Age | Commit message (Collapse) | Author | |
---|---|---|---|
2024-10-24 | Merge branch 'maint-0.4.8' | David Goulet | |
2024-10-24 | version: Bump version to 0.4.8.13 | Tor CI Release | |
2024-10-24 | Merge branch 'maint-0.4.8' | David Goulet | |
2024-10-24 | fallbackdir: Update list generated on October 24, 2024 | Tor CI Release | |
2024-10-24 | Update geoip files to match ipfire location db, 2024/10/24. | Tor CI Release | |
2024-10-21 | Revert "Handle empty DNS reply without error as NOERROR" | David Goulet | |
Closes #40984 This reverts commit 3d2f7c3467e7aff545d8e22ffd4153d7598c6d7c. | |||
2024-10-16 | Merge branch 'maint-0.4.8' | David Goulet | |
2024-10-16 | Merge branch 'tor-resolve-bugfix' into 'main' | Alexander Hansen Færøy | |
Create socket with correct family as given by sockshost See merge request tpo/core/tor!836 | |||
2024-10-15 | Add changes file | Daniel Winzen | |
2024-10-15 | don't build preemptive conflux circuits if no predicted ports | Roger Dingledine | |
Conflux circuit building was ignoring the "predicted ports" feature, which aims to make Tor stop building circuits if there have been no user requests lately. This bug led to every idle Tor on the network building and discarding circuits every 30 seconds, which added overall load to the network, used bandwidth and battery from clients that weren't actively using their Tor, and kept sockets open on guards which added connection padding essentially forever. Bug went in on commit 39c2927d when we added preemptive conflux circuit pools. Fixes bug 40981; bugfix on 0.4.8.1-alpha. | |||
2024-10-13 | Create socket with correct family as given by sockshost | Daniel Winzen | |
2024-10-10 | Merge branch 'changelogs' into 'main' | David Goulet | |
forward-port the 0.4.8.12 changes See merge request tpo/core/tor!834 | |||
2024-10-10 | Merge branch 'maint-0.4.8' | David Goulet | |
2024-10-10 | Fix: Memory leaks in cpuworker on shutdown | Waldemar Zimpel | |
Resources allocated by cpuworker weren't being freed on clean shutdown. This applies for worker threads, worker thread pool, reply queue, reply event, ... | |||
2024-10-10 | changes: Add file for ticket 40248 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-10-10 | Merge branch 'empty-dns' into 'main' | David Goulet | |
Handle empty DNS reply without error as NOERROR Closes #40248 See merge request tpo/core/tor!830 | |||
2024-10-01 | forward-port the 0.4.8.12 changes | Roger Dingledine | |
2024-09-25 | Merge branch 'fix-unittest' into 'main' | David Goulet | |
Fix unit test in test_entrynodes.c See merge request tpo/core/tor!831 | |||
2024-09-24 | Fix unit test in test_entrynodes.c | Cecylia Bocovich | |
2024-09-24 | Handle empty DNS reply without error as NOERROR | Daniel Winzen | |
2024-09-10 | Merge branch 'typo-socks-proxy' into 'main' | David Goulet | |
Fix a typo in the HTTP proxy error message. See merge request tpo/core/tor!829 | |||
2024-09-10 | test: Add unit tests for prop351 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-09-10 | Fix a typo in the HTTP proxy error message. | Pier Angelo Vendrame | |
2024-09-09 | Implement proposal 351 | Nick Mathewson | |
This proposal adds new syntax to the SOCKS5 username/password extension scheme, so that requests with usernames starting with <torS0X> are now reserved. For C tor, all we need to do is reject every username starting with <torS0X> unless it is exactly "<torS0X>0". | |||
2024-08-05 | Merge branch 'maint-0.4.8' | David Goulet | |
2024-08-05 | dirvote: Fix memleak when computing consensus | David Goulet | |
Fixes #40966 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-07-22 | Merge branch 'manpage-typos' into 'main' | David Goulet | |
two small presentation issues in man page See merge request tpo/core/tor!824 | |||
2024-07-12 | two small presentation issues in man page | Roger Dingledine | |
2024-06-27 | Merge branch 'tap-out-phase-1' into 'main' | David Goulet | |
Implement phase 1 of Proposal 350 (remove TAP onion keys) See merge request tpo/core/tor!822 | |||
2024-06-26 | Changes file for proposal 350 phase 1 | Nick Mathewson | |
2024-06-26 | Do not publish TAP key when publish-dummy-tap-key is 0. | Nick Mathewson | |
2024-06-26 | Update supported protovers for prop350 | Nick Mathewson | |
Relay=1 is no longer supported; it corresponds to TAP. Microdesc=3 and Desc=3 are now supported; they correspond to the ability to handle (micro)descriptors without TAP onion keys. | |||
2024-06-26 | Add a test for parsing a routerdesc with no TAP key. | Nick Mathewson | |
2024-06-26 | Add a test for a microdesc with no onion key. | Nick Mathewson | |
2024-06-26 | Remove a now-unused variable. | Nick Mathewson | |
2024-06-26 | process_descs: Authorities require TAP keys for now. | Nick Mathewson | |
2024-06-26 | Routerparse: accept routerdescs without TAP keys. | Nick Mathewson | |
2024-06-26 | routerparse: Simplify checking for now-mandatory elements | Nick Mathewson | |
All of these elements are now mandatory, so we can now simplify our logic for making sure that they are all present or all not-present. | |||
2024-06-26 | Rename "onion_pkey" fields in routerinfo_t, and make them optional. | Nick Mathewson | |
(Renaming them has forced me to look at every place where they are used, so I can make sure that they are really optional now.) | |||
2024-06-26 | Remove node_get_rsa_onion_key | Nick Mathewson | |
2024-06-26 | Remove TAP key from extend_info_t | Nick Mathewson | |
2024-06-24 | Make onion-key body optional in microdescs | Nick Mathewson | |
Also, stop storing onion keys in microdesc_t. (In prop350, for microdescs, we are making the body optional; the "onion-key" entry is still mandatory, so that we can tell where microdescs begin.) | |||
2024-06-24 | Remove support for deciding to use CREATE/EXTEND/TAP. | Nick Mathewson | |
2024-06-24 | prop350: Remove all support for TAP, CREATE, and EXTEND. | Nick Mathewson | |
2024-06-24 | prop350: Stop accepting CREATE and EXTEND. | Nick Mathewson | |
2024-06-18 | Merge branch 'maint-0.4.8' | David Goulet | |
2024-06-18 | bridge: Always put transport-info line | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-06-18 | Clean-up Managed Proxy state in PT tests. | Alexander Færøy | |
This patch makes sure we clean up our version and implementation fields in our Managed Proxy struct after each test run. This was detected by LeakSanitizer. See: tpo/core/tor#11101. | |||
2024-06-18 | Add changes file for tpo/core/tor#11101. | Alexander Færøy | |
2024-06-18 | Add implementation and version metadata to bridge extra-info. | Alexander Færøy | |
This patch adds two new keys to bridges' extra-info document: "transport-version" and "transport-implementation". These two new values always appear together (if one is missing, the other one will be missing too) and is parsed from PT's STATUS TYPE=version messages. See: tpo/core/tor#11101. |