]>
git.ipfire.org Git - thirdparty/tor.git/log
David Goulet [Thu, 7 Aug 2025 18:20:10 +0000 (14:20 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Thu, 7 Aug 2025 18:20:02 +0000 (14:20 -0400)]
changes: Add file for padding log fix
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 7 Aug 2025 18:12:09 +0000 (14:12 -0400)]
Merge branch 'tor-gitlab/mr/908' into maint-0.4.8
David Goulet [Tue, 5 Aug 2025 14:41:51 +0000 (10:41 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Waldemar Zimpel [Tue, 8 Jul 2025 18:52:49 +0000 (20:52 +0200)]
Fix: "Bug: Duplicate call to circuit_mark_for_close()"
Second attempt
Closes issues #41106, #40951
David Goulet [Tue, 1 Jul 2025 12:19:45 +0000 (08:19 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Tue, 1 Jul 2025 12:19:36 +0000 (08:19 -0400)]
geoip: Fix Rust clippy warning
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 30 Jun 2025 16:59:54 +0000 (12:59 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Mon, 30 Jun 2025 14:11:34 +0000 (14:11 +0000)]
version: Bump version to 0.4.8.17-dev
David Goulet [Mon, 30 Jun 2025 14:05:37 +0000 (10:05 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Mon, 30 Jun 2025 13:14:59 +0000 (13:14 +0000)]
version: Bump version to 0.4.8.17
David Goulet [Mon, 30 Jun 2025 14:03:10 +0000 (10:03 -0400)]
release: ChangeLog and ReleaseNotes for 0.4.8.17
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 30 Jun 2025 13:55:54 +0000 (09:55 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Mon, 30 Jun 2025 13:14:10 +0000 (13:14 +0000)]
fallbackdir: Update list generated on June 30, 2025
Tor CI Release [Mon, 30 Jun 2025 13:13:13 +0000 (13:13 +0000)]
Update geoip files to match ipfire location db, 2025/06/30.
David Goulet [Thu, 26 Jun 2025 16:13:11 +0000 (12:13 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
ValdikSS [Thu, 26 Jun 2025 14:24:28 +0000 (10:24 -0400)]
tls: Set TLSv1.3 ciphers to preserve ciphersuites order
This commit fixes two issues:
1. ciphers.inc has TLSv1.3 ciphers prefixed with "TXT", while current version
has "RFC". TLS1_3_RFC_AES_128_GCM_SHA256 should be instead of
TLS1_3_TXT_AES_128_GCM_SHA256, in both define and CIPHER() macro.
2. Tor calls only SSL_set_cipher_list() in tlstls_openssl.c, this sets only
TLSv1.2 ciphers, while TLSv1.3 ciphers stay in default state. TLSv1.3
ciphersuites are set with SSL_set_ciphersuites(), but the list require to
contain only TLSv1.3 suites (no v1.2).
Contrary to SSL_set_cipher_list(), TLSv1.3 SSL_set_ciphersuites() does NOT
accept finalizing :, so it should be stripped out.
Signed-off-by: David Goulet <dgoulet@torproject.org>
Waldemar Zimpel [Mon, 9 Jun 2025 12:07:33 +0000 (14:07 +0200)]
Logging / Channel padding delay
Reduce the amount of messages being logged related to
channel padding delay when log level is "notice".
Log the channel padding delay as "info" as soon as the
delay occurs. Log "notice" on each heartbeat only
containing the average channel padding delay and the
amount of delays (that exceeded the allowed time window)
occurring between heartbeats or, if first heartbeat
since startup, between startup and heartbeat.
David Goulet [Thu, 12 Jun 2025 15:57:31 +0000 (11:57 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Thu, 12 Jun 2025 15:57:27 +0000 (11:57 -0400)]
Merge branch 'tor-gitlab/mr/910' into maint-0.4.8
Waldemar Zimpel [Sun, 8 Jun 2025 12:20:48 +0000 (14:20 +0200)]
Unix processes / Obtain exit status code
The actual way for obtaining the exit code
of an exited child process
David Goulet [Mon, 9 Jun 2025 13:50:24 +0000 (09:50 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Mon, 9 Jun 2025 13:50:10 +0000 (09:50 -0400)]
Merge branch 'tor-gitlab/mr/903' into maint-0.4.8
David Goulet [Mon, 9 Jun 2025 13:36:26 +0000 (09:36 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Waldemar Zimpel [Sun, 1 Jun 2025 12:43:03 +0000 (14:43 +0200)]
Fix: "Bug: Duplicate call to circuit_mark_for_close()"
Closes issue #40951
Roger Dingledine [Mon, 9 Jun 2025 01:50:36 +0000 (21:50 -0400)]
log "list of supported TLS groups" only once
We had been logging it every two hours forever, even though it's based
on the version of OpenSSL we're using it so it will never change.
Fixes bug #41093.
The fix is an improvement on commit
ba88ad6b which addressed #41058.
Not adding a changes file since those commits haven't gone out in a
release yet either.
David Goulet [Wed, 21 May 2025 13:29:36 +0000 (09:29 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Wed, 21 May 2025 13:29:30 +0000 (09:29 -0400)]
Merge branch 'tor-gitlab/mr/894' into maint-0.4.8
David Goulet [Wed, 21 May 2025 12:55:51 +0000 (08:55 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Nick Mathewson [Mon, 19 May 2025 01:52:36 +0000 (21:52 -0400)]
Make an exception to one of the NONSTRINGs
Older GCCs accept the attribute but don't believe it can appear
before an array.
Nick Mathewson [Mon, 19 May 2025 01:12:30 +0000 (21:12 -0400)]
Add a changes file for 41079.
Nick Mathewson [Mon, 19 May 2025 01:11:00 +0000 (21:11 -0400)]
Fix a new GCC warning about strings.
When we say something like
```
const char foo[3] = "foo";
```
GCC now complains, because there is no space for the terminating NUL.
But we use this construction in a lot of places in our tests to
initialize test digests, keys, and so on. So to resolve the issue,
we have to mark these strings with a new attribute.
Nick Mathewson [Mon, 19 May 2025 00:54:08 +0000 (20:54 -0400)]
Convince gcc that we will not access an array out of bounds
Nick Mathewson [Mon, 12 May 2025 12:44:44 +0000 (08:44 -0400)]
reindent code from previous commit
Nick Mathewson [Mon, 12 May 2025 12:27:34 +0000 (08:27 -0400)]
Allow pow-params to appear multiple times.
Relatedly, we only require that a pow-params line has _1_ argument
(since future versions might have nothing but a scheme).
See torspec#272 for discussion;
also see proposal 356 for why the fingerprinting opportunity here
isn't a big deal.
We probably shouldn't merge this until torspec!390 is in,
just in case we decide _not_ to take this approach.
(I haven't reindented some code here yet, to make the diff easier to read.)
David Goulet [Mon, 5 May 2025 16:33:59 +0000 (12:33 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
orbea [Thu, 31 Aug 2023 21:35:52 +0000 (14:35 -0700)]
crypt_openssl_mgt: define DISABLE_ENGINES after OPENSSL_NO_ENGINE
With LibreSSL-3.8.1 these engines are no long available causing a build
failure, but LibreSSL correctly defines OPENSSL_NO_ENGINE as part of its
opensslfeatures.h. However Tor includes crypto_openssl_mgt.h before any
of the openssl includes which would define OPENSSL_NO_ENGINE and then
fails to define DISABLE_ENGINES.
As the define is used in only a single .c file it is best to move it
there.
Signed-off-by: orbea <orbea@riseup.net>
orbea [Wed, 30 Apr 2025 18:47:13 +0000 (11:47 -0700)]
compat_openssl: fix for LibreSSL 4.1.0
Starting with LibreSSL 4.1.0 this now causes a build failure:
src/lib/tls/tortls_openssl.c: In function 'tor_tls_setup_session_secret_cb':
src/lib/tls/tortls_openssl.c:1059:39: error: passing argument 2 of 'SSL_set_session_secret_cb' from incompatible pointer type [-Wincompatible-pointer-types]
1059 | SSL_set_session_secret_cb(tls->ssl, tor_tls_session_secret_cb, NULL);
| ^~~~~~~~~~~~~~~~~~~~~~~~~
| |
| int (*)(SSL *, void *, int *, struct stack_st_SSL_CIPHER *, SSL_CIPHER **, void *) {aka int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, struct ssl_cipher_st **, void *)}
In file included from src/lib/tls/tortls_openssl.c:48:
/usr/include/openssl/ssl.h:1489:30: note: expected 'tls_session_secret_cb_fn' {aka 'int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, const struct ssl_cipher_st **, void *)'} but argument is of type 'int (*)(SSL *, void *, int *, struct stack_st_SSL_CIPHER *, SSL_CIPHER **, void *)' {aka 'int (*)(struct ssl_st *, void *, int *, struct stack_st_SSL_CIPHER *, struct ssl_cipher_st **, void *)'}
1489 | tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
| ~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~
Signed-off-by: orbea <orbea@riseup.net>
David Goulet [Wed, 23 Apr 2025 18:35:27 +0000 (14:35 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Nick Mathewson [Wed, 23 Apr 2025 18:11:39 +0000 (14:11 -0400)]
Promote "list of supported groups" message to notice.
I have a feeling that this might help diagnosing
any other problems similar to #41058.
Nick Mathewson [Wed, 23 Apr 2025 18:10:43 +0000 (14:10 -0400)]
Only try more complex OpenSSL group list syntax with OpenSSL 3.5.
Closes #41058.
David Goulet [Wed, 23 Apr 2025 15:00:53 +0000 (11:00 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Nick Mathewson [Wed, 23 Apr 2025 13:13:04 +0000 (09:13 -0400)]
TLS: When possible, enable ML-KEM768.
Closes ticket 41041.
Nick Mathewson [Wed, 23 Apr 2025 12:46:17 +0000 (08:46 -0400)]
Correctly detect error from SSL_CTX_set1_groups_list.
Previously our code was checking for '< 0', but the error return value for
this function _is_ zero.
Nick Mathewson [Wed, 23 Apr 2025 12:38:05 +0000 (08:38 -0400)]
Remove TOR_TLS_USE_ECDHE_P* flags.
They have been unused since 0.3.1.1-alpha, when we removed the
TLSECGroups option.
Sebastian Hahn [Thu, 1 Feb 2024 18:45:04 +0000 (19:45 +0100)]
Make two 1-bit fields unsigned
This should be a completely harmless warning as we only check whether
the fields are true or false.
Closes #40911.
(Backported by nickm so that I can compile 0.4.8 without warnings.)
David Goulet [Mon, 31 Mar 2025 17:32:28 +0000 (13:32 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Waldemar Zimpel [Thu, 27 Mar 2025 22:15:05 +0000 (23:15 +0100)]
Fix: Crash on SIGSEGV if at least one worker thread cannot be launched
Perform a clean shutdown in case worker threads cannot be lauched.
David Goulet [Thu, 27 Mar 2025 19:56:13 +0000 (15:56 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Thu, 27 Mar 2025 19:56:02 +0000 (15:56 -0400)]
Merge branch 'tor-gitlab/mr/874' into maint-0.4.8
David Goulet [Thu, 27 Mar 2025 14:29:11 +0000 (14:29 +0000)]
Merge branch 'fix/memleaks-cpuworker' into 'maint-0.4.8'
Re: Coverity report Oct 31st, 2024 (Issue #40991)
See merge request tpo/core/tor!844
excurso [Thu, 27 Mar 2025 14:29:11 +0000 (14:29 +0000)]
Re: Coverity report Oct 31st, 2024 (Issue #40991)
David Goulet [Thu, 27 Mar 2025 12:49:40 +0000 (08:49 -0400)]
conflux: Avoid non fatal assert in CIRCUIT_IS_CONFLUX()
In the circuit_about_to_free(), we clear the circ->conflux object and then we
end up trying to emit an event on the control port which calls
CIRCUIT_IS_CONFLUX() and non fatal assert on the false branch.
Fixes #41037
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Wed, 26 Mar 2025 18:09:15 +0000 (14:09 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Nick Mathewson [Tue, 25 Mar 2025 19:13:31 +0000 (15:13 -0400)]
Require FlowCtrl=1 (authenticated sendmes) for clients
This will cause clients before 0.4.1.1-alpha to shut down.
Part of #40836.
Nick Mathewson [Tue, 25 Mar 2025 19:06:12 +0000 (15:06 -0400)]
protover: Vote for additional protocols to be required/recommended
Note that the changes here will require all relays
to be 0.4.7.4-alpha or later, which is lower than
our current lowest-supported relay version.
Part of #40836.
David Goulet [Tue, 25 Mar 2025 17:06:24 +0000 (13:06 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Roger Dingledine [Tue, 25 Mar 2025 15:22:24 +0000 (11:22 -0400)]
fix two comment typos from 0.4.8.15
David Goulet [Mon, 24 Mar 2025 16:52:37 +0000 (12:52 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Mon, 24 Mar 2025 15:25:59 +0000 (15:25 +0000)]
version: Bump version to 0.4.8.16-dev
David Goulet [Mon, 24 Mar 2025 15:23:12 +0000 (11:23 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Mon, 24 Mar 2025 15:11:11 +0000 (15:11 +0000)]
version: Bump version to 0.4.8.16
David Goulet [Mon, 24 Mar 2025 15:18:46 +0000 (11:18 -0400)]
release: ChangeLog and ReleaseNotes for 0.4.8.16
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 24 Mar 2025 15:16:19 +0000 (11:16 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Mon, 24 Mar 2025 15:09:47 +0000 (15:09 +0000)]
Update geoip files to match ipfire location db, 2025/03/24.
David Goulet [Mon, 24 Mar 2025 14:39:13 +0000 (10:39 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Mon, 24 Mar 2025 13:09:38 +0000 (09:09 -0400)]
dirauth: Fix typo in flag relay assignment token
Unfortunately, we wanted to be able to control the Guard flag here but the
token used mentionned "exit" instead.
Oh well, s*** happens :).
Fixes #41035
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 20 Mar 2025 15:22:27 +0000 (11:22 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Thu, 20 Mar 2025 15:06:00 +0000 (15:06 +0000)]
version: Bump version to 0.4.8.15-dev
David Goulet [Thu, 20 Mar 2025 14:55:23 +0000 (10:55 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Thu, 20 Mar 2025 14:43:55 +0000 (14:43 +0000)]
version: Bump version to 0.4.8.15
David Goulet [Thu, 20 Mar 2025 14:51:54 +0000 (10:51 -0400)]
release: ChangeLog and ReleaseNotes for 0.4.8.15
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Thu, 20 Mar 2025 14:47:34 +0000 (10:47 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Tor CI Release [Thu, 20 Mar 2025 14:40:50 +0000 (14:40 +0000)]
fallbackdir: Update list generated on March 20, 2025
Tor CI Release [Thu, 20 Mar 2025 14:39:57 +0000 (14:39 +0000)]
Update geoip files to match ipfire location db, 2025/03/20.
David Goulet [Thu, 20 Mar 2025 13:53:16 +0000 (09:53 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Mike Perry [Wed, 19 Mar 2025 00:05:43 +0000 (00:05 +0000)]
Bug 41023 changes file
David Goulet [Tue, 11 Mar 2025 16:00:22 +0000 (12:00 -0400)]
hs: Never pick a MiddleOnly node for HS circuit purposes
Related to #41023
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Tue, 11 Mar 2025 14:54:51 +0000 (10:54 -0400)]
hs: Remove HSv3 rendezvous circuit flag used for node selection
This was put in when HSv2 and v3 were co-existing. Now, the network requires
HSRend=2 which is v3 by default.
This is a simple cleanup of an internal flag used to identify a launch of a
RPv3 circuit.
Related to #41023
Signed-off-by: David Goulet <dgoulet@torproject.org>
Mike Perry [Thu, 13 Mar 2025 20:00:03 +0000 (20:00 +0000)]
Provide dirauth ability to strip specific flags.
David Goulet [Wed, 19 Mar 2025 18:41:52 +0000 (14:41 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Alexander Hansen Færøy [Tue, 18 Mar 2025 15:23:00 +0000 (16:23 +0100)]
CI: Add changes file related to 41029.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:47:53 +0000 (14:47 +0100)]
CI: Enable venv before running ci-driver.sh for Chutney.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:29:11 +0000 (14:29 +0100)]
CI: Install python3-venv.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:25:41 +0000 (14:25 +0100)]
CI: Use local pip instead of python3-pip.
Alexander Hansen Færøy [Tue, 18 Mar 2025 13:22:35 +0000 (14:22 +0100)]
CI: Disable redundant-decls warnings for NSS in crypto_nss_mgt.c.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:37:39 +0000 (13:37 +0100)]
CI: Install libclang-rt-dev when build with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:33:23 +0000 (13:33 +0100)]
CI: Install libubsan1 when building with hardening enabled.
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:26:50 +0000 (13:26 +0100)]
CI: Use bookworm instead of bullseye.
Jim Newsome [Wed, 30 Oct 2024 15:34:58 +0000 (10:34 -0500)]
CI: use a fixed version of chutney
While chutney currently runs tor's chutney test in its own CI,
it's difficult to guarantee the two won't accidentally diverge.
Probably best to use a fixed version here so that we can control
chutney version bumps and avoid surprise breakage in tor's CI.
This will also free us to intentionally make breaking changes in
chutney (though I don't have any immediate plans for any).
David Goulet [Tue, 18 Mar 2025 13:05:25 +0000 (09:05 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
Alexander Hansen Færøy [Tue, 18 Mar 2025 12:17:28 +0000 (13:17 +0100)]
CI: Remove physical tags from gitlab-ci runner requirements.
David Goulet [Tue, 11 Mar 2025 14:21:17 +0000 (10:21 -0400)]
Merge branch 'maint-0.4.8' into release-0.4.8
David Goulet [Tue, 11 Mar 2025 14:21:03 +0000 (10:21 -0400)]
scripts: Remove 0.4.7 from list tor branches
Not maintained anymore.
Signed-off-by: David Goulet <dgoulet@torproject.org>
David Goulet [Mon, 3 Mar 2025 18:18:32 +0000 (13:18 -0500)]
Merge branch 'maint-0.4.8' into release-0.4.8
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)]
fix sandbox for bandwidth authority
David Goulet [Mon, 3 Mar 2025 17:40:02 +0000 (12:40 -0500)]
Merge branch 'maint-0.4.8' into release-0.4.8
Mike Perry [Thu, 21 Nov 2024 17:09:39 +0000 (17:09 +0000)]
Ticket 40872: Changes file
Mike Perry [Thu, 21 Nov 2024 17:08:19 +0000 (17:08 +0000)]
Ticket 40872: Output conflux nonce and circ rtt to control port
Mike Perry [Thu, 21 Nov 2024 17:06:26 +0000 (17:06 +0000)]
Ticket 40872: Add conflux helper functions for control port info