aboutsummaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2022-01-24release: ChangeLog and ReleaseNotes for 0.3.5.18David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18Merge branch 'maint-0.3.5' into release-0.3.5David Goulet
2022-01-18Merge branch 'tor-gitlab/mr/510' into maint-0.3.5David Goulet
2022-01-18Merge branch 'maint-0.3.5' into release-0.3.5David Goulet
2022-01-18main: Update a dead URL in a log noticeDavid Goulet
Change https://www.torproject.org/download/download#warning to https://support.torproject.org/faq/staying-anonymous/ Closes #40544 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18relay: Don't advertise HSv2 protocol versionDavid Goulet
We removed HSIntro=3 and HSDir=1 that are v2 specific. Since 0.3.5.17, we do not support introducing or being a directory for onion service v2. Closes #40509 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-11-08Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-11-06Give an error message if LibreSSL's TLSv1.3 APIs aren't what we needNick Mathewson
From LibreSSL versions 3.2.1 through 3.4.0, our configure script would conclude that TLSv1.3 as supported, but it actually wasn't. This led to annoying breakage like #40128 and #40445. Now we give an error message if we try to build with one of those versions. Closes #40511.
2021-11-05Reverse the direction of the test for openssl 3.0.0Nick Mathewson
Previously the logic was reversed, and always gave the wrong answer. This has no other effect than to change whether we suppress deprecated API warnings. Fixes #40429; bugfix on 0.3.5.13.
2021-10-29Merge branch 'maint-0.3.5' into release-0.3.5David Goulet
2021-10-29changes: Add file for ticket 26299David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-25changelog: Changelog for 0.3.5.17David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-21Merge branch 'maint-0.3.5' into release-0.3.5David Goulet
2021-10-21fallbackdir: Regenerate the list for October 2021David Goulet
Closes #40493 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-20Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-10-20Announce URL to bridge status page when starting Tor as a bridge relay.Alexander Færøy
This patch makes Tor announce the relay specific bridge status page URL when Tor is starting up before bootstrap occours. See: tor#30477
2021-10-20Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-10-20Merge remote-tracking branch 'tor-gitlab/mr/369' into maint-0.3.5Alexander Færøy
2021-10-19Merge branch 'maint-0.3.5' into release-0.3.5David Goulet
2021-10-19changes: Add file for ticket 40476David Goulet
Closes #40476 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-08-13Changelog for 0.3.5.16David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-08-12Merge branch 'maint-0.3.5' into release-0.3.5David Goulet
2021-08-12Update GeoIP files to match IPFire location DB as per 2021/08/12.Alexander Færøy
2021-08-11Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-08-11Merge remote-tracking branch 'tor-gitlab/mr/417' into maint-0.3.5Alexander Færøy
2021-08-11Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-08-11Disable ed25519-donna's batch verification.George Kadianakis
Fixes bug 40078. As reported by hdevalence our batch verification logic can cause an assert crash. The assert happens because when the batch verification of ed25519-donna fails, the code in `ed25519_checksig_batch()` falls back to doing a single verification for each signature. The crash occurs because batch verification failed, but then all signatures individually verified just fine. That's because batch verification and single verification use a different equation which means that there are sigs that can pass single verification but fail batch verification. Fixing this would require modding ed25519-donna which is not in scope for this ticket, and will be soon deprecated in favor of arti and ed25519-dalek, so my branch instead removes batch verification.
2021-08-11fallbackdir: Regenerate listDavid Goulet
New list for all stable releases. Closes #40447 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-08-11Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-08-11relay: Reduce streaming compression ratio from HIGH to LOWDavid Goulet
Fixes #40301 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-06-10Backport changelog entriesNick Mathewson
2021-06-10Merge branch 'maint-0.3.5' into release-0.3.5Nick Mathewson
2021-06-10Fix TROVE-2021-006: Out-of-bounds read on v3 desc parsingGeorge Kadianakis
2021-06-10Merge branch 'maint-0.3.5' into release-0.3.5Nick Mathewson
2021-06-10TROVE-2021-003: Check layer_hint before half-closed end and resolve cellsDavid Goulet
This issue was reported by Jann Horn part of Google's Project Zero. Jann's one-sentence summary: entry/middle relays can spoof RELAY_END cells on half-closed streams, which can lead to stream confusion between OP and exit. Fixes #40389
2021-06-10Merge branch 'maint-0.3.5' into release-0.3.5Nick Mathewson
2021-06-10Merge branch 'bug40391_035' into maint-0.3.5Nick Mathewson
2021-06-10Merge branch 'bug40390_035_squashed' into maint-0.3.5Nick Mathewson
2021-06-10Assert on _all_ failures from RAND_bytes().Nick Mathewson
Previously, we would detect errors from a missing RNG implementation, but not failures from the RNG code itself. Fortunately, it appears those failures do not happen in practice when Tor is using OpenSSL's default RNG implementation. Fixes bug 40390; bugfix on 0.2.8.1-alpha. This issue is also tracked as TROVE-2021-004. Reported by Jann Horn at Google's Project Zero.
2021-06-10Merge branch 'maint-0.3.5' into release-0.3.5Nick Mathewson
2021-06-10Merge remote-tracking branch 'tor-gitlab/mr/386' into maint-0.3.5Nick Mathewson
2021-06-10Merge branch 'maint-0.3.5' into release-0.3.5Nick Mathewson
2021-06-10Update geoip files to match ipfire location db, 2021/06/10.Nick Mathewson
2021-06-07remove rolled-up changes file.Nick Mathewson
2021-05-25Merge branch 'maint-0.3.5' into release-0.3.5Alexander Færøy
2021-05-25Remove the function `tor_tls_assert_renegotiation_unblocked`.Nick Mathewson
It was used nowhere outside its own unit tests, and it was causing compilation issues with recent OpenSSL 3.0.0 alphas. Closes ticket 40399.
2021-05-18Use a more secure hash function for the circuitmux hashtable.Nick Mathewson
Fixes bug 40931; bugfix on 0.2.4.4-alpha. Also tracked as TROVE-2021-005. This issue was reported by Jann Horn from Google's Project Zero.
2021-05-18fixup! Assert on _all_ failures from RAND_bytes().Nick Mathewson
Whoops; I forgot to add the changes file. :/
2021-05-07Merge branch 'maint-0.3.5' into release-0.3.5Nick Mathewson
2021-05-07Reindent a few lines to fix a GCC warning.Nick Mathewson
As of GCC 11.1.1, the compiler warns us about code like this: if (a) b; c; and that's a good thing: we wouldn't want to "goto fail". But we had an instance if this in circuituse.c, which was making our compilation sad. Fixes bug 40380; bugfix on 0.3.0.1-alpha.