs: Schedule mainloop event on dirinfo change

Due to a possible Guard subsystem recursion, when the HS client gets
notified that the directory information has changed, it must run it in a
seperate mainloop event to avoid such issue.

See the ticket for more information on the recursion. This also fixes a
fatal assert.

Fixes #40579

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agohs: Fix multiple port label on single metric
David Goulet [Tue, 8 Mar 2022 18:50:34 +0000 (13:50 -0500)] 
hs: Fix multiple port label on single metric

Prometheus needs unique labels and so this bug was causing an onion
service with multiple ports to have multiple "port=" label for the
metrics requiring a port label.

Fixes #40581

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoconnection_or_set_identity_digest(): handle zero ed_id better
Nick Mathewson [Wed, 2 Mar 2022 14:38:58 +0000 (09:38 -0500)] 
connection_or_set_identity_digest(): handle zero ed_id better

It looks like our code actually assumes (by dereferencing it in a
log call) that ed_id will _not_ be NULL, but rather will be a bunch
of zero bytes.  Refactor the code accordingly, and stop using NULL
tests on ed_id.

3 years agoAdd a changes file for 40563.
Nick Mathewson [Wed, 2 Mar 2022 14:38:45 +0000 (09:38 -0500)] 
Add a changes file for 40563.

3 years agoconnection_or_set_identity_digest: more defensive programming
Nick Mathewson [Tue, 1 Mar 2022 16:55:40 +0000 (11:55 -0500)] 
connection_or_set_identity_digest: more defensive programming

We expect ed_id == NULL here to indicate "no ed id", but other parts
of Tor sometimes use an all-0 ed_id.  Here we detect that input and
replace it with what's expected.

3 years agoFix logic for whether a channel's Ed25519 ID is changing
Nick Mathewson [Tue, 1 Mar 2022 16:53:10 +0000 (11:53 -0500)] 
Fix logic for whether a channel's Ed25519 ID is changing

The previous code would notice if we were changing from one identity
to another, but not if we were changing from no identity to having
an identity.  This problem caused a bug (spotted by cypherpunks in
ticket #40563) where if we created a channel for a circuit request
that doesn't include an Ed25519 identity, we won't be able to use
that channel later for requests that _do_ list Ed25519.

Fix for 40563; bugfix on 0.3.0.1-alpha.

3 years agoconnection_or_set_identity_digest(): Make errors nonfatal.
Nick Mathewson [Tue, 1 Mar 2022 16:22:34 +0000 (11:22 -0500)] 
connection_or_set_identity_digest(): Make errors nonfatal.

Previously we were using tor_assert() to enforce the documented
invariant here; this commit changes it to use BUG() instead.  It
will protect us from crashes if the next commit (on #40563) turns
out to expose a bug somewhere.

3 years agoAdd CI triggers for Debian package builds
Jérôme Charaoui [Tue, 15 Feb 2022 22:07:24 +0000 (17:07 -0500)] 
Add CI triggers for Debian package builds

This enables on-demand debian packaging CI builds on maintenance
branches, to replace (often unnecessary) daily scheduled builds.

3 years agoversion: Bump version to 0.4.5.12-dev
Tor CI Release [Fri, 4 Feb 2022 16:29:20 +0000 (16:29 +0000)] 
version: Bump version to 0.4.5.12-dev

3 years agoversion: Bump version to 0.4.5.12
Tor CI Release [Fri, 4 Feb 2022 16:00:33 +0000 (16:00 +0000)] 
version: Bump version to 0.4.5.12

3 years agofallbackdir: Update list generated on February 04, 2022
Tor CI Release [Fri, 4 Feb 2022 15:49:03 +0000 (15:49 +0000)] 
fallbackdir: Update list generated on February 04, 2022

3 years agoUpdate geoip files to match ipfire location db, 2022/02/04.
Tor CI Release [Fri, 4 Feb 2022 15:46:27 +0000 (15:46 +0000)] 
Update geoip files to match ipfire location db, 2022/02/04.

3 years agoUpdate geoip files to match ipfire location db, 2021/12/15.
Tor CI Release [Wed, 15 Dec 2021 16:17:47 +0000 (16:17 +0000)] 
Update geoip files to match ipfire location db, 2021/12/15.

3 years agofallbackdir: Update list generated on December 15, 2021
Tor CI Release [Wed, 15 Dec 2021 16:29:45 +0000 (16:29 +0000)] 
fallbackdir: Update list generated on December 15, 2021

3 years agohs: Double quote the metrics label value
David Goulet [Wed, 2 Feb 2022 18:51:22 +0000 (13:51 -0500)] 
hs: Double quote the metrics label value

Fixes #40552

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Mon, 24 Jan 2022 15:49:32 +0000 (10:49 -0500)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoversion: Bump version to 0.3.5.18 maint-0.3.5
David Goulet [Mon, 24 Jan 2022 15:47:29 +0000 (10:47 -0500)] 
version: Bump version to 0.3.5.18

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agofallbackdir: Update list generated on January 24, 2022
David Goulet [Mon, 24 Jan 2022 15:35:02 +0000 (10:35 -0500)] 
fallbackdir: Update list generated on January 24, 2022

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agogeoip: Update to match ipfire location db, 2022/01/24.
David Goulet [Mon, 24 Jan 2022 15:31:43 +0000 (10:31 -0500)] 
geoip: Update to match ipfire location db, 2022/01/24.

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agotest: Remove HSv2 protover specific test
David Goulet [Wed, 19 Jan 2022 18:36:23 +0000 (13:36 -0500)] 
test: Remove HSv2 protover specific test

HSv2 is not advertised as a supported protocol version anymore.

This was introduced with the merge-forward of commit 72041c63064b461e
which didn't fix the unit test.

Fixes #40549

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Tue, 18 Jan 2022 18:15:38 +0000 (13:15 -0500)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoMerge branch 'tor-gitlab/mr/511' into maint-0.3.5
David Goulet [Tue, 18 Jan 2022 18:15:33 +0000 (13:15 -0500)] 
Merge branch 'tor-gitlab/mr/511' into maint-0.3.5

3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Tue, 18 Jan 2022 18:15:29 +0000 (13:15 -0500)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoMerge branch 'tor-gitlab/mr/510' into maint-0.3.5
David Goulet [Tue, 18 Jan 2022 18:15:23 +0000 (13:15 -0500)] 
Merge branch 'tor-gitlab/mr/510' into maint-0.3.5

3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Tue, 18 Jan 2022 18:12:13 +0000 (13:12 -0500)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoUpdate new relay blogpost URL
Jérôme Charaoui [Mon, 10 Jan 2022 15:16:24 +0000 (15:16 +0000)] 
Update new relay blogpost URL

This removes the '/blog/' URL component which relies on a
redirection since the blog has been migrated to Lektor

3 years agomain: Update a dead URL in a log notice
David Goulet [Tue, 18 Jan 2022 17:51:52 +0000 (12:51 -0500)] 
main: Update a dead URL in a log notice

Change https://www.torproject.org/download/download#warning to
https://support.torproject.org/faq/staying-anonymous/

Closes #40544

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agorelay: Don't advertise HSv2 protocol version
David Goulet [Thu, 4 Nov 2021 18:44:58 +0000 (14:44 -0400)] 
relay: Don't advertise HSv2 protocol version

We removed HSIntro=3 and HSDir=1 that are v2 specific. Since 0.3.5.17,
we do not support introducing or being a directory for onion service v2.

Closes #40509

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoLimit the number of elements in a consdiff hash line.
Nick Mathewson [Mon, 6 Dec 2021 17:35:08 +0000 (12:35 -0500)] 
Limit the number of elements in a consdiff hash line.

This avoids performing and then freeing a lot of small mallocs() if
the hash line has too many elements.

Fixes one case of bug 40472; resolves OSS-Fuzz 38363.  Bugfix on
0.3.1.1-alpha when the consdiff parsing code was introduced.

3 years agoDo not count controller-selected paths towards path bias.
Nick Mathewson [Mon, 15 Nov 2021 13:55:47 +0000 (08:55 -0500)] 
Do not count controller-selected paths towards path bias.

As a side effect, this fixes a "Bug" warning.

Closes #40515.  Bugfix on 0.2.4.10-alpha.

3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Mon, 8 Nov 2021 14:16:18 +0000 (14:16 +0000)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoMerge remote-tracking branch 'tor-gitlab/mr/487' into maint-0.3.5
Alexander Færøy [Mon, 8 Nov 2021 14:15:59 +0000 (14:15 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/487' into maint-0.3.5

3 years agoMerge remote-tracking branch 'tor-gitlab/mr/486' into maint-0.3.5
Alexander Færøy [Mon, 8 Nov 2021 14:15:56 +0000 (14:15 +0000)] 
Merge remote-tracking branch 'tor-gitlab/mr/486' into maint-0.3.5

3 years agoGive an error message if LibreSSL's TLSv1.3 APIs aren't what we need
Nick Mathewson [Sat, 6 Nov 2021 15:04:08 +0000 (11:04 -0400)] 
Give an error message if LibreSSL's TLSv1.3 APIs aren't what we need

From LibreSSL versions 3.2.1 through 3.4.0, our configure script
would conclude that TLSv1.3 as supported, but it actually wasn't.
This led to annoying breakage like #40128 and #40445.

Now we give an error message if we try to build with one of those
versions.

Closes #40511.

3 years agoReverse the direction of the test for openssl 3.0.0
Nick Mathewson [Fri, 5 Nov 2021 17:23:05 +0000 (13:23 -0400)] 
Reverse the direction of the test for openssl 3.0.0

Previously the logic was reversed, and always gave the wrong answer.
This has no other effect than to change whether we suppress
deprecated API warnings.

Fixes #40429; bugfix on 0.3.5.13.

3 years agoprotover: Fix merge forward from 035
David Goulet [Fri, 5 Nov 2021 14:42:54 +0000 (10:42 -0400)] 
protover: Fix merge forward from 035

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Fri, 5 Nov 2021 14:35:08 +0000 (10:35 -0400)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoLight edit to protover warnings.
Nick Mathewson [Fri, 5 Nov 2021 14:30:57 +0000 (10:30 -0400)] 
Light edit to protover warnings.

3 years agoprotover: Add a note on why LinkAuth is not recommended or required
David Goulet [Fri, 5 Nov 2021 14:16:08 +0000 (10:16 -0400)] 
protover: Add a note on why LinkAuth is not recommended or required

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoprotover: Move all hardcoded lists in one place
David Goulet [Fri, 5 Nov 2021 14:10:24 +0000 (10:10 -0400)] 
protover: Move all hardcoded lists in one place

This also moves the warnings and add some theatrical effect around the
code so anyone modifying those list should notice the warnings signs and
read the comment accordingly.

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoAdd scary warnings about changing the protover list.
Nick Mathewson [Fri, 5 Nov 2021 13:15:10 +0000 (09:15 -0400)] 
Add scary warnings about changing the protover list.

Doing this in the wrong way has potential to cause serious havoc on
the network, so let's make it harder for future programmers to mess
it up.

3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Fri, 5 Nov 2021 03:10:28 +0000 (03:10 +0000)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoMerge remote-tracking branch 'ahf/ahf/ci-i386' into maint-0.3.5
Alexander Færøy [Fri, 5 Nov 2021 03:10:12 +0000 (03:10 +0000)] 
Merge remote-tracking branch 'ahf/ahf/ci-i386' into maint-0.3.5

3 years agoMerge branch 'tor-gitlab/mr/477' into maint-0.4.5
David Goulet [Wed, 3 Nov 2021 13:52:03 +0000 (09:52 -0400)] 
Merge branch 'tor-gitlab/mr/477' into maint-0.4.5

3 years agorelay: Don't allow DirPort on non-IPv4
David Goulet [Tue, 2 Nov 2021 13:34:03 +0000 (09:34 -0400)] 
relay: Don't allow DirPort on non-IPv4

Our code doesn't allow it and so this prevents an assert() crash if the
DirPort is for instance IPv6 only.

Fixes #40494

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Wed, 3 Nov 2021 13:47:43 +0000 (09:47 -0400)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoshellcheck: Make it happy on couple scripts
David Goulet [Wed, 3 Nov 2021 13:47:30 +0000 (09:47 -0400)] 
shellcheck: Make it happy on couple scripts

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agoAdd i386 version of debian-minimal for 32-bit Gitlab CI builds.
Alexander Færøy [Wed, 3 Nov 2021 12:36:30 +0000 (12:36 +0000)] 
Add i386 version of debian-minimal for 32-bit Gitlab CI builds.

See: tpo/core/tor#40505

3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
Alexander Færøy [Fri, 29 Oct 2021 16:56:33 +0000 (16:56 +0000)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agoFix Windows build.
Alexander Færøy [Fri, 5 Feb 2021 17:12:52 +0000 (17:12 +0000)] 
Fix Windows build.

While trying to resolve our CI issues, the Windows build broke with an
unused function error:

   src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’
   defined but not used [-Werror=unused-function]

We solve this by moving the `#if !defined(_WIN32)` test above the
`unprivileged_port_range_start()` function defintion such that it is
included in its body.

This is an unreviewed commit.

See: tor#40275

3 years agoMerge branch 'maint-0.3.5' into maint-0.4.5
David Goulet [Fri, 29 Oct 2021 13:20:21 +0000 (09:20 -0400)] 
Merge branch 'maint-0.3.5' into maint-0.4.5

3 years agochanges: Add file for ticket 26299
David Goulet [Fri, 29 Oct 2021 13:19:59 +0000 (09:19 -0400)] 
changes: Add file for ticket 26299

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agochanges: Add file for ticket 26299
David Goulet [Fri, 29 Oct 2021 13:19:21 +0000 (09:19 -0400)] 
changes: Add file for ticket 26299

Signed-off-by: David Goulet <dgoulet@torproject.org>
3 years agomakefile: Add a reproducible dist make job
David Goulet [Thu, 28 Oct 2021 20:29:22 +0000 (16:29 -0400)] 
makefile: Add a reproducible dist make job

Signed-off-by: David Goulet <dgoulet@torproject.org>