Age | Commit message (Collapse) | Author | |
---|---|---|---|
2017-11-08 | small edits to changelog | Nick Mathewson | |
2017-11-08 | start on 0.3.2.4-alpha changelog | Nick Mathewson | |
2017-11-08 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-08 | Merge branch 'bug23816_029_squashed' into maint-0.3.2 | Nick Mathewson | |
2017-11-08 | Replace our random-exponential-delay algorithm. | Nick Mathewson | |
This patch has implementations of the "decorrelated" and "full" algorithms from https://www.awsarchitectureblog.com/2015/03/backoff.html | |||
2017-11-07 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-07 | Revert "Remove an erroneous 0.5 in compute_weighted_bandwidths()" | Nick Mathewson | |
This reverts commit 01e984870a7e1db2722e85fe43af7bcb4755c2d4. | |||
2017-11-07 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-07 | Merge remote-tracking branch 'dgoulet/bug24161_032_01' into maint-0.3.2 | Nick Mathewson | |
2017-11-07 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-07 | Bump to 0.3.2.4-alpha | Nick Mathewson | |
2017-11-07 | Add a safe guard to avoid using a zeroed voting schedule | David Goulet | |
dirvote_get_next_valid_after_time() is the only public function that uses the voting schedule outside of the dirvote subsystem so if it is zeroed, recalculate its timing if we can that is if a consensus exists. Part of #24161 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-11-07 | Recalculate voting schedule first when getting a new consensus | David Goulet | |
Because the HS and SR subsystems can use the voting schedule early (with the changes in #23623 making the SR subsystem using the static voting schedule object), we need to recalculate the schedule very early when setting the new consensus. Fixes #24161 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-11-07 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-07 | Merge remote-tracking branch 'asn/ticket23623_032_01' into maint-0.3.2 | Nick Mathewson | |
2017-11-07 | Add changes file for #23623. | George Kadianakis | |
2017-11-06 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-06 | Merge branch 'bug24150_032_squashed' into maint-0.3.2 | Nick Mathewson | |
2017-11-06 | Fix a memory leak on decryption non-failure of v3 hsdesc | Nick Mathewson | |
If it decrypts something that turns out to start with a NUL byte, then decrypt_desc_layer() will return 0 to indicate the length of its result. But 0 also indicates an error, which causes the result not to be freed by decrypt_desc_layer()'s callers. Since we're trying to stabilize 0.3.2.x, I've opted for the simpler possible fix here and made it so that an empty decrypted string will also count as an error. Fixes bug 24150 and OSS-Fuzz issue 3994. The original bug was present but unreachable in 0.3.1.1-alpha. I'm calling this a bugfix on 0.3.2.1-alpha since that's the first version where you could actually try to decrypt these descriptors. | |||
2017-11-06 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-06 | Fix a 32-bit formatting warning | Nick Mathewson | |
2017-11-06 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-06 | Merge remote-tracking branch 'public/bug23318_029' into maint-0.3.2 | Nick Mathewson | |
2017-11-05 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-05 | lintchanges: Allow 'fixes bugs a, b, and c' | Nick Mathewson | |
2017-11-05 | Merge branch 'bug21394_029' into maint-0.3.2 | Nick Mathewson | |
2017-11-05 | Fix DNS resolution on busy exit relays | Sebastian Hahn | |
Thanks to Dhalgren who analyzed this issue two years ago and found a solution! | |||
2017-11-05 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-05 | ticket21031 changes file revised. | Nick Mathewson | |
2017-11-04 | ClientDNSRejectInternalAddresses in non-default networks | Sebastian Hahn | |
Once again allow the flag to be set, unless the default network is used. Thanks to nickm for a suggestion for the workaround to a test failure. | |||
2017-11-04 | Undo deprecation of ClientDNSRejectInternalAddresses | Sebastian Hahn | |
2017-11-04 | Revert "Make ClientDNSRejectInternalAddresses testing-only." | Sebastian Hahn | |
This reverts commit 27fa4a98d23972213122fa99499efa4baebe49e3. | |||
2017-11-02 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-02 | nodelist: Downgrade warning to protocol warning | David Goulet | |
The node_get_ed25519_id() warning can actually be triggered by a relay flagged with NoEdConsensus so instead of triggering a warning on all relays of the network, downgrade it to protocol warning. Fixes #24025 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-11-02 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-02 | Merge branch 'dgoulet_ticket23753_032_02_squashed' into maint-0.3.2 | Nick Mathewson | |
2017-11-02 | sched: Rate limit scheduler_bug_occurred() | David Goulet | |
Just in case we end up hitting a SCHED_BUG() multiple times, rate limit the log warning. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-11-02 | sched: Add another SCHED_BUG() callsite | Matt Traudt | |
2017-11-02 | sched: Use SCHED_BUG() macro in scheduler | David Goulet | |
When a BUG() occurs, this macro will print extra information about the state of the scheduler and the given channel if any. This will help us greatly to fix future bugs in the scheduler especially when they occur rarely. Fixes #23753 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-11-02 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-02 | Test that IPv6-only clients can use microdescriptors | teor | |
When running "make test-network-all", test that IPv6-only clients can use microdescriptors. IPv6-only microdescriptor client support was fixed in tor 0.3.0.1-alpha. Requires chutney master 61c28b9 or later. Closes ticket 24109. | |||
2017-11-02 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |
2017-11-02 | Tweak a comment for a minor but important distinction | Nick Mathewson | |
2017-11-02 | Merge branch 'ticket23820_032_01_squashed' into maint-0.3.2 | Nick Mathewson | |
2017-11-02 | Changes file for 23820 | teor | |
2017-11-02 | Don't run IPv6-only v3 single onion service tests using chutney | teor | |
Part of #23820. | |||
2017-11-02 | Stop users configuring IPv6-only v3 single onion services | teor | |
They are not yet implemented: they will upload descriptors, but won't be able to rendezvous, because IPv6 addresses in link specifiers are ignored. Part of #23820. | |||
2017-11-02 | Improve v3 onion service logging for intro and rend points | teor | |
Diagnostics for #23820. | |||
2017-11-02 | Remove buggy IPv6 and ed25519 handling from get_lspecs_from_extend_info() | teor | |
The previous version of this function had the following issues: * it didn't check if the extend_info contained an IPv6 address, * it didn't check if the ed25519 identity key was valid. But we can't add IPv6 support in a bugfix release. Instead, BUG() if the address is an IPv6 address, so we always put IPv4 addresses in link specifiers. And ignore missing ed25519 identifiers, rather than generating an all-zero link specifier. This supports v3 hidden services on IPv4, dual-stack, and IPv6, and v3 single onion services on IPv4 only. Part of 23820, bugfix on 0.3.2.1-alpha. | |||
2017-11-01 | Merge branch 'maint-0.3.2' into release-0.3.2 | Nick Mathewson | |