summaryrefslogtreecommitdiff
path: root/scripts
AgeCommit message (Collapse)Author
2019-07-04Merge branch 'tor-github/pr/1152'George Kadianakis
2019-07-02Merge remote-tracking branch 'tor-github/pr/1136'Nick Mathewson
2019-06-28begin_cell_parse(): Add an assertion to please coverity.Nick Mathewson
Coverity doesn't understand that if begin_cell_parse() returns 0 and sets is_begindir to 0, its address field will always be set. Fixes bug 30126; bugfix on 0.2.4.7-alpha; Fixes CID 1447296.
2019-06-26Merge branch 'bug30721_squashed'Nick Mathewson
2019-06-26resolve: split sub-functions out of tor_addr_lookup()teor
And remove the practracker exception for tor_addr_lookup(). Cleanup after 30721.
2019-06-26Merge remote-tracking branch 'tor-github/pr/1119'Nick Mathewson
2019-06-25stats: add comments about the required chunk structure in extra info filesteor
These comments should prevent future instances of 30958. And allow a larger file in practracker. Follow up after 30958.
2019-06-24stats: Split extrainfo_dump_to_string() into smaller functions.teor
Closes ticket 30956.
2019-06-19Make the great grand practracker happy...David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-17Merge branch 'ticket29533_squashed'Nick Mathewson
2019-06-17Fix SC2034 in pre-push.git-hookrl1987
2019-06-17Merge remote-tracking branch 'tor-github/pr/1100'Nick Mathewson
2019-06-13practracker: accept an extra line in nt_service_install()teor
Part of 30799.
2019-06-12Merge branch 'tor-github/pr/1099'George Kadianakis
2019-06-11Merge branch 'tor-github/pr/1083'David Goulet
2019-06-11Merge branch 'maint-0.4.1'Nick Mathewson
2019-06-11Stop hard-coding env vars in the git scriptsteor
Set the env vars: * TOR_MASTER_NAME to override the tor master branch name, and * TOR_WKT_NAME to override the worktree path Fixes bug 30841; bugfix on 0.4.0.1-alpha.
2019-06-11scripts/git: Stop hard-coding the bash path in the git scriptsteor
Some OSes don't have bash in /usr/bin, others have an ancient bash at this path. Fixes bug 30840; bugfix on 0.4.0.1-alpha.
2019-06-10Add an environment variable to set GIT_PATH in git scriptsNick Mathewson
2019-06-10push-all: Use TOR_UPSTREAM_REMOTE_NAME to override UPSTREAM_BRANCHNick Mathewson
We already allow this override in our pre-push hook, so let's allow it here too. (I call my upstream branches "origin")
2019-06-10Update git scripts for new versionsNick Mathewson
{maint,release}-0.4.1 are now real {maint,release}-0.3.4 are now EOL Closes ticket 30822
2019-06-06practracker: accept one extra line in routerlist.cteor
practracker exception for 30780.
2019-06-06practracker: accept 3 extra lines in router_parse_entry_from_string()teor
practracker exception for bug 30781.
2019-06-05Regenerate practracker excpetions fileNick Mathewson
2019-06-05practracker updateNick Mathewson
2019-06-05Merge branch 'bug30286_2_squashed'Nick Mathewson
2019-06-05Document TOR_UPSTREAM_REMOTE_NAME env variablerl1987
2019-06-05Merge branch 'tor-github/pr/1072'George Kadianakis
2019-06-04update practrackerNick Mathewson
2019-05-31Practracker excpetions.Nick Mathewson
2019-05-29Merge branch 'tor-github/pr/1037'George Kadianakis
2019-05-28Merge branch 'tor-github/pr/1047'David Goulet
2019-05-27Make sure that we send at least some random data in RELAY_DATA cellsNick Mathewson
Proposal 289 prevents SENDME-flooding by requiring the other side to authenticate the data it has received. But this data won't actually be random if they are downloading a known resource. "No problem", we said, "let's fell the empty parts of our cells with some randomness!" and we did that in #26871. Unfortunately, if the relay data payloads are all completely full, there won't be any empty parts for us to randomize. Therefore, we now pick random "randomness windows" between CIRCWINDOW_INCREMENT/2 and CIRCWINDOW_INCREMENT. We remember whether we have sent a cell containing at least 16 bytes of randomness in that window. If we haven't, then when the window is exhausted, we send one. (This window approach is designed to lower the number of rng checks we have to do. The number 16 is pulled out of a hat to change the attacker's guessing difficulty to "impossible".) Implements 28646.
2019-05-23cov-test-determinism: use the same RNG seed as in travis.ymlNick Mathewson
We added this facility so that we could get deterministic PRNG behavior for coverage testing on tests that use a replaced PRNG. We need to have our coverage determinism tool test for this as well.
2019-05-22Merge branch 'ticket30428_041_02_squashed'Nick Mathewson
2019-05-22sendme: Properly record SENDMEs on both edgesDavid Goulet
Turns out that we were only recording the "b_digest" but to have bidirectionnal authenticated SENDMEs, we need to use the "f_digest" in the forward cell situation. Because of the cpath refactoring, this commit plays with the crypt_path_ and relay_crypto_t API a little bit in order to respect the abstractions. Previously, we would record the cell digest as the SENDME digest in the decrypt cell function but to avoid code duplication (both directions needs to record), we now do that right after iff the cell is recognized (at the edge). It is now done in circuit_receive_relay_cell() instead. We now also record the cell digest as the SENDME digest in both relay cell encryption functions since they are split depending on the direction. relay_encrypt_cell_outbound() and relay_encrypt_cell_inbound() need to consider recording the cell digest depending on their direction (f vs b digest). Fixes #30428 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-22sendme: Record cell digest on both client and exitDavid Goulet
It turns out that only the exit side is validating the authenticated SENDME v1 logic and never the client side. Which means that if a client ever uploaded data towards an exit, the authenticated SENDME logic wouldn't apply. For this to work, we have to record the cell digest client side as well which introduced a new function that supports both type of edges. This also removes a test that is not valid anymore which was that we didn't allow cell recording on an origin circuit (client). Part of #30428 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-20updateCopyright: look at the current year.Nick Mathewson
2019-05-20rectify_include_paths: warn instead of aborting on duplicate headersNick Mathewson
We have two sendme.h files at the moment; we should fix that, but not in this branch.
2019-05-16Yes, these functions really do have to be this long.Mike Perry
2019-05-15Merge branch 'tor-github/pr/1021'David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-15Merge branch 'bug28780-squashed3-rebased' into bug28780_rebaseGeorge Kadianakis
2019-05-15The practracker beatings will continue until the files get smaller.Mike Perry
2019-05-15Practracker beatings are even more fun when they get caused mid-PR due to a ↵Mike Perry
github auto-rebase of a PR Because github PRs choose the most recent origin/master at the time of the PR (and for any fixups pushed to a PR later to send to CI), there are tons of conflicts and unexpected practracker issues. This means CI can suddenly fail after fixups to a branch that pass locally. Then CI fails and we have to close and re-open the PR.
2019-05-14update practracker for tor_initNick Mathewson
2019-05-14Update practracker for 30452Nick Mathewson
2019-05-14Merge remote-tracking branch 'tor-github/pr/1004'Nick Mathewson
2019-05-13Merge branch 'bug28683_30173_29203_squashed'Nick Mathewson
2019-05-13The practracker beatings will continue until the functions get smaller.Mike Perry
2019-05-13Merge remote-tracking branch 'tor-github/pr/998'Nick Mathewson