Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-08-11 | version: Bump version to 0.4.5.13-dev | Tor CI Release | |
2022-08-11 | version: Bump version to 0.4.5.13 | Tor CI Release | |
2022-08-11 | fallbackdir: Update list generated on August 11, 2022 | Tor CI Release | |
2022-08-11 | Update geoip files to match ipfire location db, 2022/08/11. | Tor CI Release | |
2022-08-10 | fallbackdirs: Update list from maint-0.4.7 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-10 | geoip: Update files from maint-0.4.7 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-02 | Merge branch 'tor-gitlab/mr/608' into maint-0.4.5 | David Goulet | |
2022-08-02 | relay: Don't send DESTROY remote reason backward or forward | David Goulet | |
Fixes #40649 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-01 | conn: Notify btrack subsys on normal OR conn close | David Goulet | |
Fixes #40604 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-07-27 | Merge branch 'tor-gitlab/mr/605' into maint-0.4.5 | David Goulet | |
2022-07-27 | Fix a check, make a netflow padding function more safe. | Nick Mathewson | |
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would crash with an assertion failure if `low_timeout` was greater than `high_timeout`. That wasn't possible in practice because of checks in `channelpadding_update_padding_for_channel`, but it's better not to have a function whose correctness is this tricky to prove. Fixes #40645. Bugfix on 0.3.1.1-alpha. | |||
2022-07-27 | relay: Use remote reason when sending back a DESTROY | David Goulet | |
Fix from previous commit where a DESTROY cell is sent instead of a TRUNCATED. Related to #40623 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-07-26 | relay: Send DESTROY cell instead of TRUNCATED cell | David Goulet | |
Note that with this commit, TRUNCATED cells won't be used anymore that is client and relays won't emit them. Fixes #40623 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-05-09 | Add changes entry to tor!575. | Alexander Færøy | |
See: tpo/core/tor#40601. | |||
2022-05-09 | sandbox: Permit rseq syscall as well | pmu-ipf | |
This was found to be necessary in conjunction with glibc 2.35 on Linux. Signed-off-by: Peter Müller <peter.mueller@ipfire.org> | |||
2022-04-14 | Merge branch 'tor-gitlab/mr/491' into maint-0.4.5 | David Goulet | |
2022-04-14 | Merge branch 'tor-gitlab/mr/497' into maint-0.4.5 | David Goulet | |
2022-03-28 | Merge branch 'tor-gitlab/mr/556' into maint-0.4.5 | David Goulet | |
2022-03-27 | Sandbox: Permit the clone3 system call | Nick Mathewson | |
Apparently glibc-2.34 uses clone3, when previously it just used clone. Closes ticket #40590. | |||
2022-03-16 | Merge branch 'tor-gitlab/mr/533' into maint-0.4.5 | David Goulet | |
2022-03-10 | hs: Schedule mainloop event on dirinfo change | David Goulet | |
Due to a possible Guard subsystem recursion, when the HS client gets notified that the directory information has changed, it must run it in a seperate mainloop event to avoid such issue. See the ticket for more information on the recursion. This also fixes a fatal assert. Fixes #40579 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-03-08 | hs: Fix multiple port label on single metric | David Goulet | |
Prometheus needs unique labels and so this bug was causing an onion service with multiple ports to have multiple "port=" label for the metrics requiring a port label. Fixes #40581 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-15 | Add CI triggers for Debian package builds | Jérôme Charaoui | |
This enables on-demand debian packaging CI builds on maintenance branches, to replace (often unnecessary) daily scheduled builds. | |||
2022-02-04 | version: Bump version to 0.4.5.12-dev | Tor CI Release | |
2022-02-04 | version: Bump version to 0.4.5.12 | Tor CI Release | |
2022-02-04 | fallbackdir: Update list generated on February 04, 2022 | Tor CI Release | |
2022-02-04 | Update geoip files to match ipfire location db, 2022/02/04. | Tor CI Release | |
2022-02-04 | Update geoip files to match ipfire location db, 2021/12/15. | Tor CI Release | |
2022-02-04 | fallbackdir: Update list generated on December 15, 2021 | Tor CI Release | |
2022-02-03 | hs: Double quote the metrics label value | David Goulet | |
Fixes #40552 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-01-24 | Merge branch 'maint-0.3.5' into maint-0.4.5 | David Goulet | |
2022-01-24 | version: Bump version to 0.3.5.18maint-0.3.5 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-01-24 | fallbackdir: Update list generated on January 24, 2022 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-01-24 | geoip: Update to match ipfire location db, 2022/01/24. | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-01-19 | test: Remove HSv2 protover specific test | David Goulet | |
HSv2 is not advertised as a supported protocol version anymore. This was introduced with the merge-forward of commit 72041c63064b461e which didn't fix the unit test. Fixes #40549 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-01-18 | Merge branch 'maint-0.3.5' into maint-0.4.5 | David Goulet | |
2022-01-18 | Merge branch 'tor-gitlab/mr/511' into maint-0.3.5 | David Goulet | |
2022-01-18 | Merge branch 'maint-0.3.5' into maint-0.4.5 | David Goulet | |
2022-01-18 | Merge branch 'tor-gitlab/mr/510' into maint-0.3.5 | David Goulet | |
2022-01-18 | Merge branch 'maint-0.3.5' into maint-0.4.5 | David Goulet | |
2022-01-18 | Update new relay blogpost URL | Jérôme Charaoui | |
This removes the '/blog/' URL component which relies on a redirection since the blog has been migrated to Lektor | |||
2022-01-18 | main: Update a dead URL in a log notice | David Goulet | |
Change https://www.torproject.org/download/download#warning to https://support.torproject.org/faq/staying-anonymous/ Closes #40544 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-01-18 | relay: Don't advertise HSv2 protocol version | David Goulet | |
We removed HSIntro=3 and HSDir=1 that are v2 specific. Since 0.3.5.17, we do not support introducing or being a directory for onion service v2. Closes #40509 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-12-06 | Limit the number of elements in a consdiff hash line. | Nick Mathewson | |
This avoids performing and then freeing a lot of small mallocs() if the hash line has too many elements. Fixes one case of bug 40472; resolves OSS-Fuzz 38363. Bugfix on 0.3.1.1-alpha when the consdiff parsing code was introduced. | |||
2021-11-15 | Do not count controller-selected paths towards path bias. | Nick Mathewson | |
As a side effect, this fixes a "Bug" warning. Closes #40515. Bugfix on 0.2.4.10-alpha. | |||
2021-11-08 | Merge branch 'maint-0.3.5' into maint-0.4.5 | Alexander Færøy | |
2021-11-08 | Merge remote-tracking branch 'tor-gitlab/mr/487' into maint-0.3.5 | Alexander Færøy | |
2021-11-08 | Merge remote-tracking branch 'tor-gitlab/mr/486' into maint-0.3.5 | Alexander Færøy | |
2021-11-06 | Give an error message if LibreSSL's TLSv1.3 APIs aren't what we need | Nick Mathewson | |
From LibreSSL versions 3.2.1 through 3.4.0, our configure script would conclude that TLSv1.3 as supported, but it actually wasn't. This led to annoying breakage like #40128 and #40445. Now we give an error message if we try to build with one of those versions. Closes #40511. | |||
2021-11-05 | Reverse the direction of the test for openssl 3.0.0 | Nick Mathewson | |
Previously the logic was reversed, and always gave the wrong answer. This has no other effect than to change whether we suppress deprecated API warnings. Fixes #40429; bugfix on 0.3.5.13. |