Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-08-11 | Revert "version: Bump version to 0.4.5.13-dev"tor-0.4.5.13 | David Goulet | |
This reverts commit 3b143927b39d243017c9c6f0a1a662c4b302f7e5. | |||
2022-08-11 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-11 | version: Bump version to 0.4.5.13-dev | Tor CI Release | |
2022-08-11 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-11 | release: ChangeLog/ReleaseNotes fixes | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-11 | release: ChangeLog and ReleaseNotes for 0.4.5.13 | Tor CI Release | |
2022-08-11 | version: Bump version to 0.4.5.13 | Tor CI Release | |
2022-08-11 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-11 | fallbackdir: Update list generated on August 11, 2022 | Tor CI Release | |
2022-08-11 | Update geoip files to match ipfire location db, 2022/08/11. | Tor CI Release | |
2022-08-10 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-10 | fallbackdirs: Update list from maint-0.4.7 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-10 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-10 | geoip: Update files from maint-0.4.7 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-02 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-02 | Merge branch 'tor-gitlab/mr/608' into maint-0.4.5 | David Goulet | |
2022-08-02 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-08-02 | relay: Don't send DESTROY remote reason backward or forward | David Goulet | |
Fixes #40649 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-08-01 | conn: Notify btrack subsys on normal OR conn close | David Goulet | |
Fixes #40604 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-07-27 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-07-27 | Merge branch 'tor-gitlab/mr/605' into maint-0.4.5 | David Goulet | |
2022-07-27 | Fix a check, make a netflow padding function more safe. | Nick Mathewson | |
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would crash with an assertion failure if `low_timeout` was greater than `high_timeout`. That wasn't possible in practice because of checks in `channelpadding_update_padding_for_channel`, but it's better not to have a function whose correctness is this tricky to prove. Fixes #40645. Bugfix on 0.3.1.1-alpha. | |||
2022-07-27 | relay: Use remote reason when sending back a DESTROY | David Goulet | |
Fix from previous commit where a DESTROY cell is sent instead of a TRUNCATED. Related to #40623 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-07-26 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-07-26 | relay: Send DESTROY cell instead of TRUNCATED cell | David Goulet | |
Note that with this commit, TRUNCATED cells won't be used anymore that is client and relays won't emit them. Fixes #40623 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-05-09 | Merge branch 'maint-0.4.5' into release-0.4.5 | Alexander Færøy | |
2022-05-09 | Add changes entry to tor!575. | Alexander Færøy | |
See: tpo/core/tor#40601. | |||
2022-05-09 | sandbox: Permit rseq syscall as well | pmu-ipf | |
This was found to be necessary in conjunction with glibc 2.35 on Linux. Signed-off-by: Peter Müller <peter.mueller@ipfire.org> | |||
2022-04-14 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-04-14 | Merge branch 'tor-gitlab/mr/491' into maint-0.4.5 | David Goulet | |
2022-04-14 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-04-14 | Merge branch 'tor-gitlab/mr/497' into maint-0.4.5 | David Goulet | |
2022-03-28 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-03-28 | Merge branch 'tor-gitlab/mr/556' into maint-0.4.5 | David Goulet | |
2022-03-27 | Sandbox: Permit the clone3 system call | Nick Mathewson | |
Apparently glibc-2.34 uses clone3, when previously it just used clone. Closes ticket #40590. | |||
2022-03-16 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-03-16 | Merge branch 'tor-gitlab/mr/533' into maint-0.4.5 | David Goulet | |
2022-03-10 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-03-10 | hs: Schedule mainloop event on dirinfo change | David Goulet | |
Due to a possible Guard subsystem recursion, when the HS client gets notified that the directory information has changed, it must run it in a seperate mainloop event to avoid such issue. See the ticket for more information on the recursion. This also fixes a fatal assert. Fixes #40579 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-03-09 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-03-08 | hs: Fix multiple port label on single metric | David Goulet | |
Prometheus needs unique labels and so this bug was causing an onion service with multiple ports to have multiple "port=" label for the metrics requiring a port label. Fixes #40581 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-03-02 | connection_or_set_identity_digest(): handle zero ed_id better | Nick Mathewson | |
It looks like our code actually assumes (by dereferencing it in a log call) that ed_id will _not_ be NULL, but rather will be a bunch of zero bytes. Refactor the code accordingly, and stop using NULL tests on ed_id. | |||
2022-03-02 | Add a changes file for 40563. | Nick Mathewson | |
2022-03-01 | connection_or_set_identity_digest: more defensive programming | Nick Mathewson | |
We expect ed_id == NULL here to indicate "no ed id", but other parts of Tor sometimes use an all-0 ed_id. Here we detect that input and replace it with what's expected. | |||
2022-03-01 | Fix logic for whether a channel's Ed25519 ID is changing | Nick Mathewson | |
The previous code would notice if we were changing from one identity to another, but not if we were changing from no identity to having an identity. This problem caused a bug (spotted by cypherpunks in ticket #40563) where if we created a channel for a circuit request that doesn't include an Ed25519 identity, we won't be able to use that channel later for requests that _do_ list Ed25519. Fix for 40563; bugfix on 0.3.0.1-alpha. | |||
2022-03-01 | connection_or_set_identity_digest(): Make errors nonfatal. | Nick Mathewson | |
Previously we were using tor_assert() to enforce the documented invariant here; this commit changes it to use BUG() instead. It will protect us from crashes if the next commit (on #40563) turns out to expose a bug somewhere. | |||
2022-02-15 | Add CI triggers for Debian package builds | Jérôme Charaoui | |
This enables on-demand debian packaging CI builds on maintenance branches, to replace (often unnecessary) daily scheduled builds. | |||
2022-02-04 | Merge branch 'maint-0.4.5' into release-0.4.5 | David Goulet | |
2022-02-04 | version: Bump version to 0.4.5.12-dev | Tor CI Release | |
2022-02-04 | release: ChangeLog and ReleaseNotes for 0.4.5.12tor-0.4.5.12 | Tor CI Release | |