summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2018-04-02dir auths no longer vote Guard if they're not voting V2DirRoger Dingledine
Directory authorities no longer vote in favor of the Guard flag for relays that don't advertise directory support. Starting in Tor 0.3.0.1-alpha, Tor clients have been avoiding using such relays in the Guard position, leading to increasingly broken load balancing for the 5%-or-so of Guards that don't advertise directory support. Fixes bug 22310; bugfix on 0.3.0.6.
2018-03-29Merge branch 'bug25617_029' into maint-0.3.3Nick Mathewson
2018-03-29Mark controller-initiated DNS lookups as permitted to do DNS.Nick Mathewson
Fixes bug 25617; bugfix on 0.2.9.3-alpha.
2018-03-28Merge remote-tracking branch 'dgoulet/bug24767_033_03' into maint-0.3.3Nick Mathewson
2018-03-28add a changes file for the rust libc updateNick Mathewson
2018-03-28Adding changes filerl1987
2018-03-27Fix CID 1430932Taylor Yu
Coverity found a null pointer reference in nodelist_add_microdesc(). This is almost certainly impossible assuming that the routerstatus_t returned by router_get_consensus_status_by_descriptor_digest() always corresponds to an entry in the nodelist. Fixes bug 25629.
2018-03-27Fix CID 1430932Taylor Yu
Coverity found a null pointer reference in nodelist_add_microdesc(). This is almost certainly impossible assuming that the routerstatus_t returned by router_get_consensus_status_by_descriptor_digest() always corresponds to an entry in the nodelist. Fixes bug 25629.
2018-03-27relay: Avoid connecting to down relaysDavid Goulet
If we failed to connect at the TCP level to a relay, note it down and refuse to connect again for another 60 seconds. Fixes #24767 Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-03-27Merge branch 'bug25213_033' into maint-0.3.3Nick Mathewson
2018-03-26Merge remote-tracking branch 'dgoulet/bug24904_033_01' into maint-0.3.3Nick Mathewson
2018-03-26Merge branch 'bug24903_029' into maint-0.3.3Nick Mathewson
2018-03-26Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-03-26Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2018-03-26Merge branch 'maint-0.2.9' into maint-0.3.1Nick Mathewson
2018-03-26Make extend_info_from_node() more picky about node contentsNick Mathewson
This update is needed to make it consistent with the behavior of node_awaiting_ipv6(), which doesn't believe in the addresses from routerinfos unless it actually plans to use those routerinfos. Fixes bug 25213; bugfix on b66b62fb7525cac1e1 in 0.3.3.1-alpha, which tightened up the definition of node_awaiting_ipv6().
2018-03-26When extending a circuit's path length, clear onehop_tunnel.Nick Mathewson
There was a nonfatal assertion in pathbias_should_count that would trigger if onehop_tunnel was set, but the desired_path_length was greater than 1. This patch fixes that. Fixes bug 24903; bugfix on 0.2.5.2-alpha.
2018-03-23tests: Automatically detect Rust crates to test and also pass --verbose.Isis Lovecruft
* FIXES #25560: https://bugs.torproject.org/25560.
2018-03-23chan: Use channel_is_client() in channel_do_open_actions()David Goulet
Make sure we actually only report client channel to the geoip cache instead of looking if it is a known relay. Looking if it is a known relay can be unreliable because they come and go from the consensus. Fixes #24904 Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-03-20Merge branch 'bug25306_032_01_squashed_v2' into maint-0.3.3Nick Mathewson
2018-03-20hs-v3: BUG() on missing descriptors during rotationDavid Goulet
Because of #25306 for which we are unable to reproduce nor understand how it is possible, this commit removes the asserts() and BUG() on the missing descriptors instead when rotating them. This allows us to log more data on error but also to let tor recover gracefully instead of dying. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-03-20Add the poll() syscall as permitted by the sandboxNick Mathewson
Apparently, sometimes getpwnam will call this. Fixes bug 25513.
2018-03-20Log information on specific compression backends in the OOM handler.Alexander Færøy
This patch adds some additional logging to circuits_handle_oom() to give us more information about which specific compression backend that is using a certain amount of memory. See: https://bugs.torproject.org/25372
2018-03-19changes: Add changes file for bug25479.Isis Lovecruft
2018-03-19Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-03-19Merge remote-tracking branch 'isis/bug25450_032' into maint-0.3.2Nick Mathewson
2018-03-13Merge remote-tracking branch 'ffmancera-1/bug23635' into maint-0.3.3Nick Mathewson
2018-03-13Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2018-03-13Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-03-13Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2018-03-13Merge branch 'maint-0.2.9' into maint-0.3.1Nick Mathewson
2018-03-13Merge branch 'maint-0.2.5' into maint-0.2.9Nick Mathewson
2018-03-13Update geoip and geoip6 to the March 8 2018 database.Karsten Loesing
2018-03-13Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-03-13Add a missing prototype to our libevent configure stanza.Nick Mathewson
Fixes bug 25474; bugfix on 0.3.2.5-alpha.
2018-03-08changes: Fix changes file for bug25450.Isis Lovecruft
It didn't like me insulting my patch, I guess.
2018-03-08test: Increase time limit for IP creation in an HS test.Isis Lovecruft
This should avoid most intermittent test failures on developer and CI machines, but there could (and probably should) be a more elegant solution. Also, this test was testing that the IP was created and its expiration time was set to a time greater than or equal to `now+INTRO_POINT_LIFETIME_MIN_SECONDS+5`: /* Time to expire MUST also be in that range. We add 5 seconds because * there could be a gap between setting now and the time taken in * service_intro_point_new. On ARM, it can be surprisingly slow... */ tt_u64_op(ip->time_to_expire, OP_GE, now + INTRO_POINT_LIFETIME_MIN_SECONDS + 5); However, this appears to be a typo, since, according to the comment above it, adding five seconds was done because the IP creation can be slow on some systems. But the five seconds is added to the *minimum* time we're comparing against, and so it actually functions to make this test *more* likely to fail on slower systems. (It should either subtract five seconds, or instead add it to time_to_expire.) * FIXES #25450: https://bugs.torproject.org/25450
2018-03-03changes file for 25378Nick Mathewson
2018-03-03Merge branch 'ticket23814' into maint-0.3.3Nick Mathewson
2018-03-01Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-03-01Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2018-03-01Merge branch 'maint-0.2.9' into maint-0.3.1Nick Mathewson
2018-03-01Forbid UINT32_MAX as a protocol versionNick Mathewson
The C code and the rust code had different separate integer overflow bugs here. That suggests that we're better off just forbidding this pathological case. Also, add tests for expected behavior on receiving a bad protocol list in a consensus. Fixes another part of 25249.
2018-03-01Forbid "-0" as a protocol version.Nick Mathewson
Fixes part of 24249; bugfix on 0.2.9.4-alpha.
2018-03-01Add another NULL-pointer fix for protover.c.Nick Mathewson
This one can only be exploited if you can generate a correctly signed consensus, so it's not as bad as 25074. Fixes bug 25251; also tracked as TROVE-2018-004.
2018-03-01Correctly handle NULL returns from parse_protocol_list when voting.Nick Mathewson
In some cases we had checked for it, but in others we had not. One of these cases could have been used to remotely cause denial-of-service against directory authorities while they attempted to vote. Fixes TROVE-2018-001.
2018-02-21Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson
2018-02-21Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-02-21Update the .gitmodules to refer to project-level tor-rust-dependenciesNick Mathewson
Closes most of #25323.
2018-02-16Merge branch 'maint-0.3.1' into maint-0.3.2Nick Mathewson