aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-12-06Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-11-29dirauth: rotate moria1 keys and portsRoger Dingledine
Rotate the relay identity key and v3 identity key for moria1. They have been online for more than a decade, there was a known potential compromise, and anyway refreshing keys periodically is good practice. Advertise new ports too, to avoid confusion. Closes ticket 40722.
2022-11-28Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-11-28changes: Add file for ticket 40674David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-28dns: Make TTLs fuzzy at exit relaysRasmus Dahlberg
This change mitigates DNS-based website oracles by making the time that a domain name is cached uncertain (+- 4 minutes of what's measurable). Resolves TROVE-2021-009. Fixes #40674
2022-11-28Clip DNS TTL values once in event callbackRasmus Dahlberg
This change ensures that other parts of the code base always operate on the same clipped TTL values, notably without being aware of clipping.
2022-11-09Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-11-09build: fix -Wstrict-prototypes (Clang 16)Sam James
Clang 16 warns on -Wstrict-prototypes in preparation for C23 which can among other things, lead to some configure tests silently failing/returning the wrong result. Fixes this error: ``` -ignoreme: warning: a function declaration without a prototype is deprecated in all versions of C [-Wstrict-prototypes] +ignoreme: error: a function declaration without a prototype is deprecated in all versions of C [-Werror,-Wstrict-prototypes] main () ``` For more information, see LWN.net [0] or LLVM's Discourse [1], gentoo-dev@ [2], or the (new) c-std-porting mailing list [3]. [0] https://lwn.net/Articles/913505/ [1] https://discourse.llvm.org/t/configure-script-breakage-with-the-new-werror-implicit-function-declaration/65213 [2] https://archives.gentoo.org/gentoo-dev/message/dd9f2d3082b8b6f8dfbccb0639e6e240 [3] hosted at lists.linux.dev. Bug: https://bugs.gentoo.org/879747 Signed-off-by: Sam James <sam@gentoo.org> ---
2022-10-26Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-10-26Merge branch 'tor-gitlab/mr/631' into maint-0.4.5David Goulet
2022-10-26dirauth: Remove FaravaharDavid Goulet
Closes #40688 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-10-18dirauth: Change dizum IP addressDavid Goulet
Closes #40687 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-14Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-10-13Fix a completely wrong calculation in mach monotime_init_internal()Nick Mathewson
Bug 1: We were purporting to calculate milliseconds per tick, when we *should* have been computing ticks per millisecond. Bug 2: Instead of computing either one of those, we were _actually_ computing femtoseconds per tick. These two bugs covered for one another on x86 hardware, where 1 tick == 1 nanosecond. But on M1 OSX, 1 tick is about 41 nanoseconds, causing surprising results. Fixes bug 40684; bugfix on 0.3.3.1-alpha.
2022-08-12Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-12version: Bump version to 0.4.5.14-devTor CI Release
2022-08-12Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-12version: Bump version to 0.4.5.14tor-0.4.5.14Tor CI Release
2022-08-12release: ChangeLog and ReleaseNotes for 0.4.5.14David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-12Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-12geoip: Update geoip files with August 9th, 2022 databaseDavid Goulet
Fixes #40658 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-11version: Bump version to 0.4.5.13-devTor CI Release
2022-08-11Revert "version: Bump version to 0.4.5.13-dev"tor-0.4.5.13David Goulet
This reverts commit 3b143927b39d243017c9c6f0a1a662c4b302f7e5.
2022-08-11Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-11version: Bump version to 0.4.5.13-devTor CI Release
2022-08-11Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-11release: ChangeLog/ReleaseNotes fixesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-11release: ChangeLog and ReleaseNotes for 0.4.5.13Tor CI Release
2022-08-11version: Bump version to 0.4.5.13Tor CI Release
2022-08-11Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-11fallbackdir: Update list generated on August 11, 2022Tor CI Release
2022-08-11Update geoip files to match ipfire location db, 2022/08/11.Tor CI Release
2022-08-10Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-10fallbackdirs: Update list from maint-0.4.7David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-10Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-10geoip: Update files from maint-0.4.7David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-02Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-02Merge branch 'tor-gitlab/mr/608' into maint-0.4.5David Goulet
2022-08-02Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-02relay: Don't send DESTROY remote reason backward or forwardDavid Goulet
Fixes #40649 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-01conn: Notify btrack subsys on normal OR conn closeDavid Goulet
Fixes #40604 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-27Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-07-27Merge branch 'tor-gitlab/mr/605' into maint-0.4.5David Goulet
2022-07-27Fix a check, make a netflow padding function more safe.Nick Mathewson
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would crash with an assertion failure if `low_timeout` was greater than `high_timeout`. That wasn't possible in practice because of checks in `channelpadding_update_padding_for_channel`, but it's better not to have a function whose correctness is this tricky to prove. Fixes #40645. Bugfix on 0.3.1.1-alpha.
2022-07-27relay: Use remote reason when sending back a DESTROYDavid Goulet
Fix from previous commit where a DESTROY cell is sent instead of a TRUNCATED. Related to #40623 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-26Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-07-26relay: Send DESTROY cell instead of TRUNCATED cellDavid Goulet
Note that with this commit, TRUNCATED cells won't be used anymore that is client and relays won't emit them. Fixes #40623 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-09Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2022-05-09Add changes entry to tor!575.Alexander Færøy
See: tpo/core/tor#40601.