summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2020-05-04Merge branch 'maint-0.4.3'Nick Mathewson
2020-04-30Merge branch 'bug34077_042' into bug34077_043Nick Mathewson
2020-04-30Merge branch 'bug34077_041' into bug34077_042Nick Mathewson
2020-04-30Fix a GCC 10.0.1 compilation warning.Nick Mathewson
Fixes 34077 for 0.4.1; bugfix on 0.4.0.3-alpha. (Specifically, GCC first gives this warning for 9eeff921ae7b786d960ea4286d5bba56)
2020-04-30Merge branch 'pr1870_squashed'teor
2020-04-30Define and use TOR_ADDRPORT_BUF_LENNeel Chauhan
2020-04-29Merge remote-tracking branch 'tor-github/pr/1864/head'Nick Mathewson
2020-04-29changes: file for 33817teor
2020-04-29log/util_bug: Make IF_BUG_ONCE() support ALL_BUGS_ARE_FATALteor
... and DISABLE_ASSERTS_IN_UNIT_TESTS. Make all of tor's assertion macros support the ALL_BUGS_ARE_FATAL and DISABLE_ASSERTS_IN_UNIT_TESTS debugging modes. Implements these modes for IF_BUG_ONCE(). (It used to log a non-fatal warning, regardless of the debugging mode.) Fixes bug 33917; bugfix on 0.2.9.1-alpha.
2020-04-29core/or: Check extends for zero addresses and portsteor
Check for invalid zero IPv4 addresses and ports, when sending and receiving extend cells. Fixes bug 33900; bugfix on 0.2.4.8-alpha.
2020-04-29core/or: Support IPv6 EXTEND2 cellsteor
Allow clients and relays to send dual-stack and IPv6-only EXTEND2 cells. Parse dual-stack and IPv6-only EXTEND2 cells on relays. Relays do not make connections or extend circuits via IPv6: that's the next step. Closes ticket 33901.
2020-04-24Merge remote-tracking branch 'onionk/inbufoverflow1-043' into ticket33131_044Nick Mathewson
2020-04-24Merge remote-tracking branch 'tor-github/pr/1862/head'Nick Mathewson
2020-04-21Merge branch 'maint-0.4.3'Nick Mathewson
2020-04-21channeltls: Stop truncating IPv6 in logsteor
Stop truncating IPv6 addresses and ports in channel and connection logs. Fixes bug 33918; bugfix on 0.2.4.4-alpha.
2020-04-14core/or: Accurately log remote relay IPv6 addressesteor
Log IPv6 addresses on connections where this relay is the responder. Previously, responding relays would replace the remote IPv6 address with the IPv4 address from the consensus. (The port is replaced with the IPv6 ORPort from the consensus, we will resolve this issue in 33898.) Fixes bug 33899; bugfix on 0.3.1.1-alpha.
2020-04-14core/or: Allow IPv6 connections to be canonicalteor
Consider IPv6 addresses when checking if a connection is canonical. In 17604, relays assumed that a remote relay could consider an IPv6 connection canonical, but did not set the canonical flag on their side of the connection. Fixes bug 33899; bugfix on 0.3.1.1-alpha.
2020-04-13Merge branch 'maint-0.4.3'Nick Mathewson
2020-04-13Merge branch 'bug33545_043_squashed' into maint-0.4.3Nick Mathewson
2020-04-13hs-v3: Don't allow registration of an all-zeroes client auth key.George Kadianakis
The client auth protocol allows attacker-controlled x25519 private keys being passed around, which allows an attacker to potentially trigger the all-zeroes assert for client_auth_sk in hs_descriptor.c:decrypt_descriptor_cookie(). We fixed that by making sure that an all-zeroes client auth key will not be used. There are no guidelines for validating x25519 private keys, and the assert was there as a sanity check for code flow issues (we don't want to enter that function with an unitialized key if client auth is being used). To avoid such crashes in the future, we also changed the assert to a BUG-and-err.
2020-04-09Merge remote-tracking branch 'tor-github/pr/1801/head'Nick Mathewson
2020-04-09Merge remote-tracking branch 'tor-github/pr/1723/head' into maint-0.4.3Nick Mathewson
2020-04-09Merge branch 'pr1854_squashed' into maint-0.4.3teor
Squashed PR 1854, and fixed a minor typo (IPv4 -> IPv6).
2020-04-09client: Revert setting PreferIPv6 on by defaultDavid Goulet
This change broke torsocks that by default is expecting an IPv4 for hostname resolution because it can't ask tor for a specific IP version with the SOCKS5 extension. PreferIPv6 made it that sometimes the IPv6 could be returned to torsocks that was expecting an IPv4. Torsocks is probably a very unique case because the runtime flow is that it hijacks DNS resolution (ex: getaddrinfo()), gets an IP and then sends it back for the connect() to happen. The libc has DNS resolution functions that allows the caller to request a specific INET family but torsocks can't tell tor to resolve the hostname only to an IPv4 or IPv6 and thus by default fallsback to IPv4. Reverting this change into 0.4.3.x series but we'll keep it in the 0.4.4.x series in the hope that we add this SOCKS5 extension to tor for DNS resolution and then change torsocks to use that. Fixes #33804 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-09Merge branch 'maint-0.4.2' into maint-0.4.3teor
2020-04-09Merge branch 'maint-0.4.1' into maint-0.4.2teor
2020-04-09Merge branch 'maint-0.3.5' into maint-0.4.1teor
2020-04-09Merge remote-tracking branch 'tor-github/pr/1784' into maint-0.3.5teor
2020-04-09changes: file for 33633teor
2020-04-08Merge branch 'tor-github/pr/1857'George Kadianakis
2020-04-08changes: Add changes file for #32542David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-08Merge branch 'tor-github/pr/1855'George Kadianakis
2020-04-07Added tests for tor_addr_is_null/valid()MrSquanchee
Added tests for tor_addr_is_valid(), and added tests for tor_addr_is_null(), which is not modfied. Ticket 33679
2020-04-07hs-v3: Fix typo in log info when PublishHidServDescriptors is set to 0David Goulet
Fixes #33779 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-07Merge branch 'pr1838_squashed'teor
2020-04-07add changes file for 31634Nick Mathewson
2020-04-04Merge branch 'maint-0.4.3'teor
2020-04-04changes: file for ticket 33782teor
Avoid conflicts between the fake sockets in tor's unit tests, and real file descriptors. Resolves issues running unit tests with GitHub Actions, where the process that embeds or launches the tests has already opened a large number of file descriptors. Fixes bug 33782; bugfix on 0.2.8.1-alpha. Found and fixed by Putta Khunchalee.
2020-04-01Merge branch 'maint-0.4.3'teor
2020-04-01configure: Fix enabled module variable expansionDavid Goulet
Fixes #33646 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-03-30Merge branch 'maint-0.4.3'David Goulet
2020-03-30hs-v3: Relax severity of a log message when decoding descriptors.George Kadianakis
Make it LOG_PROTOCOL_WARN and also add the expiration timestamp in there to ease debugging in the future.
2020-03-30changes: Add file for ticket 33014David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-03-28Put *.a wildcard entry into .gitignore instead of listing all .a filesrl1987
2020-03-26Merge branch 'maint-0.4.3'David Goulet
2020-03-26Merge branch 'tor-github/pr/1794' into maint-0.4.3David Goulet
2020-03-25Merge branch 'maint-0.4.1' into maint-0.4.2Nick Mathewson
2020-03-25Merge branch 'maint-0.4.3'Nick Mathewson
2020-03-25Merge branch 'maint-0.4.2' into maint-0.4.3Nick Mathewson
2020-03-24Merge branch 'maint-0.4.3'cypherpunks