aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2020-04-21Merge branch 'maint-0.4.3'Nick Mathewson
2020-04-21channeltls: Stop truncating IPv6 in logsteor
Stop truncating IPv6 addresses and ports in channel and connection logs. Fixes bug 33918; bugfix on 0.2.4.4-alpha.
2020-04-14core/or: Accurately log remote relay IPv6 addressesteor
Log IPv6 addresses on connections where this relay is the responder. Previously, responding relays would replace the remote IPv6 address with the IPv4 address from the consensus. (The port is replaced with the IPv6 ORPort from the consensus, we will resolve this issue in 33898.) Fixes bug 33899; bugfix on 0.3.1.1-alpha.
2020-04-14core/or: Allow IPv6 connections to be canonicalteor
Consider IPv6 addresses when checking if a connection is canonical. In 17604, relays assumed that a remote relay could consider an IPv6 connection canonical, but did not set the canonical flag on their side of the connection. Fixes bug 33899; bugfix on 0.3.1.1-alpha.
2020-04-13Merge branch 'maint-0.4.3'Nick Mathewson
2020-04-13Merge branch 'bug33545_043_squashed' into maint-0.4.3Nick Mathewson
2020-04-13hs-v3: Don't allow registration of an all-zeroes client auth key.George Kadianakis
The client auth protocol allows attacker-controlled x25519 private keys being passed around, which allows an attacker to potentially trigger the all-zeroes assert for client_auth_sk in hs_descriptor.c:decrypt_descriptor_cookie(). We fixed that by making sure that an all-zeroes client auth key will not be used. There are no guidelines for validating x25519 private keys, and the assert was there as a sanity check for code flow issues (we don't want to enter that function with an unitialized key if client auth is being used). To avoid such crashes in the future, we also changed the assert to a BUG-and-err.
2020-04-12Return a descriptive error for 'GETINFO status/fresh-relay-descs'Neel Chauhan
2020-04-09Merge remote-tracking branch 'tor-github/pr/1801/head'Nick Mathewson
2020-04-09Merge remote-tracking branch 'tor-github/pr/1723/head' into maint-0.4.3Nick Mathewson
2020-04-09Merge branch 'pr1854_squashed' into maint-0.4.3teor
Squashed PR 1854, and fixed a minor typo (IPv4 -> IPv6).
2020-04-09client: Revert setting PreferIPv6 on by defaultDavid Goulet
This change broke torsocks that by default is expecting an IPv4 for hostname resolution because it can't ask tor for a specific IP version with the SOCKS5 extension. PreferIPv6 made it that sometimes the IPv6 could be returned to torsocks that was expecting an IPv4. Torsocks is probably a very unique case because the runtime flow is that it hijacks DNS resolution (ex: getaddrinfo()), gets an IP and then sends it back for the connect() to happen. The libc has DNS resolution functions that allows the caller to request a specific INET family but torsocks can't tell tor to resolve the hostname only to an IPv4 or IPv6 and thus by default fallsback to IPv4. Reverting this change into 0.4.3.x series but we'll keep it in the 0.4.4.x series in the hope that we add this SOCKS5 extension to tor for DNS resolution and then change torsocks to use that. Fixes #33804 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-09Merge branch 'maint-0.4.2' into maint-0.4.3teor
2020-04-09Merge branch 'maint-0.4.1' into maint-0.4.2teor
2020-04-09Merge branch 'maint-0.3.5' into maint-0.4.1teor
2020-04-09Merge remote-tracking branch 'tor-github/pr/1784' into maint-0.3.5teor
2020-04-09changes: file for 33633teor
2020-04-08Merge branch 'tor-github/pr/1857'George Kadianakis
2020-04-08changes: Add changes file for #32542David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-08Merge branch 'tor-github/pr/1855'George Kadianakis
2020-04-07Added tests for tor_addr_is_null/valid()MrSquanchee
Added tests for tor_addr_is_valid(), and added tests for tor_addr_is_null(), which is not modfied. Ticket 33679
2020-04-07hs-v3: Fix typo in log info when PublishHidServDescriptors is set to 0David Goulet
Fixes #33779 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-07Merge branch 'pr1838_squashed'teor
2020-04-07add changes file for 31634Nick Mathewson
2020-04-04Merge branch 'maint-0.4.3'teor
2020-04-04changes: file for ticket 33782teor
Avoid conflicts between the fake sockets in tor's unit tests, and real file descriptors. Resolves issues running unit tests with GitHub Actions, where the process that embeds or launches the tests has already opened a large number of file descriptors. Fixes bug 33782; bugfix on 0.2.8.1-alpha. Found and fixed by Putta Khunchalee.
2020-04-01Merge branch 'maint-0.4.3'teor
2020-04-01configure: Fix enabled module variable expansionDavid Goulet
Fixes #33646 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-04-01Updated the TestingTorNetwork man page optionsSteven Engler
Updated 'doc/tor.1.txt' to match 'src/app/config/testnet.inc'.
2020-03-30Merge branch 'maint-0.4.3'David Goulet
2020-03-30hs-v3: Relax severity of a log message when decoding descriptors.George Kadianakis
Make it LOG_PROTOCOL_WARN and also add the expiration timestamp in there to ease debugging in the future.
2020-03-30changes: Add file for ticket 33014David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-03-28Put *.a wildcard entry into .gitignore instead of listing all .a filesrl1987
2020-03-26Merge branch 'maint-0.4.3'David Goulet
2020-03-26Merge branch 'tor-github/pr/1794' into maint-0.4.3David Goulet
2020-03-25Merge branch 'maint-0.4.1' into maint-0.4.2Nick Mathewson
2020-03-25Merge branch 'maint-0.4.3'Nick Mathewson
2020-03-25Merge branch 'maint-0.4.2' into maint-0.4.3Nick Mathewson
2020-03-24Merge branch 'maint-0.4.3'cypherpunks
2020-03-24core/mainloop: Limit growth of conn->inbufcypherpunks
If the buf_t's length could potentially become greater than INT_MAX - 1, it sets off an IF_BUG_ONCE in buf_read_from_tls(). All of the rest of the buffers.c code has similar BUG/asserts for this invariant.
2020-03-23Merge branch 'maint-0.4.3'George Kadianakis
2020-03-23Merge branch 'tor-github/pr/1788' into maint-0.4.3George Kadianakis
2020-03-23Merge remote-tracking branch 'tor-github/pr/1797/head'Nick Mathewson
2020-03-21Merge branch 'bug32588_043' into bug32588_masterteor
2020-03-21Merge branch 'bug32588_042' into bug32588_043teor
Merge static function declaration deletions from bug32588_042 and maint-0.4.3 in app/config/config.c.
2020-03-21Merge branch 'bug32588_041' into bug32588_042teor
2020-03-21Merge branch 'bug32588_035' into bug32588_041teor
Merge tests from maint-0.4.1 with new tests from bug32588_035 in test_router.c.
2020-03-21router: Stop advertising incorrect auto IPv6 ORPortsteor
When IPv6 ORPorts are set to "auto", tor relays and bridges would advertise an incorrect port in their descriptor. This may be a low-severity memory safety issue, because the published port number may be derived from uninitialised or out-of-bounds memory reads. Fixes bug 32588; bugfix on 0.2.3.9-alpha.
2020-03-20Merge remote-tracking branch 'tor-github/pr/1823/head' into maint-0.4.3Nick Mathewson
2020-03-20Merge branch 'maint-0.4.3'Nick Mathewson