Age | Commit message (Collapse) | Author | |
---|---|---|---|
2023-11-03 | fallbackdir: Update list generated on November 03, 2023 | Tor CI Release | |
2023-11-03 | Update geoip files to match ipfire location db, 2023/11/03. | Tor CI Release | |
2023-11-03 | Fix TROVE-2023-004: Remote crash when compiled against OpenSSL | Alexander Færøy | |
Fixes #40874 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-09-18 | fallbackdir: Update list generated on September 18, 2023 | Tor CI Release | |
2023-09-18 | Update geoip files to match ipfire location db, 2023/09/18. | Tor CI Release | |
2023-09-18 | Merge branch 'tor-gitlab/mr/764' into maint-0.4.7 | David Goulet | |
2023-09-18 | Merge branch 'tor-gitlab/mr/765' into maint-0.4.7 | David Goulet | |
2023-09-14 | Add changes file for tor#40859. | Alexander Færøy | |
2023-09-14 | Lower the log-level and soften the language for our Zstd ABI compat check. | Alexander Færøy | |
See: tpo/core/tor#40815. | |||
2023-09-14 | Changes file for bug40858 | Mike Perry | |
2023-08-14 | zstd: Check errors right affer compressing/decompressing | David Goulet | |
Considering a compression bomb before looking for errors led to false negative log warnings. Instead, it is possible the work failed for whatever reasons which is not indicative of a compression bomb. Fixes #40739 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-07-26 | fallbackdir: Update list generated on July 26, 2023 | Tor CI Release | |
2023-07-26 | Update geoip files to match ipfire location db, 2023/07/26. | Tor CI Release | |
2023-07-24 | Fix all -Werror=enum-int-mismatch warnings | David Goulet | |
Close #40824 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-07-05 | replace L2 vanguards that aren't Fast or Stable | Roger Dingledine | |
Rotate to a new L2 vanguard whenever an existing one loses the Stable or Fast flag. Previously, we would leave these relays in the L2 vanguard list but never use them, and if all of our vanguards end up like this we wouldn't have any middle nodes left to choose from so we would fail to make onion-related circuits. Fixes bug 40805; bugfix on 0.4.7.1-alpha. | |||
2023-05-31 | changes: Add file for MR 714 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-02-13 | vote AuthDirMaxServersPerAddr in consensus params | Roger Dingledine | |
Directory authorities now include their AuthDirMaxServersPerAddr config option in the consensus parameter section of their vote. Now external tools can better predict how they will behave. In particular, the value should make its way to the https://consensus-health.torproject.org/#consensusparams page. Once enough dir auths vote this param, they should also compute a consensus value for it in the consensus document. Nothing uses this consensus value yet, but we could imagine having dir auths consult it in the future. Implements ticket 40753. | |||
2023-02-10 | metrics: Decrement hs_intro_established_count on intro circuit close. | Gabriela Moldovan | |
Closes #40751. Signed-off-by: Gabriela Moldovan <gabi@torproject.org> | |||
2023-01-26 | Merge branch 'tor-gitlab/mr/687' into maint-0.4.7 | David Goulet | |
2023-01-25 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-25 | compress_lzma: New enum values from liblzma 5.3.xmaint-0.4.5 | Micah Elizabeth Scott | |
Add new liblzma enums (LZMA_SEEK_NEEDED and LZMA_RET_INTERNAL*) conditional to the API version they arrived in. The first stable version of liblzma this affects is 5.4.0 Fixes #40741 Signed-off-by: Micah Elizabeth Scott <beth@torproject.org> | |||
2023-01-25 | relay: Use the right max queue size value in log | David Goulet | |
Fixes #40745 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-01-12 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-12 | fallbackdir: Update list generated on January 12, 2023 | Tor CI Release | |
2023-01-12 | Update geoip files to match ipfire location db, 2023/01/12. | Tor CI Release | |
2023-01-12 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-12 | Merge branch 'ticket40730_045_01' into maint-0.4.5 | David Goulet | |
2023-01-12 | dirauth: Reject 0.4.6.x series at the authority level | David Goulet | |
Closes #40664 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-01-11 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2023-01-11 | Merge branch 'tor-gitlab/mr/538' into maint-0.4.5 | David Goulet | |
2023-01-10 | Changes file for bug 40732 | Mike Perry | |
2023-01-10 | sandbox: Allow my-consensus-* files for an authority | David Goulet | |
Fixes #40729 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-20 | Enable IP_BIND_ADDRESS_NO_PORT if supported | Alex Xu (Hello71) | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-12 | Merge branch 'tor-gitlab/mr/667' into maint-0.4.7 | David Goulet | |
2022-12-12 | socks: Make SafeSocks refuse SOCKS4 and accept SOCKS4a | David Goulet | |
The logic was inverted. Introduced in commit 9155e08450fe7a609f8223202e8aa7dfbca20a6d. This was reported through our bug bounty program on H1. It fixes the TROVE-2022-002. Fixes #40730 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-11 | Add issue40613 | qontinuum | |
2022-12-07 | metrics: Fix typo in a label | David Goulet | |
Fixes #40727 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-06 | fallbackdir: Update list generated on December 06, 2022 | Tor CI Release | |
2022-12-06 | Update geoip files to match ipfire location db, 2022/12/06. | Tor CI Release | |
2022-12-06 | Merge branch 'maint-0.4.5' into maint-0.4.7 | David Goulet | |
2022-12-01 | Ticket 40724: Changes file | Mike Perry | |
2022-11-29 | dirauth: rotate moria1 keys and ports | Roger Dingledine | |
Rotate the relay identity key and v3 identity key for moria1. They have been online for more than a decade, there was a known potential compromise, and anyway refreshing keys periodically is good practice. Advertise new ports too, to avoid confusion. Closes ticket 40722. | |||
2022-11-28 | changes: Add file for ticket 40674 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-23 | relay: Use the configured number of threads for worker work calculation | David Goulet | |
We cap our number of CPU worker threads to at least 2 even if we have a single core. But also, before we used to always add one extra thread regardless of the number of core. This meant that we were off when re-using the get_num_cpus() function when calculating our onionskin work overhead because we were always off by one. This commit makes it that we always use the number of thread our actual thread pool was configured with. Fixes #40719 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-10 | fallbackdir: Update list generated on November 10, 2022 | Tor CI Release | |
2022-11-10 | Update geoip files to match ipfire location db, 2022/11/10. | Tor CI Release | |
2022-11-09 | changes: Add file for ticket 40674 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-09 | relay: Make the max pending tasks per CPU a consensus parameter | David Goulet | |
Until now, there was this magic number (64) used as the maximum number of tasks a CPU worker can take at once. This commit makes it a consensus parameter so our future selves can think of a better value depending on network conditions. Part of #40704 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-09 | relay: Add the onion_queue_wait_cutoff consensus param | David Goulet | |
Transform the hardcoded value ONIONQUEUE_WAIT_CUTOFF into a consensus parameter so we can control it network wide. Closes #40704 Signed-off-by: David Goulet <dgoulet@torproject.org> |