aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2020-10-26Merge remote-tracking branch 'tor-gitlab/mr/169' into masterGeorge Kadianakis
2020-10-23Merge remote-tracking branch 'tor-gitlab/mr/127'Nick Mathewson
2020-10-23Merge branch 'combined_libs'Nick Mathewson
2020-10-23Changes file for ticket 40127Nick Mathewson
2020-10-21Make "check-changes" work on bug32671.Nick Mathewson
2020-10-21Allow mutiple lines on configuration for ROUTERSET entries. #28361Daniel Pinto
Affected entries are: EntryNodes, ExcludeNodes, ExcludeExitNodes, ExitNodes, MiddleNodes, HSLayer2Nodes and HSLayer3Nodes.
2020-10-20Set is_padding_timer_scheduled to 0Guinness
When calling `circpad_send_padding_cell_for_callback()`, the flag `is_padding_timer_scheduled` was not resetted to 0 which caused an issue in the circpad simulator. This commit fixes this problem. Fixes #32671.
2020-10-20reindent changes/ticket40053Nick Mathewson
2020-10-20Merge branch 'mr_175_squashed'Nick Mathewson
2020-10-20Consider 301 as an error like 404Guinness
Tor does not follow redirects when bootstraping so we encountered an error. Fixes #40053
2020-10-20Merge remote-tracking branch 'tor-gitlab/mr/148' into masterGeorge Kadianakis
2020-10-19Merge remote-tracking branch 'tor-gitlab/mr/167'Nick Mathewson
2020-10-14Merge branch 'tor-gitlab/mr/170'David Goulet
2020-10-13Add changes file for 40139 (removing usecreatefast and useoptimisticdataNick Mathewson
2020-10-13Merge remote-tracking branch 'tor-gitlab/mr/161'Alexander Færøy
2020-10-12Pass the SOCKS request address in relay begin cellsNeel Chauhan
2020-10-08dirclient: print bandwidth usage on one line (#40159)Alex Xu (Hello71)
2020-10-07Remove long-obsolete members from the state file.Nick Mathewson
Tor has a feature to preserve unrecognized state file entries in order to maintain forward compatibility. But this feature, along with some unused code that we never actually removed, led to us keeping items that were of no use to the user, other than at worst to preserve ancient information about them. This commit adds a feature to remove obsolete entries when we load the file. Closes ticket 40137.
2020-10-07Merge remote-tracking branch 'tor-gitlab/mr/164'Nick Mathewson
2020-10-07Merge branch 'tor-gitlab/mr/159'David Goulet
2020-10-07Changes file for autoconf improvements in 40138Nick Mathewson
2020-10-07Merge branch 'maint-0.4.4' into masterGeorge Kadianakis
2020-10-07Merge remote-tracking branch 'tor-gitlab/mr/154' into maint-0.4.4George Kadianakis
2020-10-07Merge branch 'maint-0.4.4' into masterGeorge Kadianakis
2020-10-07Merge remote-tracking branch 'tor-gitlab/mr/163' into maint-0.4.4George Kadianakis
2020-10-06Expose TOR_PT_OUTBOUND_BIND_ADDRESS_{V4,V6} to Pluggable Transports.Alexander Færøy
This patch adds support for exposing the environment variables `TOR_PT_OUTBOUND_BIND_ADDRESS_V4` and `TOR_PT_OUTBOUND_BIND_ADDRESS_V6` to Pluggable Transport proccesses. These two values will contain the IPv4 and IPv6 address that the user have specified in torrc that they wish the PT to use for all outgoing IP packets. It is important to note here that it is up to the indvidual Pluggable Transport if they are willing to honor these values or ignore them completely. One can test this feature using the following dummy PT written in POSIX shell script: #!/bin/sh echo "LOG SEVERITY=warning MESSAGE=\"Value for IPv4: ${TOR_PT_OUTBOUND_BIND_ADDRESS_V4}\"" echo "LOG SEVERITY=warning MESSAGE=\"Value for IPv6: ${TOR_PT_OUTBOUND_BIND_ADDRESS_V6}\"" while true ; do sleep 1 done with the following entries in your torrc: OutboundBindAddressPT 203.0.113.4 OutboundBindAddress 203.0.113.5 OutboundBindAddressPT 2001:db8::4 OutboundBindAddress 2001:db8::5 See: https://bugs.torproject.org/5304
2020-10-03Fix %include bug with pattern with */ on glibc < 2.19 #40141Daniel Pinto
Fix bug where %including a pattern ending in */ would include files and folders (instead of folders only) in versions of glibc < 2.19.
2020-09-28Merge branch 'bug40133_035' into bug40133_043Nick Mathewson
2020-09-28Merge branch 'maint-0.3.5' into bug40133_035Nick Mathewson
2020-09-23Remove support for old android "logcat" APINick Mathewson
This is apparently obsolete; syslog is modern instead. If users have an android log configured, given them a syslog if we can. Closes #32181.
2020-09-23Update changes fileNick Mathewson
2020-09-23Implement IPv6 sybil protection.vnepveu
[This is a squashed patch for ticket 7193, based on taking a "git diff" for the original branch, then applying it with "git apply -3". I earlier attempted to squash the branch with "git rebase", but there were too many conflicts. --nickm]
2020-09-22Merge branch 'maint-0.4.3' into maint-0.4.4David Goulet
2020-09-22Merge branch 'maint-0.3.5' into maint-0.4.3David Goulet
2020-09-22Merge branch 'maint-0.4.4'David Goulet
2020-09-22Merge branch 'tor-gitlab/mr/145'David Goulet
2020-09-22srv: Remove spammy debug logDavid Goulet
Fixes #40135 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-09-22Fix warnings when using two unusual options together.Nick Mathewson
The option `--enable-all-bugs-are-fatal` when used with `--disable-module-relay` caused GCC to warn about functions that it thought should be labeled noreturn. I've tried a couple of approaches, but disabling the warning on these functions seems to be the best approach. Fixed #40129; bugfix on 0.4.4.1-alpha.
2020-09-18Merge remote-tracking branch 'tor-gitlab/mr/137'Alexander Færøy
2020-09-18Add flag for whether an OR conn "counts" for bootstrap trackingNick Mathewson
We set this flag if we've launched the connection in order to satisfy an origin circuit, or when we decide the connection _would_ satisfy an origin circuit. These are the only or_connections we want to consider for bootstrapping: other or_connections are opened because of client EXTEND requests, and they may succeed or fail because of the clients' confusion or misconfiguration. Closes #25061.
2020-09-18Merge branch 'maint-0.4.3' into maint-0.4.4David Goulet
2020-09-18Merge branch 'maint-0.3.5' into maint-0.4.3David Goulet
2020-09-18Merge branch 'maint-0.4.4'David Goulet
2020-09-17Fix underflow in rend_cache/free_all test.Nick Mathewson
We already fixed these in #40099 and #40125. This patch fixes #40126. Bugfix on 0.2.8.1-alpha.
2020-09-17Merge branch 'maint-0.4.4'Nick Mathewson
2020-09-17Merge branch 'maint-0.4.3' into maint-0.4.4Nick Mathewson
2020-09-17Merge branch 'maint-0.3.5' into maint-0.4.3Nick Mathewson
2020-09-17test: Increment rend cache allocation before freeingDavid Goulet
The rend_cache/entry_free was missing the rend cache allocation increment before freeing the object. Without it, it had an underflow bug: Sep 17 08:40:13.845 [warn] rend_cache_decrement_allocation(): Bug: Underflow in rend_cache_decrement_allocation (on Tor 0.4.5.0-alpha-dev 7eef9ced61e72b1d) Fixes #40125 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-09-17Use the correct SIGNED_KEY_TYPE value for signing->link certsNick Mathewson
Our code was using [01] as for the key type of signed->link certs, which was incorrect. The value should be [03], to indicate that the value as the SHA256 of an x.509 cert. Fortunately, nothing cares about this value, so there shouldn't be compatibility issues. Fixes bug 40124; bugfix on 0.2.7.2-alpha.
2020-09-14Remove changes files that will appear in 0.4.4.5Nick Mathewson