aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2024-10-24Merge branch 'maint-0.4.8'David Goulet
2024-10-24version: Bump version to 0.4.8.13Tor CI Release
2024-10-24Merge branch 'maint-0.4.8'David Goulet
2024-10-24fallbackdir: Update list generated on October 24, 2024Tor CI Release
2024-10-24Update geoip files to match ipfire location db, 2024/10/24.Tor CI Release
2024-10-21Revert "Handle empty DNS reply without error as NOERROR"David Goulet
Closes #40984 This reverts commit 3d2f7c3467e7aff545d8e22ffd4153d7598c6d7c.
2024-10-16Merge branch 'maint-0.4.8'David Goulet
2024-10-16Merge branch 'tor-resolve-bugfix' into 'main'Alexander Hansen Færøy
Create socket with correct family as given by sockshost See merge request tpo/core/tor!836
2024-10-15Add changes fileDaniel Winzen
2024-10-15don't build preemptive conflux circuits if no predicted portsRoger Dingledine
Conflux circuit building was ignoring the "predicted ports" feature, which aims to make Tor stop building circuits if there have been no user requests lately. This bug led to every idle Tor on the network building and discarding circuits every 30 seconds, which added overall load to the network, used bandwidth and battery from clients that weren't actively using their Tor, and kept sockets open on guards which added connection padding essentially forever. Bug went in on commit 39c2927d when we added preemptive conflux circuit pools. Fixes bug 40981; bugfix on 0.4.8.1-alpha.
2024-10-13Create socket with correct family as given by sockshostDaniel Winzen
2024-10-10Merge branch 'changelogs' into 'main'David Goulet
forward-port the 0.4.8.12 changes See merge request tpo/core/tor!834
2024-10-10Merge branch 'maint-0.4.8'David Goulet
2024-10-10Fix: Memory leaks in cpuworker on shutdownWaldemar Zimpel
Resources allocated by cpuworker weren't being freed on clean shutdown. This applies for worker threads, worker thread pool, reply queue, reply event, ...
2024-10-10changes: Add file for ticket 40248David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-10-10Merge branch 'empty-dns' into 'main'David Goulet
Handle empty DNS reply without error as NOERROR Closes #40248 See merge request tpo/core/tor!830
2024-10-01forward-port the 0.4.8.12 changesRoger Dingledine
2024-09-25Merge branch 'fix-unittest' into 'main'David Goulet
Fix unit test in test_entrynodes.c See merge request tpo/core/tor!831
2024-09-24Fix unit test in test_entrynodes.cCecylia Bocovich
2024-09-24Handle empty DNS reply without error as NOERRORDaniel Winzen
2024-09-10Merge branch 'typo-socks-proxy' into 'main'David Goulet
Fix a typo in the HTTP proxy error message. See merge request tpo/core/tor!829
2024-09-10test: Add unit tests for prop351David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-09-10Fix a typo in the HTTP proxy error message.Pier Angelo Vendrame
2024-09-09Implement proposal 351Nick Mathewson
This proposal adds new syntax to the SOCKS5 username/password extension scheme, so that requests with usernames starting with <torS0X> are now reserved. For C tor, all we need to do is reject every username starting with <torS0X> unless it is exactly "<torS0X>0".
2024-08-05Merge branch 'maint-0.4.8'David Goulet
2024-08-05dirvote: Fix memleak when computing consensusDavid Goulet
Fixes #40966 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-07-22Merge branch 'manpage-typos' into 'main'David Goulet
two small presentation issues in man page See merge request tpo/core/tor!824
2024-07-12two small presentation issues in man pageRoger Dingledine
2024-06-27Merge branch 'tap-out-phase-1' into 'main'David Goulet
Implement phase 1 of Proposal 350 (remove TAP onion keys) See merge request tpo/core/tor!822
2024-06-26Changes file for proposal 350 phase 1Nick Mathewson
2024-06-26Do not publish TAP key when publish-dummy-tap-key is 0.Nick Mathewson
2024-06-26Update supported protovers for prop350Nick Mathewson
Relay=1 is no longer supported; it corresponds to TAP. Microdesc=3 and Desc=3 are now supported; they correspond to the ability to handle (micro)descriptors without TAP onion keys.
2024-06-26Add a test for parsing a routerdesc with no TAP key.Nick Mathewson
2024-06-26Add a test for a microdesc with no onion key.Nick Mathewson
2024-06-26Remove a now-unused variable.Nick Mathewson
2024-06-26process_descs: Authorities require TAP keys for now.Nick Mathewson
2024-06-26Routerparse: accept routerdescs without TAP keys.Nick Mathewson
2024-06-26routerparse: Simplify checking for now-mandatory elementsNick Mathewson
All of these elements are now mandatory, so we can now simplify our logic for making sure that they are all present or all not-present.
2024-06-26Rename "onion_pkey" fields in routerinfo_t, and make them optional.Nick Mathewson
(Renaming them has forced me to look at every place where they are used, so I can make sure that they are really optional now.)
2024-06-26Remove node_get_rsa_onion_keyNick Mathewson
2024-06-26Remove TAP key from extend_info_tNick Mathewson
2024-06-24Make onion-key body optional in microdescsNick Mathewson
Also, stop storing onion keys in microdesc_t. (In prop350, for microdescs, we are making the body optional; the "onion-key" entry is still mandatory, so that we can tell where microdescs begin.)
2024-06-24Remove support for deciding to use CREATE/EXTEND/TAP.Nick Mathewson
2024-06-24prop350: Remove all support for TAP, CREATE, and EXTEND.Nick Mathewson
2024-06-24prop350: Stop accepting CREATE and EXTEND.Nick Mathewson
2024-06-18Merge branch 'maint-0.4.8'David Goulet
2024-06-18bridge: Always put transport-info lineDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-18Clean-up Managed Proxy state in PT tests.Alexander Færøy
This patch makes sure we clean up our version and implementation fields in our Managed Proxy struct after each test run. This was detected by LeakSanitizer. See: tpo/core/tor#11101.
2024-06-18Add changes file for tpo/core/tor#11101.Alexander Færøy
2024-06-18Add implementation and version metadata to bridge extra-info.Alexander Færøy
This patch adds two new keys to bridges' extra-info document: "transport-version" and "transport-implementation". These two new values always appear together (if one is missing, the other one will be missing too) and is parsed from PT's STATUS TYPE=version messages. See: tpo/core/tor#11101.