aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2023-11-03fallbackdir: Update list generated on November 03, 2023Tor CI Release
2023-11-03Update geoip files to match ipfire location db, 2023/11/03.Tor CI Release
2023-11-03Fix TROVE-2023-004: Remote crash when compiled against OpenSSLAlexander Færøy
Fixes #40874 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-09-18fallbackdir: Update list generated on September 18, 2023Tor CI Release
2023-09-18Update geoip files to match ipfire location db, 2023/09/18.Tor CI Release
2023-09-18Merge branch 'tor-gitlab/mr/764' into maint-0.4.7David Goulet
2023-09-18Merge branch 'tor-gitlab/mr/765' into maint-0.4.7David Goulet
2023-09-14Add changes file for tor#40859.Alexander Færøy
2023-09-14Lower the log-level and soften the language for our Zstd ABI compat check.Alexander Færøy
See: tpo/core/tor#40815.
2023-09-14Changes file for bug40858Mike Perry
2023-08-14zstd: Check errors right affer compressing/decompressingDavid Goulet
Considering a compression bomb before looking for errors led to false negative log warnings. Instead, it is possible the work failed for whatever reasons which is not indicative of a compression bomb. Fixes #40739 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-07-26fallbackdir: Update list generated on July 26, 2023Tor CI Release
2023-07-26Update geoip files to match ipfire location db, 2023/07/26.Tor CI Release
2023-07-24Fix all -Werror=enum-int-mismatch warningsDavid Goulet
Close #40824 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-07-05replace L2 vanguards that aren't Fast or StableRoger Dingledine
Rotate to a new L2 vanguard whenever an existing one loses the Stable or Fast flag. Previously, we would leave these relays in the L2 vanguard list but never use them, and if all of our vanguards end up like this we wouldn't have any middle nodes left to choose from so we would fail to make onion-related circuits. Fixes bug 40805; bugfix on 0.4.7.1-alpha.
2023-05-31changes: Add file for MR 714David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-02-13vote AuthDirMaxServersPerAddr in consensus paramsRoger Dingledine
Directory authorities now include their AuthDirMaxServersPerAddr config option in the consensus parameter section of their vote. Now external tools can better predict how they will behave. In particular, the value should make its way to the https://consensus-health.torproject.org/#consensusparams page. Once enough dir auths vote this param, they should also compute a consensus value for it in the consensus document. Nothing uses this consensus value yet, but we could imagine having dir auths consult it in the future. Implements ticket 40753.
2023-02-10metrics: Decrement hs_intro_established_count on intro circuit close.Gabriela Moldovan
Closes #40751. Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-01-26Merge branch 'tor-gitlab/mr/687' into maint-0.4.7David Goulet
2023-01-25Merge branch 'maint-0.4.5' into maint-0.4.7David Goulet
2023-01-25compress_lzma: New enum values from liblzma 5.3.xmaint-0.4.5Micah Elizabeth Scott
Add new liblzma enums (LZMA_SEEK_NEEDED and LZMA_RET_INTERNAL*) conditional to the API version they arrived in. The first stable version of liblzma this affects is 5.4.0 Fixes #40741 Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-01-25relay: Use the right max queue size value in logDavid Goulet
Fixes #40745 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-12Merge branch 'maint-0.4.5' into maint-0.4.7David Goulet
2023-01-12fallbackdir: Update list generated on January 12, 2023Tor CI Release
2023-01-12Update geoip files to match ipfire location db, 2023/01/12.Tor CI Release
2023-01-12Merge branch 'maint-0.4.5' into maint-0.4.7David Goulet
2023-01-12Merge branch 'ticket40730_045_01' into maint-0.4.5David Goulet
2023-01-12dirauth: Reject 0.4.6.x series at the authority levelDavid Goulet
Closes #40664 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-11Merge branch 'maint-0.4.5' into maint-0.4.7David Goulet
2023-01-11Merge branch 'tor-gitlab/mr/538' into maint-0.4.5David Goulet
2023-01-10Changes file for bug 40732Mike Perry
2023-01-10sandbox: Allow my-consensus-* files for an authorityDavid Goulet
Fixes #40729 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-20Enable IP_BIND_ADDRESS_NO_PORT if supportedAlex Xu (Hello71)
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-12Merge branch 'tor-gitlab/mr/667' into maint-0.4.7David Goulet
2022-12-12socks: Make SafeSocks refuse SOCKS4 and accept SOCKS4aDavid Goulet
The logic was inverted. Introduced in commit 9155e08450fe7a609f8223202e8aa7dfbca20a6d. This was reported through our bug bounty program on H1. It fixes the TROVE-2022-002. Fixes #40730 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-11Add issue40613qontinuum
2022-12-07metrics: Fix typo in a labelDavid Goulet
Fixes #40727 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-06Merge branch 'maint-0.4.5' into maint-0.4.7David Goulet
2022-12-06fallbackdir: Update list generated on December 06, 2022Tor CI Release
2022-12-06Update geoip files to match ipfire location db, 2022/12/06.Tor CI Release
2022-12-06Merge branch 'maint-0.4.5' into maint-0.4.7David Goulet
2022-12-01Ticket 40724: Changes fileMike Perry
2022-11-29dirauth: rotate moria1 keys and portsRoger Dingledine
Rotate the relay identity key and v3 identity key for moria1. They have been online for more than a decade, there was a known potential compromise, and anyway refreshing keys periodically is good practice. Advertise new ports too, to avoid confusion. Closes ticket 40722.
2022-11-28changes: Add file for ticket 40674David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-23relay: Use the configured number of threads for worker work calculationDavid Goulet
We cap our number of CPU worker threads to at least 2 even if we have a single core. But also, before we used to always add one extra thread regardless of the number of core. This meant that we were off when re-using the get_num_cpus() function when calculating our onionskin work overhead because we were always off by one. This commit makes it that we always use the number of thread our actual thread pool was configured with. Fixes #40719 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-10fallbackdir: Update list generated on November 10, 2022Tor CI Release
2022-11-10Update geoip files to match ipfire location db, 2022/11/10.Tor CI Release
2022-11-09changes: Add file for ticket 40674David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09relay: Make the max pending tasks per CPU a consensus parameterDavid Goulet
Until now, there was this magic number (64) used as the maximum number of tasks a CPU worker can take at once. This commit makes it a consensus parameter so our future selves can think of a better value depending on network conditions. Part of #40704 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09relay: Add the onion_queue_wait_cutoff consensus paramDavid Goulet
Transform the hardcoded value ONIONQUEUE_WAIT_CUTOFF into a consensus parameter so we can control it network wide. Closes #40704 Signed-off-by: David Goulet <dgoulet@torproject.org>