aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-01-24version: Bump version to 0.3.5.18maint-0.3.5David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24fallbackdir: Update list generated on January 24, 2022David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24geoip: Update to match ipfire location db, 2022/01/24.David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18Merge branch 'tor-gitlab/mr/511' into maint-0.3.5David Goulet
2022-01-18Merge branch 'tor-gitlab/mr/510' into maint-0.3.5David Goulet
2022-01-18Update new relay blogpost URLJérôme Charaoui
This removes the '/blog/' URL component which relies on a redirection since the blog has been migrated to Lektor
2022-01-18main: Update a dead URL in a log noticeDavid Goulet
Change https://www.torproject.org/download/download#warning to https://support.torproject.org/faq/staying-anonymous/ Closes #40544 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18relay: Don't advertise HSv2 protocol versionDavid Goulet
We removed HSIntro=3 and HSDir=1 that are v2 specific. Since 0.3.5.17, we do not support introducing or being a directory for onion service v2. Closes #40509 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-08Merge remote-tracking branch 'tor-gitlab/mr/487' into maint-0.3.5Alexander Færøy
2021-11-08Merge remote-tracking branch 'tor-gitlab/mr/486' into maint-0.3.5Alexander Færøy
2021-11-06Give an error message if LibreSSL's TLSv1.3 APIs aren't what we needNick Mathewson
From LibreSSL versions 3.2.1 through 3.4.0, our configure script would conclude that TLSv1.3 as supported, but it actually wasn't. This led to annoying breakage like #40128 and #40445. Now we give an error message if we try to build with one of those versions. Closes #40511.
2021-11-05Reverse the direction of the test for openssl 3.0.0Nick Mathewson
Previously the logic was reversed, and always gave the wrong answer. This has no other effect than to change whether we suppress deprecated API warnings. Fixes #40429; bugfix on 0.3.5.13.
2021-11-05Light edit to protover warnings.Nick Mathewson
2021-11-05protover: Add a note on why LinkAuth is not recommended or requiredDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-05protover: Move all hardcoded lists in one placeDavid Goulet
This also moves the warnings and add some theatrical effect around the code so anyone modifying those list should notice the warnings signs and read the comment accordingly. Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-05Add scary warnings about changing the protover list.Nick Mathewson
Doing this in the wrong way has potential to cause serious havoc on the network, so let's make it harder for future programmers to mess it up.
2021-11-05Merge remote-tracking branch 'ahf/ahf/ci-i386' into maint-0.3.5Alexander Færøy
2021-11-03shellcheck: Make it happy on couple scriptsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-03Add i386 version of debian-minimal for 32-bit Gitlab CI builds.Alexander Færøy
See: tpo/core/tor#40505
2021-10-29Fix Windows build.Alexander Færøy
While trying to resolve our CI issues, the Windows build broke with an unused function error: src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’ defined but not used [-Werror=unused-function] We solve this by moving the `#if !defined(_WIN32)` test above the `unprivileged_port_range_start()` function defintion such that it is included in its body. This is an unreviewed commit. See: tor#40275
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-28makefile: Add a reproducible dist make jobDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-28release: Patches to make tarball reproducibleAlexander Færøy
Closes #26299 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-28version: Missing version update in couple filesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-26ci: Missing source dir when parsing configure.ac versionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-26version: Bump to 0.3.5.17-devDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-26version: Bump to 0.3.5.17David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-21fallbackdir: Regenerate the list for October 2021David Goulet
Closes #40493 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-20Announce URL to bridge status page when starting Tor as a bridge relay.Alexander Færøy
This patch makes Tor announce the relay specific bridge status page URL when Tor is starting up before bootstrap occours. See: tor#30477
2021-10-20Remove unused function: dns_randfn_() in dns.c.Alexander Færøy
This patch unbreaks the current build after tor!369 landed. See: https://bugs.torproject.org/tpo/core/tor/40371
2021-10-20Merge remote-tracking branch 'tor-gitlab/mr/369' into maint-0.3.5Alexander Færøy
2021-10-19hs: Improve warning for bad service versionDavid Goulet
Now that we don't have version 2, it gives us: [warn] HiddenServiceVersion must be between 3 and 3, not 2. This commit changes it to: [warn] HiddenServiceVersion must be 3, not 2. Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-19changes: Add file for ticket 40476David Goulet
Closes #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-19test: Don't run HSv2 Chutney test networksDavid Goulet
Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-19test: Fix unit tests after disabling version 2David Goulet
Some tests were removed because they were testing something not usable anymore. Some tests remains to make sure that things are indeed disabled. Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-30hs-v2: Disable version 2 HSPOST and HSFETCH commandDavid Goulet
Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-30hs-v2: Disable version 2 directoryDavid Goulet
Relay do not accept both stores and lookups of version 2 descriptor. This effectively disable version 2 HSDir supports for relays. Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-30hs-v2: Disable version 2 introduction pointDavid Goulet
Upon receiving a v2 introduction request, the relay will close the circuit and send back a tor protocol error. Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-30hs-v2: Disable version 2 serviceDavid Goulet
The minimum service version is raised from 2 to 3 which effectively disable loading or creating an onion service v2. As for ADD_ONION, for version 2, a 551 error is returned: "551 Failed to add Onion Service" Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-30hs-v2: Disable SOCKS connection for v2 addressesDavid Goulet
This effectively turns off the ability of tor to use HSv2 as a client by invalidating the v2 onion hostname passed through a SOCKS request. Part of #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-09-13Only check for bindable ports if we are unsure if it will fail.Alexander Færøy
We currently assume that the only way for Tor to listen on ports in the privileged port range (1 to 1023), on Linux, is if we are granted the NET_BIND_SERVICE capability. Today on Linux, it's possible to specify the beginning of the unprivileged port range using a sysctl configuration option. Docker (and thus the CI service Tor uses) recently changed this sysctl value to 0, which causes our tests to fail as they assume that we should NOT be able to bind to a privileged port *without* the NET_BIND_SERVICE capability. In this patch, we read the value of the sysctl value via the /proc/sys/ filesystem iff it's present, otherwise we assume the default unprivileged port range begins at port 1024. See: tor#40275
2021-09-13Use Debian bullseye for our hardened build.Alexander Færøy
2021-09-13Force amd64 for CI builds.Alexander Færøy
2021-08-16Bump version to -devDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-08-16Use debian:buster instead of debian:stable for now.Alexander Færøy
2021-08-16Make the version 0.3.6.16, not 0.3.6.16-dev.Nick Mathewson
2021-08-13Update version to 0.3.5.16David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-08-12Update GeoIP files to match IPFire location DB as per 2021/08/12.Alexander Færøy
2021-08-11Merge remote-tracking branch 'tor-gitlab/mr/417' into maint-0.3.5Alexander Færøy
2021-08-11Disable ed25519-donna's batch verification.George Kadianakis
Fixes bug 40078. As reported by hdevalence our batch verification logic can cause an assert crash. The assert happens because when the batch verification of ed25519-donna fails, the code in `ed25519_checksig_batch()` falls back to doing a single verification for each signature. The crash occurs because batch verification failed, but then all signatures individually verified just fine. That's because batch verification and single verification use a different equation which means that there are sigs that can pass single verification but fail batch verification. Fixing this would require modding ed25519-donna which is not in scope for this ticket, and will be soon deprecated in favor of arti and ed25519-dalek, so my branch instead removes batch verification.