summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2020-11-17Bump version to 0.4.6.0-alpha-devtor-0.4.6.0-alpha-devNick Mathewson
2020-11-17Merge branch 'ticket40071_045_01_squashed' into masterNick Mathewson
2020-11-17changes: Add file for #40071David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-17relay: Launch dummy circuit only when descriptor build failsDavid Goulet
First, this commit moves the launch_dummy_circuit_as_needed() function into relay_find_addr.c and renames it to relay_addr_learn_from_dirauth(). This is an attempt to centralize anything relate with address discovery in the right module. Second, when building a descriptor and we fail to discover our address, immediately launch a dummy circuit to an authority in an attempt to learn our descriptor. It is still only done every 20 minutes even though the descriptor build is done every minute. We ought to avoid load on the authority and if we can't learn in the first place our address from them, chances are more things are wrong. Related to #40071 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-17relay: Look at our cache when looking for an IP changeDavid Goulet
Regularly, tor looks if its IP has changed. It does the entire auto discovery process again. However, it is possible that it does not find anything. Instead of thinking the IP changed to an unknown address, look at our cache and see if that value has changed. The reason for this is because if tor gets its address as a suggestion from a directory authority, it is because the auto discovery failed and thus that address should be consider for the IP change check. Related to #40071 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-17relay: Use testing circuit instead of dummy descriptor fetchDavid Goulet
Tor now can learn its address from a NETINFO cell coming from an authority. Thus, instead from launching a dummy descriptor fetch to learn the address from the directory response (unauthenticated), we simply now launch a one-hop testing circuit. Related to #40071 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-16Merge remote-tracking branch 'tor-gitlab/mr/197' into masterNick Mathewson
2020-11-16Merge branch 'maint-0.4.4' into masterNick Mathewson
2020-11-16Merge branch 'maint-0.4.3' into maint-0.4.4Nick Mathewson
2020-11-16Merge branch 'maint-0.3.5' into maint-0.4.3Nick Mathewson
2020-11-16Merge remote-tracking branch 'tor-gitlab/mr/195' into maint-0.3.5Nick Mathewson
2020-11-13port: Don't ignore ports of a different familyDavid Goulet
Commit c3a0f757964de0e8a24911d72abff5df20bb323c added this feature for ORPort that we ignore any port that is not the family of our default address when parsing the port. So if port_parse_config() was called with an IPv4 default address, all IPv6 address would be ignored. That makes sense for ORPort since we call twice port_parse_config() for 0.0.0.0 and [::] but for the rest of the ports, it is not good since a perfectly valid configuration can be: SocksPort 9050 SocksPort [::1]:9050 Any non-ORPort only binds by default to an IPv4 except the ORPort that binds to both IPv4 and IPv6 by default. The fix here is to always parse all ports within port_parse_config() and then, specifically for ORPort, remove the duplicates or superseding ones. The warning is only emitted when a port supersedes another. A unit tests is added to make sure SocksPort of different family always exists together. Fixes #40183 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-12Use connection_or_change_state() in v3 handshaking state changeNeel Chauhan
2020-11-12Fix typos.Samanta Navarro
Typos found with codespell. Please keep in mind that this should have impact on actual code and must be carefully evaluated: src/core/or/lttng_circuit.inc - ctf_enum_value("CONTROLER", CIRCUIT_PURPOSE_CONTROLLER) + ctf_enum_value("CONTROLLER", CIRCUIT_PURPOSE_CONTROLLER)
2020-11-12Merge branch 'ticket40187' into masterNick Mathewson
2020-11-12Correct EOL date for 0.4.3.xNick Mathewson
2020-11-12Fake the current time when we're loading TEST_DESCRIPTORS.Nick Mathewson
Fixes bug 40187; bugfix on 0.4.5.1-alpha.
2020-11-12Merge remote-tracking branch 'tor-gitlab/mr/183' into masterNick Mathewson
2020-11-12Merge branch 'maint-0.4.4' into masterNick Mathewson
"ours" to avoid version bump.
2020-11-12Bump to 0.4.4.6-devNick Mathewson
2020-11-12Merge branch 'maint-0.4.3' into maint-0.4.4Nick Mathewson
"ours" to avoid version bump.
2020-11-12Bump to 0.4.3.7-devNick Mathewson
2020-11-12Merge branch 'maint-0.3.5' into maint-0.4.3Nick Mathewson
"ours" to avoid version bump.
2020-11-12Bump to 0.3.5.12-devNick Mathewson
2020-11-12Copy ChangeLog and ReleaseNotes from today's releases to master branchNick Mathewson
2020-11-10changes file for bug 40172.Nick Mathewson
2020-11-10Export RANLIB so it's available in combine_libs scriptMatthew Finkel
Fixes 40172; bugfix on 0.4.5.1-alpha
2020-11-09Merge branch 'maint-0.4.4' into masterNick Mathewson
"-s ours" to avoid version bump.
2020-11-09Merge branch 'maint-0.4.3' into maint-0.4.4Nick Mathewson
"-s ours" to avoid version bump.
2020-11-09Merge branch 'maint-0.3.5' into maint-0.4.3Nick Mathewson
"-s ours" to avoid version bump.
2020-11-09Bump to 0.4.4.6Nick Mathewson
2020-11-09Bump to 0.4.3.7Nick Mathewson
2020-11-09Bump to 0.3.5.12Nick Mathewson
2020-11-09Merge branch 'maint-0.4.4' into masterNick Mathewson
2020-11-09Merge branch 'maint-0.4.3' into maint-0.4.4Nick Mathewson
2020-11-09Merge branch 'maint-0.3.5' into maint-0.4.3Nick Mathewson
2020-11-09Merge remote-tracking branch 'tor-gitlab/mr/189' into maint-0.3.5Nick Mathewson
2020-11-09Merge remote-tracking branch 'tor-gitlab/mr/193'Alexander Færøy
2020-11-09Merge remote-tracking branch 'tor-gitlab/mr/192'Alexander Færøy
2020-11-09Merge remote-tracking branch 'tor-gitlab/mr/190'Alexander Færøy
2020-11-06Rename OpenSSL_version_num() as defined in TorNick Mathewson
This way, if we guess wrong about whether the library has it, we don't conflict with the library's headers. Fixes #40181; bug not in any released version.
2020-11-05Handle a change in the implementation of hashlib in Python 3.9Nick Mathewson
Previously, hashlib.shake_256 was a class (if present); now it can also be a function. This change invalidated our old compatibility/workaround code, and made one of our tests fail. Fixes bug 40179; bugfix on 0.3.1.6-rc when the workaround code was added.
2020-11-03Merge remote-tracking branch 'tor-gitlab/mr/185' into masterGeorge Kadianakis
2020-11-03configure: Check STAP_PROBEV macro when building with USDT tracingDavid Goulet
It turns out that STAP_PROBEV() is not available on FreeBSD thus having sdt/sdt.h is not enough. Look for it now at configure time. Closes #40174 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-03ci: Add DISTCHECK to tracing test on GitlabDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-03Merge remote-tracking branch 'tor-gitlab/mr/187' into masterGeorge Kadianakis
2020-11-02Merge branch 'tor-gitlab/mr/186'David Goulet
2020-11-02Merge branch 'tor-gitlab/mr/188'David Goulet
2020-11-02or: Missing .inc file in include.amDavid Goulet
Fixes #40173 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-11-02Fix another duplicate typedef.Nick Mathewson
Fixes #40177; bugfix on 0.4.5.1-alpha.