summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2023-08-04release: ChangeLog update for 0.4.8.3-rcDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-08-04fallbackdir: Update list generated on August 04, 2023Tor CI Release
2023-08-04Update geoip files to match ipfire location db, 2023/08/04.Tor CI Release
2023-08-01Merge branch 'bug40827' into 'main'David Goulet
Fix assert crash on relay-side due to on_circuit backpointer See merge request tpo/core/tor!737
2023-08-01Changes file for bug 40827Mike Perry
2023-07-31Changes file for bug40828Mike Perry
2023-07-26Merge branch 'maint-0.4.7'David Goulet
2023-07-26fallbackdir: Update list generated on July 26, 2023Tor CI Release
2023-07-26Update geoip files to match ipfire location db, 2023/07/26.Tor CI Release
2023-07-24Merge branch 'maint-0.4.7'David Goulet
2023-07-24Fix all -Werror=enum-int-mismatch warningsDavid Goulet
Close #40824 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-07-12release: ChangeLog and ReleaseNotes for 0.4.8.2-alphaTor CI Release
2023-07-12fallbackdir: Update list generated on July 12, 2023Tor CI Release
2023-07-12Update geoip files to match ipfire location db, 2023/07/12.Tor CI Release
2023-07-12Merge branch 'maint-0.4.7'David Goulet
2023-07-05replace L2 vanguards that aren't Fast or StableRoger Dingledine
Rotate to a new L2 vanguard whenever an existing one loses the Stable or Fast flag. Previously, we would leave these relays in the L2 vanguard list but never use them, and if all of our vanguards end up like this we wouldn't have any middle nodes left to choose from so we would fail to make onion-related circuits. Fixes bug 40805; bugfix on 0.4.7.1-alpha.
2023-06-27Changes file for bug 40566Mike Perry
2023-06-23Changes file for bug 40709Mike Perry
2023-06-22Changes file for 40569Mike Perry
2023-06-20Changes file for bug40808Mike Perry
2023-06-19Merge branch 'ticket40773' into 'main'David Goulet
Fix compilation error on older gcc versions and MSVC. See merge request tpo/core/tor!717
2023-06-15Changes file for Bug 40811Mike Perry
2023-06-14Merge branch 'tor-gitlab/mr/721'David Goulet
2023-06-13Changes file for bug40810Mike Perry
2023-06-09Bug 40801: Add changes fileMike Perry
2023-06-05More fixes for compile-time warnings in equix and hashxMicah Elizabeth Scott
This addresses issue #40800 and a couple other problems I noticed while trying to reproduce that one. The original issue is just a missing cast to void* on the args of __builtin___clear_cache(), and clang is picky about the implicit cast between what it considers to be char of different signedness. Original report is from MacOS but it's also reproducible on other clang targets. The cmake-based original build system for equix and hashx was a handy way to run tests, but it suffered from some warnings due to incorrect application of include_directories(). And lastly, there were some return codes from hashx_exec() that get ignored on equix when asserts are disabled. It bugged me too much to just silence this with a (void) cast, since even though this is in the realm of low-likelyhood programming errors and not true runtime errors, I don't want to make it easy for the hashx_exec() wrappers to return values that are dangerously wrong if an error is ignored. I made sure that even if asserts are disabled, we return values that will cause the solver and verifier to both fail to validate a potential solution. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-06-05Fix compilation error on older gcc versions and MSVC.Gabriela Moldovan
This fixes an "initializer is not a constant" compilation error that manifests itself on gcc versions < 8.1 and MSVC (see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69960#c18). Fixes bug #40773 Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-06-01release: ChangeLog for 0.4.8.1-alphaTor CI Release
2023-06-01fallbackdir: Update list generated on June 01, 2023Tor CI Release
2023-06-01Update geoip files to match ipfire location db, 2023/06/01.Tor CI Release
2023-05-31Merge branch 'maint-0.4.7'David Goulet
2023-05-31changes: Add file for MR 714David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-25changes: Add file for ticket 40797David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-25Merge branch 'tor-gitlab/mr/443'David Goulet
2023-05-25Add missing changes file for tor#33669.Alexander Færøy
See: tpo/core/tor#33669.
2023-05-24Merge branch 'tor-gitlab/mr/709'David Goulet
2023-05-24Merge branch 'tor-gitlab/mr/708'David Goulet
2023-05-24ipv6: Flip ClientUseIPv6 to 1agowa338
Fixes #40785 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-24metrics: Add ticket 40546 changes file and code fixDavid Goulet
The MR was using an old function definition so the code fix is for that. Closes #40546 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-11Add changes file for conflux.Mike Perry
2023-05-10changes: Ticket 40634 (hs_pow)Micah Elizabeth Scott
Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-03-13Merge branch 'tor-gitlab/mr/700'David Goulet
2023-03-13metrics: Add HS service side circuit build time metrics.Gabriela Moldovan
This adds 2 histogram metrics for hidden services: * `tor_hs_rend_circ_build_time` - the rendezvous circuit build time in milliseconds * `tor_hs_intro_circ_build_time` - the introduction circuit build time in milliseconds The text representation representation of the new metrics looks like this: ``` # HELP tor_hs_rend_circ_build_time The rendezvous circuit build time in milliseconds # TYPE tor_hs_rend_circ_build_time histogram tor_hs_rend_circ_build_time_bucket{onion="<elided>",le="1000.00"} 2 tor_hs_rend_circ_build_time_bucket{onion="<elided>",le="5000.00"} 10 tor_hs_rend_circ_build_time_bucket{onion="<elided>",le="10000.00"} 10 tor_hs_rend_circ_build_time_bucket{onion="<elided>",le="30000.00"} 10 tor_hs_rend_circ_build_time_bucket{onion="<elided>",le="60000.00"} 10 tor_hs_rend_circ_build_time_bucket{onion="<elided>",le="+Inf"} 10 tor_hs_rend_circ_build_time_sum{onion="<elided>"} 10824 tor_hs_rend_circ_build_time_count{onion="<elided>"} 10 # HELP tor_hs_intro_circ_build_time The introduction circuit build time in milliseconds # TYPE tor_hs_intro_circ_build_time histogram tor_hs_intro_circ_build_time_bucket{onion="<elided>",le="1000.00"} 0 tor_hs_intro_circ_build_time_bucket{onion="<elided>",le="5000.00"} 6 tor_hs_intro_circ_build_time_bucket{onion="<elided>",le="10000.00"} 6 tor_hs_intro_circ_build_time_bucket{onion="<elided>",le="30000.00"} 6 tor_hs_intro_circ_build_time_bucket{onion="<elided>",le="60000.00"} 6 tor_hs_intro_circ_build_time_bucket{onion="<elided>",le="+Inf"} 6 tor_hs_intro_circ_build_time_sum{onion="<elided>"} 9843 tor_hs_intro_circ_build_time_count{onion="<elided>"} 6 ``` Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-03-13metrics: Add support for histograms.Gabriela Moldovan
This will enable us to add e.g. circuit build metrics (#40717). Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-03-12Update 3 filesnonameformee
- /src/feature/dirauth/process_descs.c - /src/test/test_process_descs.c - /changes/ticket40760
2023-03-07Merge branch 'tor-gitlab/mr/697'David Goulet
2023-03-07metrics: Add a `reason` label to the HS error metrics.Gabriela Moldovan
This adds a `reason` label to the `hs_intro_rejected_intro_req_count` and `hs_rdv_error_count` metrics introduced in #40755. Metric look up and intialization is now more a bit more involved. This may be fine for now, but it will become unwieldy if/when we add more labels (and as such will need to be refactored). Also, in the future, we may want to introduce finer grained `reason` labels. For example, the `invalid_introduce2` label actually covers multiple types of errors that can happen during the processing of an INTRODUCE2 cell (such as cell parse errors, replays, decryption errors). Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-03-07Merge branch 'maint-0.4.7'David Goulet
2023-02-16metrics: Add metrics for rendezvous and introduction request failures.Gabriela Moldovan
This introduces a couple of new service side metrics: * `hs_intro_rejected_intro_req_count`, which counts the number of introduction requests rejected by the hidden service * `hs_rdv_error_count`, which counts the number of rendezvous errors as seen by the hidden service (this number includes the number of circuit establishment failures, failed retries, end-to-end circuit setup failures) Closes #40755. This partially addresses #40717. Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-02-13vote AuthDirMaxServersPerAddr in consensus paramsRoger Dingledine
Directory authorities now include their AuthDirMaxServersPerAddr config option in the consensus parameter section of their vote. Now external tools can better predict how they will behave. In particular, the value should make its way to the https://consensus-health.torproject.org/#consensusparams page. Once enough dir auths vote this param, they should also compute a consensus value for it in the consensus document. Nothing uses this consensus value yet, but we could imagine having dir auths consult it in the future. Implements ticket 40753.