aboutsummaryrefslogtreecommitdiff
path: root/doc
AgeCommit message (Collapse)Author
2020-10-06Add `OutboundBindAddressPT` to torrc.Alexander Færøy
This patch adds a new option to torrc: `OutboundBindAddressPT`. This option works in the same way as `OutboundBindAddressOR` and `OutboundBindAddressExit` in that it allows the user to specify which outbound IP address the user wants the PT to make its connections from. There is one difference though in that OutboundBindAddressPT will only be a suggestion for the PT to use since Tor cannot enforce whether or not the PT actually uses this option for anything. See: https://bugs.torproject.org/5304
2020-10-02Fix authors stanza in tor-gencert manpageNick Mathewson
Closes #40148.
2020-09-22state-contents: correcct the description of unusable_circuitsNick Mathewson
2020-09-22Add a changes file for 40136 (state-contents.txt updates)Nick Mathewson
2020-09-22state-contents.txt: try to document circ-build-timeout fieldsNick Mathewson
This should also get feedback from @mikeperry. Closes #40136
2020-09-22Try to document pathbias fields in state file.Nick Mathewson
This will require feedback from @mikeperry, since these are a bit subtle and I've likely mangled some of these.
2020-09-22Improve doc/state-contents.txtNick Mathewson
Part of a fix for #40136. This patch adds all the state file entries to the documentation, and documents the ones that I understand well.
2020-09-14Update remaining trac.tpo wiki urlsNick Mathewson
2020-08-14Revise trac.torproject.org urls to refer to gitlab replacements.Nick Mathewson
Closes #40101.
2020-08-13Update ReleasingTor.md to current practiceNick Mathewson
2020-08-12Merge remote-tracking branch 'tor-gitlab/mr/62'Nick Mathewson
2020-08-11CodingStandards.md: allow "bugfix on all supported versions.Nick Mathewson
Closes tpo/core/team#1 .
2020-08-11Improved documentation and comments #25140Daniel Pinto
2020-08-04manual: Describe Sandbox more accurately.Nick Mathewson
Closes #23378
2020-08-01Add --format argument to --key-expiration option. #30045Daniel Pinto
2020-07-28WritingTests.md: add a section about shellsNick Mathewson
Closes #29485
2020-07-21Edit AddressDisableIPv6 man entryNick Mathewson
2020-07-21relay: Add AddressDisableIPv6 torrc optionDavid Goulet
This option controls if a tor relay will attempt address auto discovery and thus ultimately publish an IPv6 ORPort in the descriptor. Behavior is from proposal 312 section 3.2.6. Closes #33245 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-16Combine text into existing "what does not need a changes file" section.Nick Mathewson
2020-07-16Merge remote-tracking branch 'tor-gitlab/mr/57'Nick Mathewson
2020-07-16doc: Fix wrong path in include.amDavid Goulet
Tracing.md moved to doc/tracing/ so fix the distcheck path in include.am. Also add the new EventsCircuit.md file. Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-16doc: Update our requirements for changes fileDavid Goulet
Closes tpo/core/team#3. Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-16doc: Document circuit subsystem tracing eventsDavid Goulet
Create a doc/tracing/ directory to contain a top level README.md which is the previously named Tracing.md and add the EventsCircuit.md which describes the circuit subsystem tracing events in depth. Closes #40036 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-15Add support for patterns on %include #25140Daniel Pinto
Also adds generic tor_glob function to expand globs.
2020-07-14Merge remote-tracking branch 'tor-gitlab/merge-requests/48'Alexander Færøy
2020-07-14doc: Fix aesthetic issues in HACKING/Tracing.mdDavid Goulet
Remove all the escape character "\" which is not needed for Markdown files. This also fixes the tracing event include to the correct path. Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-14doc: Move manpages into doc/man/David Goulet
Closes #40044 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-13Merge branch 'maint-0.4.4'Nick Mathewson
2020-07-13Bug 31812: Change http URL's to httpsJeremyRand
2020-07-13Syntax highlighting in the docsGuinness
This adds the syntax highlights in the MarkDown files. Fixes #33741
2020-07-10Merge remote-tracking branch 'tor-gitlab/mr/29'Nick Mathewson
2020-07-09Merge branch 'maint-0.4.4'Nick Mathewson
2020-07-08doc: Add a WARNING section to Tracing.mdDavid Goulet
Explain what is safe or not with tracing data. Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-08trace: Comments and improve doc/HACKING/Tracing.mdDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-07Revert "config: Make clients tell dual-stack exits they prefer IPv6"David Goulet
This reverts commit bf2a399fc0d90df76e091fa3259f7c1b8fb87781. Don't set by default the prefer IPv6 feature on client ports because it breaks the torsocks use case. The SOCKS resolve command is lacking a mechanism to ask for a specific address family (v4 or v6) thus prioritizing IPv6 when an IPv4 address is asked on the resolve SOCKS interface resulting in a failure. Tor Browser explicitly set PreferIPv6 so this should not affect the majority of our users. Closes #33796 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-07-01Merge branch 'tor-github/pr/1953'David Goulet
2020-06-26Move remaining CodeStructure.md contents into doxygen.Nick Mathewson
2020-06-26Remove special authority semantics for AssumeReachable.Nick Mathewson
AssumeReachable should only be about whether a relay thinks that it is reachable itself. But previously, we've had it also turn off reachability checking of _other_ relays on authorities. (Technically, reachability tests were still run, but we would ignore the results.) With this patch, there is a new AuthDirTestReachability option (default 1) that controls whether authorities run reachability tests. Making this change allows us to have test networks where authorities set AssumeReachable without disabling their reachability testing entirely. Closes ticket #34445.
2020-06-26Merge branch 'assume_reachable_revamp'Nick Mathewson
2020-06-25Deprecate the "--dump-config non-builtin" optionNick Mathewson
When it works, "non-builtin" doesn't do anything different from "short". (When it doesn't work, it gives an assertion failure.) Closes ticket #33398.
2020-06-24Add an AssumeReachableIPv6 autobool option.Nick Mathewson
This option tells Tor that our IPv6 orport is reachable, and doesn't need to be checked. Closes the rest of 33224.
2020-06-15Remove AssumeReachable from TestingTorNetwork.Nick Mathewson
Closes ticket 34446.
2020-06-09Merge remote-tracking branch 'tor-github/pr/1888/head'Nick Mathewson
2020-06-04doc: specify C99 coding standardsc
Make clear that Tor's C code targets C99 standards. This makes it more explicit what to expect for new code, because guessing from existing code is not always reliable, especially for code that predates the change in standard.
2020-06-01Merge branch 'maint-0.4.3'Nick Mathewson
2020-05-23Man page: MinUptimeHidServDirectoryV2 defaults to 96 hoursRoger Dingledine
Bugfix on 0.2.6.3-alpha; fixes bug 34299.
2020-05-21Merge branch 'tor-github/pr/1850'George Kadianakis
2020-05-11doc: Some tor features may not work with MiddleNodesteor
And fix a formatting issue in the MiddleNodes man page entry. Part of 33226.
2020-05-08Add documentation about %include and seccomp sandbox limitationsDaniel Pinto
2020-04-09client: Revert setting PreferIPv6 on by defaultDavid Goulet
This change broke torsocks that by default is expecting an IPv4 for hostname resolution because it can't ask tor for a specific IP version with the SOCKS5 extension. PreferIPv6 made it that sometimes the IPv6 could be returned to torsocks that was expecting an IPv4. Torsocks is probably a very unique case because the runtime flow is that it hijacks DNS resolution (ex: getaddrinfo()), gets an IP and then sends it back for the connect() to happen. The libc has DNS resolution functions that allows the caller to request a specific INET family but torsocks can't tell tor to resolve the hostname only to an IPv4 or IPv6 and thus by default fallsback to IPv4. Reverting this change into 0.4.3.x series but we'll keep it in the 0.4.4.x series in the hope that we add this SOCKS5 extension to tor for DNS resolution and then change torsocks to use that. Fixes #33804 Signed-off-by: David Goulet <dgoulet@torproject.org>