aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-08-11Revert "version: Bump version to 0.4.5.13-dev"tor-0.4.5.13David Goulet
This reverts commit 3b143927b39d243017c9c6f0a1a662c4b302f7e5.
2022-08-11Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-11version: Bump version to 0.4.5.13-devTor CI Release
2022-08-11Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-11release: ChangeLog/ReleaseNotes fixesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-11release: ChangeLog and ReleaseNotes for 0.4.5.13Tor CI Release
2022-08-11version: Bump version to 0.4.5.13Tor CI Release
2022-08-11Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-11fallbackdir: Update list generated on August 11, 2022Tor CI Release
2022-08-11Update geoip files to match ipfire location db, 2022/08/11.Tor CI Release
2022-08-10Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-10fallbackdirs: Update list from maint-0.4.7David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-10Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-10geoip: Update files from maint-0.4.7David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-02Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-02Merge branch 'tor-gitlab/mr/608' into maint-0.4.5David Goulet
2022-08-02Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-08-02relay: Don't send DESTROY remote reason backward or forwardDavid Goulet
Fixes #40649 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-01conn: Notify btrack subsys on normal OR conn closeDavid Goulet
Fixes #40604 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-27Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-07-27Merge branch 'tor-gitlab/mr/605' into maint-0.4.5David Goulet
2022-07-27Fix a check, make a netflow padding function more safe.Nick Mathewson
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would crash with an assertion failure if `low_timeout` was greater than `high_timeout`. That wasn't possible in practice because of checks in `channelpadding_update_padding_for_channel`, but it's better not to have a function whose correctness is this tricky to prove. Fixes #40645. Bugfix on 0.3.1.1-alpha.
2022-07-27relay: Use remote reason when sending back a DESTROYDavid Goulet
Fix from previous commit where a DESTROY cell is sent instead of a TRUNCATED. Related to #40623 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-26Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-07-26relay: Send DESTROY cell instead of TRUNCATED cellDavid Goulet
Note that with this commit, TRUNCATED cells won't be used anymore that is client and relays won't emit them. Fixes #40623 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-05-09Merge branch 'maint-0.4.5' into release-0.4.5Alexander Færøy
2022-05-09Add changes entry to tor!575.Alexander Færøy
See: tpo/core/tor#40601.
2022-05-09sandbox: Permit rseq syscall as wellpmu-ipf
This was found to be necessary in conjunction with glibc 2.35 on Linux. Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-04-14Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-04-14Merge branch 'tor-gitlab/mr/491' into maint-0.4.5David Goulet
2022-04-14Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-04-14Merge branch 'tor-gitlab/mr/497' into maint-0.4.5David Goulet
2022-03-28Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-03-28Merge branch 'tor-gitlab/mr/556' into maint-0.4.5David Goulet
2022-03-27Sandbox: Permit the clone3 system callNick Mathewson
Apparently glibc-2.34 uses clone3, when previously it just used clone. Closes ticket #40590.
2022-03-16Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-03-16Merge branch 'tor-gitlab/mr/533' into maint-0.4.5David Goulet
2022-03-10Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-03-10hs: Schedule mainloop event on dirinfo changeDavid Goulet
Due to a possible Guard subsystem recursion, when the HS client gets notified that the directory information has changed, it must run it in a seperate mainloop event to avoid such issue. See the ticket for more information on the recursion. This also fixes a fatal assert. Fixes #40579 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-09Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-03-08hs: Fix multiple port label on single metricDavid Goulet
Prometheus needs unique labels and so this bug was causing an onion service with multiple ports to have multiple "port=" label for the metrics requiring a port label. Fixes #40581 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-02connection_or_set_identity_digest(): handle zero ed_id betterNick Mathewson
It looks like our code actually assumes (by dereferencing it in a log call) that ed_id will _not_ be NULL, but rather will be a bunch of zero bytes. Refactor the code accordingly, and stop using NULL tests on ed_id.
2022-03-02Add a changes file for 40563.Nick Mathewson
2022-03-01connection_or_set_identity_digest: more defensive programmingNick Mathewson
We expect ed_id == NULL here to indicate "no ed id", but other parts of Tor sometimes use an all-0 ed_id. Here we detect that input and replace it with what's expected.
2022-03-01Fix logic for whether a channel's Ed25519 ID is changingNick Mathewson
The previous code would notice if we were changing from one identity to another, but not if we were changing from no identity to having an identity. This problem caused a bug (spotted by cypherpunks in ticket #40563) where if we created a channel for a circuit request that doesn't include an Ed25519 identity, we won't be able to use that channel later for requests that _do_ list Ed25519. Fix for 40563; bugfix on 0.3.0.1-alpha.
2022-03-01connection_or_set_identity_digest(): Make errors nonfatal.Nick Mathewson
Previously we were using tor_assert() to enforce the documented invariant here; this commit changes it to use BUG() instead. It will protect us from crashes if the next commit (on #40563) turns out to expose a bug somewhere.
2022-02-15Add CI triggers for Debian package buildsJérôme Charaoui
This enables on-demand debian packaging CI builds on maintenance branches, to replace (often unnecessary) daily scheduled builds.
2022-02-04Merge branch 'maint-0.4.5' into release-0.4.5David Goulet
2022-02-04version: Bump version to 0.4.5.12-devTor CI Release
2022-02-04release: ChangeLog and ReleaseNotes for 0.4.5.12tor-0.4.5.12Tor CI Release