aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-11-28changes: Add file for ticket 40674David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-28dns: Make TTLs fuzzy at exit relaysRasmus Dahlberg
This change mitigates DNS-based website oracles by making the time that a domain name is cached uncertain (+- 4 minutes of what's measurable). Resolves TROVE-2021-009. Fixes #40674
2022-11-28Clip DNS TTL values once in event callbackRasmus Dahlberg
This change ensures that other parts of the code base always operate on the same clipped TTL values, notably without being aware of clipping.
2022-11-09build: fix -Wstrict-prototypes (Clang 16)Sam James
Clang 16 warns on -Wstrict-prototypes in preparation for C23 which can among other things, lead to some configure tests silently failing/returning the wrong result. Fixes this error: ``` -ignoreme: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] +ignoreme: error: a function declaration without a prototype is deprecated in all versions of C [-Werror,-Wstrict-prototypes] main () ``` For more information, see LWN.net [0] or LLVM's Discourse [1], gentoo-dev@ [2], or the (new) c-std-porting mailing list [3]. [0] https://lwn.net/Articles/913505/ [1] https://discourse.llvm.org/t/configure-script-breakage-with-the-new-werror-implicit-function-declaration/65213 [2] https://archives.gentoo.org/gentoo-dev/message/dd9f2d3082b8b6f8dfbccb0639e6e240 [3] hosted at lists.linux.dev. Bug: https://bugs.gentoo.org/879747 Signed-off-by: Sam James <sam@gentoo.org> ---
2022-10-26Merge branch 'tor-gitlab/mr/631' into maint-0.4.5David Goulet
2022-10-26dirauth: Remove FaravaharDavid Goulet
Closes #40688 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-18dirauth: Change dizum IP addressDavid Goulet
Closes #40687 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-13Fix a completely wrong calculation in mach monotime_init_internal()Nick Mathewson
Bug 1: We were purporting to calculate milliseconds per tick, when we *should* have been computing ticks per millisecond. Bug 2: Instead of computing either one of those, we were _actually_ computing femtoseconds per tick. These two bugs covered for one another on x86 hardware, where 1 tick == 1 nanosecond. But on M1 OSX, 1 tick is about 41 nanoseconds, causing surprising results. Fixes bug 40684; bugfix on 0.3.3.1-alpha.
2022-08-12version: Bump version to 0.4.5.14-devTor CI Release
2022-08-12version: Bump version to 0.4.5.14tor-0.4.5.14Tor CI Release
2022-08-12geoip: Update geoip files with August 9th, 2022 databaseDavid Goulet
Fixes #40658 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-11version: Bump version to 0.4.5.13-devTor CI Release
2022-08-11version: Bump version to 0.4.5.13Tor CI Release
2022-08-11fallbackdir: Update list generated on August 11, 2022Tor CI Release
2022-08-11Update geoip files to match ipfire location db, 2022/08/11.Tor CI Release
2022-08-10fallbackdirs: Update list from maint-0.4.7David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-10geoip: Update files from maint-0.4.7David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-02Merge branch 'tor-gitlab/mr/608' into maint-0.4.5David Goulet
2022-08-02relay: Don't send DESTROY remote reason backward or forwardDavid Goulet
Fixes #40649 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-01conn: Notify btrack subsys on normal OR conn closeDavid Goulet
Fixes #40604 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-27Merge branch 'tor-gitlab/mr/605' into maint-0.4.5David Goulet
2022-07-27Fix a check, make a netflow padding function more safe.Nick Mathewson
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would crash with an assertion failure if `low_timeout` was greater than `high_timeout`. That wasn't possible in practice because of checks in `channelpadding_update_padding_for_channel`, but it's better not to have a function whose correctness is this tricky to prove. Fixes #40645. Bugfix on 0.3.1.1-alpha.
2022-07-27relay: Use remote reason when sending back a DESTROYDavid Goulet
Fix from previous commit where a DESTROY cell is sent instead of a TRUNCATED. Related to #40623 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-26relay: Send DESTROY cell instead of TRUNCATED cellDavid Goulet
Note that with this commit, TRUNCATED cells won't be used anymore that is client and relays won't emit them. Fixes #40623 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-09Add changes entry to tor!575.Alexander Færøy
See: tpo/core/tor#40601.
2022-05-09sandbox: Permit rseq syscall as wellpmu-ipf
This was found to be necessary in conjunction with glibc 2.35 on Linux. Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-14Merge branch 'tor-gitlab/mr/491' into maint-0.4.5David Goulet
2022-04-14Merge branch 'tor-gitlab/mr/497' into maint-0.4.5David Goulet
2022-03-28Merge branch 'tor-gitlab/mr/556' into maint-0.4.5David Goulet
2022-03-27Sandbox: Permit the clone3 system callNick Mathewson
Apparently glibc-2.34 uses clone3, when previously it just used clone. Closes ticket #40590.
2022-03-16Merge branch 'tor-gitlab/mr/533' into maint-0.4.5David Goulet
2022-03-10hs: Schedule mainloop event on dirinfo changeDavid Goulet
Due to a possible Guard subsystem recursion, when the HS client gets notified that the directory information has changed, it must run it in a seperate mainloop event to avoid such issue. See the ticket for more information on the recursion. This also fixes a fatal assert. Fixes #40579 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-08hs: Fix multiple port label on single metricDavid Goulet
Prometheus needs unique labels and so this bug was causing an onion service with multiple ports to have multiple "port=" label for the metrics requiring a port label. Fixes #40581 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-15Add CI triggers for Debian package buildsJérôme Charaoui
This enables on-demand debian packaging CI builds on maintenance branches, to replace (often unnecessary) daily scheduled builds.
2022-02-04version: Bump version to 0.4.5.12-devTor CI Release
2022-02-04version: Bump version to 0.4.5.12Tor CI Release
2022-02-04fallbackdir: Update list generated on February 04, 2022Tor CI Release
2022-02-04Update geoip files to match ipfire location db, 2022/02/04.Tor CI Release
2022-02-04Update geoip files to match ipfire location db, 2021/12/15.Tor CI Release
2022-02-04fallbackdir: Update list generated on December 15, 2021Tor CI Release
2022-02-03hs: Double quote the metrics label valueDavid Goulet
Fixes #40552 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-24version: Bump version to 0.3.5.18maint-0.3.5David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24fallbackdir: Update list generated on January 24, 2022David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24geoip: Update to match ipfire location db, 2022/01/24.David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-19test: Remove HSv2 protover specific testDavid Goulet
HSv2 is not advertised as a supported protocol version anymore. This was introduced with the merge-forward of commit 72041c63064b461e which didn't fix the unit test. Fixes #40549 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-18Merge branch 'tor-gitlab/mr/511' into maint-0.3.5David Goulet
2022-01-18Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-18Merge branch 'tor-gitlab/mr/510' into maint-0.3.5David Goulet