Age | Commit message (Collapse) | Author | |
---|---|---|---|
2023-01-12 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-12 | version: Bump version to 0.4.5.16 | Tor CI Release | |
2023-01-12 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-12 | fallbackdir: Update list generated on January 12, 2023 | Tor CI Release | |
2023-01-12 | Update geoip files to match ipfire location db, 2023/01/12. | Tor CI Release | |
2023-01-12 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-12 | Merge branch 'ticket40730_045_01' into maint-0.4.5 | David Goulet | |
2023-01-12 | dirauth: Reject 0.4.6.x series at the authority level | David Goulet | |
Closes #40664 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-01-11 | Coverity CID 1518991: Tighter bounds on consensus param value. | Mike Perry | |
This prevents sign extension overflow in cwnd_became_full(). | |||
2023-01-11 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-11 | Merge branch 'tor-gitlab/mr/538' into maint-0.4.5 | David Goulet | |
2023-01-10 | Do not reset our RTT in slow start. | Mike Perry | |
If a circuit only sends a tiny amount of data such that its cwnd is not full, it won't increase its cwnd above the minimum. Since slow start circuits should never hit the minimum otherwise, we can just ignore them for RTT reset to handle this. | |||
2023-01-10 | cc: Rename function to avoid confusion | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-01-10 | Changes file for bug 40732 | Mike Perry | |
2023-01-10 | Safety fixes to RFC3742 | Mike Perry | |
2023-01-10 | Reduce size of congestion control next_*_event fields. | Mike Perry | |
Since these are derived from the number of SENDMEs in a cwnd/cc update, and a cwnd should not exceed ~10k, there's plenty of room in uint16_t for them, even if the network gets significantly faster. | |||
2023-01-10 | Clean up next_cc_event handling. | Mike Perry | |
2023-01-10 | Avoid increasing the congestion window if it is not full. | Mike Perry | |
Also provides some stickiness, so that once full, the congestion window is considered still full for the rest of an update cycle, or the entire congestion window. In this way, we avoid increasing the congestion window if it is not fully utilized, but we can still back off in this case. This substantially reduces queue use in Shadow. | |||
2023-01-10 | Merge branch 'tor-gitlab/mr/675' into maint-0.4.7 | David Goulet | |
2023-01-10 | shellcheck: Fix new warnings | David Goulet | |
Nothing important, mostly false positive except one case. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-01-10 | sandbox: Allow my-consensus-* files for an authority | David Goulet | |
Fixes #40729 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-20 | Enable IP_BIND_ADDRESS_NO_PORT if supported | Alex Xu (Hello71) | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-12 | Merge branch 'tor-gitlab/mr/667' into maint-0.4.7 | David Goulet | |
2022-12-12 | socks: Make SafeSocks refuse SOCKS4 and accept SOCKS4a | David Goulet | |
The logic was inverted. Introduced in commit 9155e08450fe7a609f8223202e8aa7dfbca20a6d. This was reported through our bug bounty program on H1. It fixes the TROVE-2022-002. Fixes #40730 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-11 | Add issue40613 | qontinuum | |
2022-12-11 | Replace socket_failed_from_resource_exhaustion() by ↵ | qontinuum | |
socket_failed_from_fd_exhaustion() | |||
2022-12-11 | Isolate warn_about_resource_exhaution() | qontinuum | |
2022-12-07 | metrics: Fix typo in a label | David Goulet | |
Fixes #40727 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-06 | version: Bump version to 0.4.7.12-dev | Tor CI Release | |
2022-12-06 | version: Bump version to 0.4.5.15-dev | Tor CI Release | |
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-06 | version: Bump version to 0.4.7.12 | Tor CI Release | |
2022-12-06 | version: Bump version to 0.4.5.15 | Tor CI Release | |
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-06 | fallbackdir: Update list generated on December 06, 2022 | Tor CI Release | |
2022-12-06 | Update geoip files to match ipfire location db, 2022/12/06. | Tor CI Release | |
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-06 | fallbackdir: Update files from latest 047 release | David Goulet | |
We need the fallbackdir file to be the same so our release CI can generate a new list and apply it uniformly on all series. (Same as geoip) Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-06 | geoip: Update files from latest 047 release | David Goulet | |
We need all geoip files to be the same so our release CI can generate a new list and apply it uniformly on all series. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-02 | Ticket 40724: Add metrics for CC circuit counts | Mike Perry | |
2022-12-01 | Ticket 40724: Changes file | Mike Perry | |
2022-12-01 | Ticket 40724: Additional congestion control metrics | Mike Perry | |
2022-11-29 | dirauth: rotate moria1 keys and ports | Roger Dingledine | |
Rotate the relay identity key and v3 identity key for moria1. They have been online for more than a decade, there was a known potential compromise, and anyway refreshing keys periodically is good practice. Advertise new ports too, to avoid confusion. Closes ticket 40722. | |||
2022-11-28 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-11-28 | changes: Add file for ticket 40674 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-28 | dns: Make TTLs fuzzy at exit relays | Rasmus Dahlberg | |
This change mitigates DNS-based website oracles by making the time that a domain name is cached uncertain (+- 4 minutes of what's measurable). Resolves TROVE-2021-009. Fixes #40674 | |||
2022-11-28 | Clip DNS TTL values once in event callback | Rasmus Dahlberg | |
This change ensures that other parts of the code base always operate on the same clipped TTL values, notably without being aware of clipping. |