aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-03-01connection_or_set_identity_digest: more defensive programmingNick Mathewson
We expect ed_id == NULL here to indicate "no ed id", but other parts of Tor sometimes use an all-0 ed_id. Here we detect that input and replace it with what's expected.
2022-03-01Fix logic for whether a channel's Ed25519 ID is changingNick Mathewson
The previous code would notice if we were changing from one identity to another, but not if we were changing from no identity to having an identity. This problem caused a bug (spotted by cypherpunks in ticket #40563) where if we created a channel for a circuit request that doesn't include an Ed25519 identity, we won't be able to use that channel later for requests that _do_ list Ed25519. Fix for 40563; bugfix on 0.3.0.1-alpha.
2022-03-01connection_or_set_identity_digest(): Make errors nonfatal.Nick Mathewson
Previously we were using tor_assert() to enforce the documented invariant here; this commit changes it to use BUG() instead. It will protect us from crashes if the next commit (on #40563) turns out to expose a bug somewhere.
2022-02-15Add CI triggers for Debian package buildsJérôme Charaoui
This enables on-demand debian packaging CI builds on maintenance branches, to replace (often unnecessary) daily scheduled builds.
2022-02-04version: Bump version to 0.4.5.12-devTor CI Release
2022-02-04version: Bump version to 0.4.5.12Tor CI Release
2022-02-04fallbackdir: Update list generated on February 04, 2022Tor CI Release
2022-02-04Update geoip files to match ipfire location db, 2022/02/04.Tor CI Release
2022-02-04Update geoip files to match ipfire location db, 2021/12/15.Tor CI Release
2022-02-04fallbackdir: Update list generated on December 15, 2021Tor CI Release
2022-02-03hs: Double quote the metrics label valueDavid Goulet
Fixes #40552 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-24version: Bump version to 0.3.5.18maint-0.3.5David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24fallbackdir: Update list generated on January 24, 2022David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24geoip: Update to match ipfire location db, 2022/01/24.David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-19test: Remove HSv2 protover specific testDavid Goulet
HSv2 is not advertised as a supported protocol version anymore. This was introduced with the merge-forward of commit 72041c63064b461e which didn't fix the unit test. Fixes #40549 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-18Merge branch 'tor-gitlab/mr/511' into maint-0.3.5David Goulet
2022-01-18Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-18Merge branch 'tor-gitlab/mr/510' into maint-0.3.5David Goulet
2022-01-18Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-18Update new relay blogpost URLJérôme Charaoui
This removes the '/blog/' URL component which relies on a redirection since the blog has been migrated to Lektor
2022-01-18main: Update a dead URL in a log noticeDavid Goulet
Change https://www.torproject.org/download/download#warning to https://support.torproject.org/faq/staying-anonymous/ Closes #40544 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18relay: Don't advertise HSv2 protocol versionDavid Goulet
We removed HSIntro=3 and HSDir=1 that are v2 specific. Since 0.3.5.17, we do not support introducing or being a directory for onion service v2. Closes #40509 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-12-06Limit the number of elements in a consdiff hash line.Nick Mathewson
This avoids performing and then freeing a lot of small mallocs() if the hash line has too many elements. Fixes one case of bug 40472; resolves OSS-Fuzz 38363. Bugfix on 0.3.1.1-alpha when the consdiff parsing code was introduced.
2021-11-15Do not count controller-selected paths towards path bias.Nick Mathewson
As a side effect, this fixes a "Bug" warning. Closes #40515. Bugfix on 0.2.4.10-alpha.
2021-11-08Merge branch 'maint-0.3.5' into maint-0.4.5Alexander Færøy
2021-11-08Merge remote-tracking branch 'tor-gitlab/mr/487' into maint-0.3.5Alexander Færøy
2021-11-08Merge remote-tracking branch 'tor-gitlab/mr/486' into maint-0.3.5Alexander Færøy
2021-11-06Give an error message if LibreSSL's TLSv1.3 APIs aren't what we needNick Mathewson
From LibreSSL versions 3.2.1 through 3.4.0, our configure script would conclude that TLSv1.3 as supported, but it actually wasn't. This led to annoying breakage like #40128 and #40445. Now we give an error message if we try to build with one of those versions. Closes #40511.
2021-11-05Reverse the direction of the test for openssl 3.0.0Nick Mathewson
Previously the logic was reversed, and always gave the wrong answer. This has no other effect than to change whether we suppress deprecated API warnings. Fixes #40429; bugfix on 0.3.5.13.
2021-11-05protover: Fix merge forward from 035David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-05Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2021-11-05Light edit to protover warnings.Nick Mathewson
2021-11-05protover: Add a note on why LinkAuth is not recommended or requiredDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-05protover: Move all hardcoded lists in one placeDavid Goulet
This also moves the warnings and add some theatrical effect around the code so anyone modifying those list should notice the warnings signs and read the comment accordingly. Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-05Add scary warnings about changing the protover list.Nick Mathewson
Doing this in the wrong way has potential to cause serious havoc on the network, so let's make it harder for future programmers to mess it up.
2021-11-05Merge branch 'maint-0.3.5' into maint-0.4.5Alexander Færøy
2021-11-05Merge remote-tracking branch 'ahf/ahf/ci-i386' into maint-0.3.5Alexander Færøy
2021-11-03Merge branch 'tor-gitlab/mr/477' into maint-0.4.5David Goulet
2021-11-03relay: Don't allow DirPort on non-IPv4David Goulet
Our code doesn't allow it and so this prevents an assert() crash if the DirPort is for instance IPv6 only. Fixes #40494 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-03Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2021-11-03shellcheck: Make it happy on couple scriptsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-03Add i386 version of debian-minimal for 32-bit Gitlab CI builds.Alexander Færøy
See: tpo/core/tor#40505
2021-10-29Merge branch 'maint-0.3.5' into maint-0.4.5Alexander Færøy
2021-10-29Fix Windows build.Alexander Færøy
While trying to resolve our CI issues, the Windows build broke with an unused function error: src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’ defined but not used [-Werror=unused-function] We solve this by moving the `#if !defined(_WIN32)` test above the `unprivileged_port_range_start()` function defintion such that it is included in its body. This is an unreviewed commit. See: tor#40275
2021-10-29Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-28makefile: Add a reproducible dist make jobDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>