Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-02-11 | test: Add unit test for connection_dir_is_global_write_low() | David Goulet | |
Part of #33029 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | dirauth: Resume sending 503 directory error code | David Goulet | |
Authorities were never sending back 503 error code because by design they should be able to always answer directory requests regardless of bandwidth capacity. However, that recently backfired because of a large number of requests from unknown source using the DirPort that are _not_ getting their 503 code which overloaded the DirPort leading to the authority to be unable to answer to its fellow authorities. This is not a complete solution to the problem but it will help ease off the load on the authority side by sending back 503 codes *unless* the connection is from a known relay or an authority. Fixes #33029 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | dirauth: Add option AuthDirRejectRequestsUnderLoad | David Goulet | |
This controls the previous feature added that makes dirauth send back a 503 error code on non relay connections if under bandwidth pressure. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | dirlist: Add configured trusted dir to the nodelist address set | David Goulet | |
The configured, within the torrc or hardcoded, directory authorities addresses are now added to the nodelist address set. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | nodelist: Helper to add an address to the nodelist address set | David Goulet | |
We separate v4 and v6 because we often use an IPv4 address represented with a uint32_t instead of a tor_addr_t. This will be used to also add the trusted directory addresses taken from the configuration. The trusted directories from the consensus are already added to the address set from their descriptor. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | mainloop: Modernize a bit connection_dir_is_global_write_low() | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | mainloop: Remove unused parameter from connection_dir_is_global_write_low() | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | mainloop: Rename global_write_bucket_low() | David Goulet | |
That function is only used to test the global bucket write limit for a directory connection. It should _not_ be used for anything else since that function looks to see if we are a directory authority. Rename it to something more meaningful. No change in behavior at this commit, only renaming. Part of #33029 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2020-02-11 | Merge branch 'maint-0.4.1' into maint-0.4.2 | Nick Mathewson | |
"ours" merge, since the exceptions.txt file is already fixed in this branch. | |||
2020-02-11 | Remove a redundant practracker exception line in maint-0.4.1 | Nick Mathewson | |
This will our "git push" hook not complain about pushing from maint-0.4.1. | |||
2020-02-10 | Merge branch 'maint-0.4.1' into maint-0.4.2 | Nick Mathewson | |
2020-02-10 | Merge branch 'maint-0.4.0' into maint-0.4.1 | Nick Mathewson | |
2020-02-10 | Merge branch 'maint-0.3.5' into maint-0.4.0maint-0.4.0 | Nick Mathewson | |
2020-02-10 | Merge branch 'bug33212_035' into maint-0.3.5 | Nick Mathewson | |
2020-02-10 | Fix a Rust compilation warning; resolve bug 33212. | Nick Mathewson | |
2020-01-30 | Merge branch 'maint-0.4.1' into maint-0.4.2 | Nick Mathewson | |
Using "ours" strategy to avoid version bump | |||
2020-01-30 | bump to 0.4.2.6-dev | Nick Mathewson | |
2020-01-30 | Bump to 0.4.1.8-dev | Nick Mathewson | |
2020-01-29 | Bump version to 0.4.2.6 | Nick Mathewson | |
2020-01-29 | Merge branch 'maint-0.4.1' into maint-0.4.2 | Nick Mathewson | |
"Ours" merge to avoid version bump. | |||
2020-01-29 | bump to 0.4.1.8 | Nick Mathewson | |
2020-01-30 | Merge branch 'maint-0.4.1' into maint-0.4.2 | teor | |
2020-01-30 | Merge branch 'maint-0.4.0' into maint-0.4.1 | teor | |
2020-01-30 | Merge branch 'maint-0.3.5' into maint-0.4.0 | teor | |
2020-01-30 | Merge remote-tracking branch 'tor-github/pr/1634' into maint-0.4.1 | teor | |
2020-01-30 | Merge remote-tracking branch 'tor-github/pr/1614' into maint-0.3.5 | teor | |
2020-01-16 | Merge branch 'maint-0.4.1' into maint-0.4.2 | teor | |
2020-01-16 | Merge branch 'maint-0.4.0' into maint-0.4.1 | teor | |
2020-01-16 | Merge branch 'maint-0.3.5' into maint-0.4.0 | teor | |
2020-01-16 | Merge remote-tracking branch 'tor-github/pr/1513' into maint-0.3.5 | teor | |
2020-01-14 | practracker: print a notice to stderr when disabled | teor | |
When TOR_DISABLE_PRACTRACKER is set, print a message to stderr when skipping practracker checks. Part of 32705. | |||
2020-01-13 | test_practracker.sh: never disable practracker | Nick Mathewson | |
When practracker is disabled, its output will be empty. We don't want that happening during our tests. Fixes bug 32705; bugfix on 0.4.2.1-alpha, when test_practracker.sh was introduced. | |||
2020-01-06 | Merge remote-tracking branch 'tor-github/pr/1612' into maint-0.4.2 | Nick Mathewson | |
2020-01-06 | Initialize publish/subscribe code when running as an NT service. | Nick Mathewson | |
Fixes bug 32778; bugfix on 0.4.1.1-alpha. | |||
2020-01-06 | Merge branch 'maint-0.4.1' into maint-0.4.2 | Nick Mathewson | |
2020-01-06 | update changes file to pass "make check-changes" | Nick Mathewson | |
2020-01-06 | Merge branch 'maint-0.4.1' into maint-0.4.2 | Nick Mathewson | |
2020-01-05 | Fix sandbox crash during reload of logging configuration | Peter Gerber | |
Allow calls to dup() which was introduced in commit a22fbab986. From a security perspective, I don't think this should impact the security of the sandbox significantly. As far as I can tell, there is nothing an adversary can do with a duplicated FD that can't be done with the original. | |||
2019-12-20 | Merge branch 'maint-0.4.1' into maint-0.4.2 | teor | |
2019-12-20 | Merge branch 'maint-0.4.0' into maint-0.4.1 | teor | |
2019-12-17 | Correct how we use libseccomp | Peter Gerber | |
This fixes a startup crash with libseccomp v2.4.0 if Sandbox is set to 1. | |||
2019-12-16 | Fix formatting in tor_assertf() message in struct_check_magic(). | Nick Mathewson | |
Closes 32771; bugfix on 0.4.2.1-alpha. | |||
2019-12-16 | Merge branch 'bug32765_041' into bug32771_042 | Nick Mathewson | |
2019-12-16 | Use CHECK_PRINTF() for printf-like functions in util_bug.h | Nick Mathewson | |
2019-12-16 | Merge branch 'bug32240_32242_041' into bug32240_32242_042 | teor | |
2019-12-16 | Merge branch 'bug32240_32242_040' into bug32240_32242_041 | teor | |
2019-12-16 | Merge branch 'bug32240_32242_035' into bug32240_32242_040 | teor | |
Merge: * libzstd-dev from ticket32242_035 * shellcheck from maint-0.4.0 | |||
2019-12-16 | Merge remote-tracking branch 'tor-github/pr/1459' into bug32240_32242_035 | teor | |
2019-12-16 | Merge branch 'bug32240_041' into bug32240_042 | teor | |
Merge: * CHUTNEY_TOR_SANDBOX=0 from bug32240_041 * RUST_VERSION from maint-0.4.2 | |||
2019-12-16 | Merge branch 'bug32240_040' into bug32240_041 | teor | |