summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-10-11Bump master to 0.4.3.0-alpha-dev.tor-0.4.3.0-alpha-devNick Mathewson
2019-10-11Merge branch 'ticket31682_042_01_squashed'Nick Mathewson
2019-10-11Correct comment on build_establish_intro_dos_extensionNick Mathewson
2019-10-11hs-v3: Fix implicit ssize_t to size_t conversionDavid Goulet
Found by Coverity. Fixes #31682 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-09Merge remote-tracking branch 'tor-github/pr/1394'Nick Mathewson
2019-10-09Merge remote-tracking branch 'tor-github/pr/1399'Nick Mathewson
2019-10-09Merge remote-tracking branch 'tor-github/pr/1401'Nick Mathewson
2019-10-09Merge branch 'bug30344_squashed_035'Nick Mathewson
2019-10-09Stop libevent from reading data from closed connections.George Kadianakis
Code adapted from Rob's proposed patch in #30344. Also add a comment in connection_mark_for_close_internal_() on why we should not be adding extra code there without a very good reason.
2019-10-08test: New behavior on IP retry for HSv3Neel Chauhan
Unit test for #31652 where if we are over the retry limit for the IP but we have an established circuit, we don't remove the IP. Part of #31652
2019-10-08hs-v3: Do not remove intro point if circuit existsDavid Goulet
When considering introduction point of a service's descriptor, do not remove an intro point that has an established or pending circuit. Fixes #31652 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-08Merge branch 'tor-github/pr/1381'David Goulet
2019-10-08Fix flapping of test_service_intro_point() unittest.George Kadianakis
2019-10-07Merge remote-tracking branch 'tor-github/pr/1317'Nick Mathewson
2019-10-07Merge branch 'ticket31548_035_01_squashed'Nick Mathewson
2019-10-07hs-v3: Make service pick the exact amount of intro pointsDavid Goulet
When encoding introduction points, we were not checking if that intro points had an established circuit. When botting up, the service will pick, by default, 3 + 2 intro points and the first 3 that establish, we use them and upload the descriptor. However, the intro point is removed from the service descriptor list only when the circuit has opened and we see that we have already enough intro points, it is then removed. But it is possible that the service establishes 3 intro points successfully before the other(s) have even opened yet. This lead to the service encoding extra intro points in the descriptor even though the circuit is not opened or might never establish (#31561). Fixes #31548 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-07Merge remote-tracking branch 'tor-github/pr/1379'Nick Mathewson
2019-10-07Merge remote-tracking branch 'tor-github/pr/1390'Nick Mathewson
2019-10-07bump to 0.4.2.2-alpha-devNick Mathewson
2019-10-07fix typo in how-to-review guidelinestor-0.4.2.2-alphaRoger Dingledine
2019-10-04tls: Log TLS read buffer length bugs onceteor
Rather than filling the logs with similar warnings. Fixes bug 31939; bugfix on 0.3.0.4-rc.
2019-10-04Merge remote-tracking branch 'tor-github/pr/1392'teor
2019-10-03hs: ADD_ONION NEW:BEST now defaults to ED25519-V3David Goulet
From RSA1024 (v2) to v3 now. Closes #29669 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-03Pick a release date for 0.4.2.2-alphaNick Mathewson
2019-10-03Light edits on 0.4.2.2-alpha changelog.Nick Mathewson
2019-10-03lightly sort changelog entriesNick Mathewson
2019-10-03Run format_changelogNick Mathewson
2019-10-03Sort changes entries into a changelog for 0.4.2.2-alphaNick Mathewson
2019-10-03Merge branch 'tor-github/pr/1377'George Kadianakis
2019-10-03Merge branch 'tor-github/pr/1276'George Kadianakis
2019-10-03Unit tests for dirserv_reject_tor_version().Nick Mathewson
2019-10-03Authorities reject relays running unsupported Tor release series.Nick Mathewson
Our minimum version is now 0.2.9.5-alpha. Series 0.3.0, 0.3.1, 0.3.2, 0.3.3, and 0.3.4 are now rejected. Also, extract this version-checking code into a new function, so we can test it. Closes ticket 31549. Also reject 0.3.5.0 through 0.3.5.6-rc as unstable.
2019-10-03bump to 0.4.2.2-alphaNick Mathewson
2019-10-03Merge remote-tracking branch 'tor-github/pr/1376'Nick Mathewson
2019-10-03Merge remote-tracking branch 'tor-github/pr/1358'Nick Mathewson
2019-10-03Merge remote-tracking branch 'tor-github/pr/1382'Nick Mathewson
2019-10-03util/map_anon_nofork: Add a cast to avoid passing -48 to memsetNick Mathewson
This fixes coverity CID 1454593, and bug 31948. Bug not in any released version of Tor.
2019-10-03configure: List the env vars needed if pkg-config doesn't workteor
Part of 31922.
2019-10-03configure: Fix a typo in the systemd version messageteor
2019-10-03configure: Give a more useful message when pkg-config failsteor
When pkg-config is not installed, or a library that depends on pkg-config is not found, tell the user what to do to fix the problem. Fixes bug 31922; bugfix on 0.3.1.1-alpha.
2019-10-03control/control: Refactor some error handling codeteor
Split some protocol error handling out of connection_control_process_inbuf(). This refactor reduces the size of a practracker exception. Closes 31840.
2019-10-02Merge remote-tracking branch 'tor-github/pr/1374'Nick Mathewson
2019-10-02Merge branch 'tor-github/pr/1385'David Goulet
2019-10-02Merge branch 'tor-github/pr/1344'David Goulet
2019-10-02Merge branch 'tor-github/pr/1363'David Goulet
2019-10-02Merge branch 'maint-0.4.1'Nick Mathewson
2019-10-02Merge branch 'maint-0.4.0' into maint-0.4.1Nick Mathewson
2019-10-02Merge branch 'maint-0.3.5' into maint-0.4.0Nick Mathewson
2019-10-02Merge branch 'maint-0.2.9' into maint-0.3.5Nick Mathewson
2019-10-02Update geoip and geoip6 to the October 1 2019 database.Karsten Loesing