aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2021-12-16release: ChangeLog and ReleaseNotes for 0.4.7.3-alphaTor CI Release
2021-12-16Merge branch 'maint-0.4.6'David Goulet
2021-12-16Update geoip files to match ipfire location db, 2021/12/15.Tor CI Release
2021-12-16fallbackdir: Update list generated on December 15, 2021Tor CI Release
2021-12-15changes: Minor syntax editing fixesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-12-15Merge remote-tracking branch 'tor-gitlab/mr/500' into mainAlexander Færøy
2021-12-15Merge remote-tracking branch 'tor-gitlab/mr/491' into mainAlexander Færøy
2021-12-15Merge remote-tracking branch 'tor-gitlab/mr/497' into mainAlexander Færøy
2021-12-13relay: Change DNS timeout label on MetricsPortDavid Goulet
Change it from "timeout" to "tor_timeout" in order to indicate that the DNS timeout is one from tor's DNS threshold and not the DNS server itself. Fixes #40527 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-12-13Merge branch 'ticket40527_046_01' into ticket40527_047_01David Goulet
2021-12-13relay: Don't make DNS timeout trigger an overloadDavid Goulet
Tor has configure libevent to attempt up to 3 times a DNS query for a maximum of 5 seconds each. Once that 5 seconds has elapsed, it consider the query "Timed Out" but tor only gets a timeout if all 3 attempts have failed. For example, using Unbound, it has a much higher threshold of timeout. It is well defined in https://www.nlnetlabs.nl/documentation/unbound/info-timeout/ and has some complexity to it. But the gist is that if it times out, it will be much more than 5 seconds. And so the Tor DNS timeouts are more of a "UX issue" rather than a "network issue". For this reason, we are removing this metric from the overload general signal. See https://gitlab.torproject.org/tpo/network-health/team/-/issues/139 for more information. Fixes #40527 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-12-06Limit the number of elements in a consdiff hash line.Nick Mathewson
This avoids performing and then freeing a lot of small mallocs() if the hash line has too many elements. Fixes one case of bug 40472; resolves OSS-Fuzz 38363. Bugfix on 0.3.1.1-alpha when the consdiff parsing code was introduced.
2021-11-23changes: Describe when bug 7362 began.Nick Mathewson
2021-11-23Add documentation on {C,S}METHOD parsing behaviourCecylia Bocovich
2021-11-15Do not count controller-selected paths towards path bias.Nick Mathewson
As a side effect, this fixes a "Bug" warning. Closes #40515. Bugfix on 0.2.4.10-alpha.
2021-11-08Merge branch 'maint-0.4.5' into maint-0.4.6Alexander Færøy
2021-11-08Merge branch 'maint-0.4.6' into mainAlexander Færøy
2021-11-08Merge branch 'maint-0.3.5' into maint-0.4.5Alexander Færøy
2021-11-08Merge remote-tracking branch 'tor-gitlab/mr/485' into mainAlexander Færøy
2021-11-06Give an error message if LibreSSL's TLSv1.3 APIs aren't what we needNick Mathewson
From LibreSSL versions 3.2.1 through 3.4.0, our configure script would conclude that TLSv1.3 as supported, but it actually wasn't. This led to annoying breakage like #40128 and #40445. Now we give an error message if we try to build with one of those versions. Closes #40511.
2021-11-05Reverse the direction of the test for openssl 3.0.0Nick Mathewson
Previously the logic was reversed, and always gave the wrong answer. This has no other effect than to change whether we suppress deprecated API warnings. Fixes #40429; bugfix on 0.3.5.13.
2021-11-05Prefer use of __MINGW_PRINTF/SCANF_FORMAT if available.Nick Mathewson
Mingw headers sometimes like to define alternative scanf/printf format attributes depending on whether they're using clang, UCRT, MINGW_ANSI_STDIO, or the microsoft version of printf/scanf. This change attempts to use the right one on the given platform. This is an attempt to fix part of #40355.
2021-11-05changes: Add file for ticket 40505Simon South
2021-11-03Merge branch 'maint-0.4.6'David Goulet
2021-11-03Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-03relay: Don't allow DirPort on non-IPv4David Goulet
Our code doesn't allow it and so this prevents an assert() crash if the DirPort is for instance IPv6 only. Fixes #40494 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-02Merge remote-tracking branch 'tor-gitlab/mr/474' into mainAlexander Færøy
2021-11-02Merge branch 'maint-0.4.6' into mainAlexander Færøy
2021-11-02man: Missing OverloadStatistics option in tor.1David Goulet
Closes #40504 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-29Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-28don't retry entry guards if they're bridges without descriptorsRoger Dingledine
When we don't yet have a descriptor for one of our bridges, disable the entry guard retry schedule on that bridge. The entry guard retry schedule and the bridge descriptor retry schedule can conflict, e.g. where we mark a bridge as "maybe up" yet we don't try to fetch its descriptor yet, leading Tor to wait (refusing to do anything) until it becomes time to fetch the descriptor. Fixes bug 40497; bugfix on 0.3.0.3-alpha.
2021-10-28do notice-level log when we resume having enough dir infoRoger Dingledine
we do a notice-level log when we decide we *don't* have enough dir info, but in 0.3.5.1-alpha (see commit eee62e13d97, #14950) we lost our corresponding notice-level log when things come back. bugfix on 0.3.5.1-alpha; fixes bug 40496.
2021-10-28reassess minimum-dir-info when a bridge failsRoger Dingledine
When we try to fetch a bridge descriptor and we fail, we mark the guard as failed, but we never scheduled a re-compute for router_have_minimum_dir_info(). So if we had already decided we needed to wait for this new descriptor, we would just wait forever -- even if, counterintuitively, *losing* the bridge is just what we need to *resume* using the network, if we had it in state GUARD_REACHABLE_MAYBE and we were stalling to learn this outcome. See bug 40396 for more details.
2021-10-28Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
2021-10-28changes: Typo in file, wrong version was usedDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-28Fix compilation on systems with older compilers.Alexander Færøy
This patch fixes a build error with GCC 7.x which doesn't seem to accept const int's as constants in macro initialization. See: tpo/core/tor#40410
2021-10-25Add Changelog and ReleaseNotes entry for tor#40500.Alexander Færøy
2021-10-25Merge branch 'maint-0.4.6' into mainAlexander Færøy
2021-10-25Merge branch 'maint-0.4.5' into maint-0.4.6Alexander Færøy
2021-10-25ci: Exclude HSv2 Stem testsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-25changelog: ChangeLog for 0.4.7.2-alpha releaseDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-21Merge branch 'maint-0.4.6'David Goulet
2021-10-21Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
2021-10-21Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2021-10-21fallbackdir: Regenerate the list for October 2021David Goulet
Closes #40493 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-21Merge branch 'tor-gitlab/mr/452_squashed' into mainAlexander Færøy
2021-10-21Prop335: Changes file and manual entries.Nick Mathewson
Closes #40448.