aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2024-10-24Merge branch 'maint-0.4.8'David Goulet
2024-10-24fallbackdir: Update list generated on October 24, 2024Tor CI Release
2024-10-24Update geoip files to match ipfire location db, 2024/10/24.Tor CI Release
2024-10-16Merge branch 'maint-0.4.8'David Goulet
2024-10-15Add changes fileDaniel Winzen
2024-10-15don't build preemptive conflux circuits if no predicted portsRoger Dingledine
Conflux circuit building was ignoring the "predicted ports" feature, which aims to make Tor stop building circuits if there have been no user requests lately. This bug led to every idle Tor on the network building and discarding circuits every 30 seconds, which added overall load to the network, used bandwidth and battery from clients that weren't actively using their Tor, and kept sockets open on guards which added connection padding essentially forever. Bug went in on commit 39c2927d when we added preemptive conflux circuit pools. Fixes bug 40981; bugfix on 0.4.8.1-alpha.
2024-10-10Merge branch 'maint-0.4.8'David Goulet
2024-10-10Fix: Memory leaks in cpuworker on shutdownWaldemar Zimpel
Resources allocated by cpuworker weren't being freed on clean shutdown. This applies for worker threads, worker thread pool, reply queue, reply event, ...
2024-10-10changes: Add file for ticket 40248David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-09-09Implement proposal 351Nick Mathewson
This proposal adds new syntax to the SOCKS5 username/password extension scheme, so that requests with usernames starting with <torS0X> are now reserved. For C tor, all we need to do is reject every username starting with <torS0X> unless it is exactly "<torS0X>0".
2024-08-05Merge branch 'maint-0.4.8'David Goulet
2024-08-05dirvote: Fix memleak when computing consensusDavid Goulet
Fixes #40966 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-26Changes file for proposal 350 phase 1Nick Mathewson
2024-06-18Merge branch 'maint-0.4.8'David Goulet
2024-06-18Add changes file for tpo/core/tor#11101.Alexander Færøy
2024-06-07fix sandbox for bandwidth authorityPeter Palfrader
2024-06-06Merge branch 'maint-0.4.8'David Goulet
2024-06-06fallbackdir: Update list generated on June 06, 2024Tor CI Release
2024-06-06Update geoip files to match ipfire location db, 2024/06/06.Tor CI Release
2024-05-30Merge branch 'ticket40689_048_01' into 'main'David Goulet
dirauth: Add new faravahar Closes #40689 See merge request tpo/core/tor!819
2024-05-30dirauth: Add new faravaharDavid Goulet
Brand new address, brand new keys, brand new day. Closes #40689 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-29Merge branch 'maint-0.4.8'David Goulet
2024-04-16circuit: Remove log_warn triggered by a proto violationDavid Goulet
Fixes #40932 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15Merge branch 'maint-0.4.8'David Goulet
2024-04-15Merge branch 'tor-gitlab/mr/808' into maint-0.4.8David Goulet
2024-04-15conflux: Don't process a closed circuit on get packaged windowDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15conflux: Avoid noting a cell was sent on a closed circuitDavid Goulet
It turns out that circuit_package_relay_cell() returns 0 in order to drop a cell but there is a code path, if the circuit queue is full, that also silently closes the circuit and returns 0. This lead to Conflux thinking a cell was sent but actually the cell was not and the circuit was closed leading to the hard assert. And so this function makes sure that circuit_package_relay_cell() and append_cell_to_circuit_queue() returns a value that indicate what happened with the cell and circuit so the caller can make an informed decision with it. This change makes it that we do NOT enter the Conflux subsystem if the cell is not queued on the circuit. Fixes #40921 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-10Merge branch 'maint-0.4.8'David Goulet
2024-04-10fallbackdir: Update list generated on April 10, 2024Tor CI Release
2024-04-10Update geoip files to match ipfire location db, 2024/04/10.Tor CI Release
2024-04-09Merge branch 'maint-0.4.8'David Goulet
2024-04-08dirauth: New keys and address for tor26David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-03-20test: Disable unit test causing issue with nightly packageDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-03-14hs_service: don't force high intro point rotation for TestingTorNetworkJim Newsome
This was previously added to facilitate testing intro point rotation with chutney. However, the implementation is problematic since it forces excessive rotation whenever TestingTorNetwork is enabled, and can't be adjusted or disabled. Alternatives for testing intro point rotation include: * Using shadow to "fast forward" time * Overriding the consensus parameters hs_intro_min_lifetime and hs_intro_max_lifetime. Fixes #40922
2024-02-28Merge branch 'maint-0.4.8'Alexander Færøy
2024-02-08Merge branch 'bug40911' into 'main'David Goulet
Make two 1-bit fields unsigned Closes #40911 See merge request tpo/core/tor!796
2024-02-06Try to appease the changefile format checkerSebastian Hahn
2024-02-01Make two 1-bit fields unsignedSebastian Hahn
This should be a completely harmless warning as we only check whether the fields are true or false. Closes #40911.
2024-02-01Add a changes fileSebastian Hahn
2024-01-30Merge branch 'ticket40816_049_01' into 'main'Alexander Færøy
metrics: Add new relay metrics to MetricsPort Closes #40816 See merge request tpo/core/tor!793
2024-01-30Merge branch 'maint-0.4.8'David Goulet
2024-01-30dirauth: Reject 0.4.7.x series at the authority levelDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-01-30bwauth: Allow "node_id" KeyValue without "$"juga
Allow "node_id" KeyValue without the dollar sign at the start of the hexdigit in the BandwidthFiles, in order to easier database queries combining Tor documents in which the relays fingerprint doesn't include it. Bugfix on all supported versions of Tor. Closes #40891
2024-01-30metrics: Add new relay metrics to MetricsPortDavid Goulet
This commit adds the total number of DROP cell seen, the total number of DESTROY cell received and the total number of protocol violation that lead to a circuit close. Closes #40816 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-12-08Merge branch 'maint-0.4.8'David Goulet
2023-12-08fallbackdir: Update list generated on December 08, 2023Tor CI Release
2023-12-08Update geoip files to match ipfire location db, 2023/12/08.Tor CI Release
2023-12-08Merge branch 'maint-0.4.8'David Goulet
2023-12-08Merge remote-tracking branch 'mikeperry-private/bug40897' into maint-0.4.8David Goulet
2023-12-07Merge branch 'maint-0.4.8'Alexander Færøy