aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2017-12-21Merge remote-tracking branch 'dgoulet/bug24671_032_01' into maint-0.3.2Nick Mathewson
2017-12-21Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2017-12-21Merge branch 'maint-0.3.0' into maint-0.3.1Nick Mathewson
2017-12-21Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-12-21Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-12-21Merge branch 'maint-0.2.5' into maint-0.2.8maint-0.2.8Nick Mathewson
2017-12-21Merge branch 'bug24666_squashed_025' into maint-0.2.5Nick Mathewson
2017-12-21Move destroy cells into a separate queue type of their own, to save RAMNick Mathewson
We've been seeing problems with destroy cells queues taking up a huge amount of RAM. We can mitigate this, since while a full packed destroy cell takes 514 bytes, we only need 5 bytes to remember a circuit ID and a reason. Fixes bug 24666. Bugfix on 0.2.5.1-alpha, when destroy cell queues were introduced.
2017-12-21sched: Consider extra_space even if negative in KISTDavid Goulet
With extra_space negative, it means that the "notsent" queue is quite large so we must consider that value with the current computed tcp_space. If we end up to have negative space, we should not add more data to the kernel since the notsent queue is just too filled up. Fixes #24665 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-12-20sched: Use lower layer cell limit with KISTLiteDavid Goulet
Instead of using INT_MAX as a write limit for KISTLite, use the lower layer limit which is using the specialized num_cells_writeable() of the channel that will down the line check the connection's outbuf and limit it to 32KB (OR_CONN_HIGHWATER). That way we don't take the chance of bloating the connection's outbuf and we keep the cells in the circuit queue which our OOM handler can take care of, not the outbuf. Finally, this commit adds a log_debug() in the update socket information function of KIST so we can get the socket information in debug. Fixes #24671 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-12-20Merge branch 'maint-0.3.0' into maint-0.3.1Nick Mathewson
2017-12-20Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-12-20Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2017-12-20Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-12-20Merge branch 'maint-0.2.5' into maint-0.2.8Nick Mathewson
2017-12-20Update geoip and geoip6 to the December 6 2017 database.Karsten Loesing
2017-12-20Merge remote-tracking branch 'dgoulet/ticket24425_032_01' into maint-0.3.2Nick Mathewson
2017-12-12Make sandbox.c compile when libseccomp-dev is installed on arm64Nick Mathewson
Fixes ticket 24424. Patch from weasel.
2017-12-12Merge branch 'bug24367_032_squashed' into maint-0.3.2Nick Mathewson
2017-12-12Make sure bridges are definitely running before delaying directory fetchesteor
Retry directory downloads when we get our first bridge descriptor during bootstrap or while reconnecting to the network. Keep retrying every time we get a bridge descriptor, until we have a reachable bridge. Stop delaying bridge descriptor fetches when we have cached bridge descriptors. Instead, only delay bridge descriptor fetches when we have at least one reachable bridge. Fixes bug 24367; bugfix on 0.2.0.3-alpha.
2017-12-12Merge branch 'maint-0.3.0' into maint-0.3.1Nick Mathewson
2017-12-12Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2017-12-12rename changes fileNick Mathewson
2017-12-11Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-12-11Merge branch 'maint-0.2.5' into maint-0.2.8Nick Mathewson
2017-12-11Merge branch 'maint-0.3.0' into maint-0.3.1Nick Mathewson
2017-12-11Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-12-11Merge branch 'bug24167_025' into maint-0.2.5Nick Mathewson
2017-12-11Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-12-11Merge branch 'maint-0.3.0' into maint-0.3.1Nick Mathewson
2017-12-11Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-12-11Merge branch 'maint-0.2.5' into maint-0.2.8Nick Mathewson
2017-12-11Merge remote-tracking branch 'public/ticket23856_025_01' into maint-0.2.5Nick Mathewson
2017-12-11Merge branch 'maint-0.3.0' into maint-0.3.1Nick Mathewson
2017-12-11Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-12-11Merge remote-tracking branch 'public/bug23985_029' into maint-0.2.9Nick Mathewson
2017-12-11Merge branch 'bug24086_031' into maint-0.3.1Nick Mathewson
2017-12-11Merge remote-tracking branch 'public/bug24099_031' into maint-0.3.1Nick Mathewson
2017-12-11Merge remote-tracking branch 'public/bug23817_031' into maint-0.3.1Nick Mathewson
2017-12-11Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2017-12-11Merge remote-tracking branch 'asn/bug23862_031' into maint-0.3.1Nick Mathewson
2017-12-11Merge remote-tracking branch 'asn/bug23862_030' into maint-0.3.0Nick Mathewson
2017-12-11Merge branch 'stack_fixes_032_v2' into maint-0.3.2Nick Mathewson
2017-12-11Add a changelog for the STACK fixesNick Mathewson
2017-12-11sched: Avoid integer overflow when computing tcp_spaceDavid Goulet
In KIST, we could have a small congestion window value than the unacked packets leading to a integer overflow which leaves the tcp_space value to be humongous. This has no security implications but it results in KIST scheduler allowing to send cells on a potentially saturated connection. Found by #24423. Fixes #24590. Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-12-11Merge remote-tracking branch 'dgoulet/bug23603_032_02' into maint-0.3.2Nick Mathewson
2017-12-07Merge branch 'arthuredelstein_18859+1_031' into maint-0.3.2Nick Mathewson
2017-12-07Rewrite 18859 changes file from user POV.Nick Mathewson
2017-12-06Don't consider a port "handled" by an isolated circuit.Arthur Edelstein
Previously, circuit_stream_is_being_handled incorrectly reported that (1) an exit port was "handled" by a circuit regardless of whether the circuit was already isolated in some way, and (2) that a stream could be "handled" by a circuit even if their isolation settings were incompatible. As a result of (1), in Tor Browser, circuit_get_unhandled_ports was reporting that all ports were handled even though all non-internal circuits had already been isolated by a SOCKS username+password. Therefore, circuit_predict_and_launch_new was declining to launch new exit circuits. Then, when the user visited a new site in Tor Browser, a stream with new SOCKS credentials would be initiated, and the stream would have to wait while a new circuit with those credentials could be built. That wait was making the time-to-first-byte longer than it needed to be. Now, clean, not-yet-isolated circuit(s) will be automatically launched ahead of time and be ready for use whenever a new stream with new SOCKS credentials (or other isolation criteria) is initiated. Fixes bug 18859. Thanks to Nick Mathewson for improvements.
2017-12-06Merge remote-tracking branch 'dgoulet/bug24502_032_01' into maint-0.3.2Nick Mathewson