aboutsummaryrefslogtreecommitdiff
path: root/src/app/config/config.c
AgeCommit message (Collapse)Author
2023-09-13Merge remote-tracking branch 'upstream/merge-requests/493' into ↵Alexander Færøy
ahf/android-gp-fixes-bulk
2023-09-13Merge remote-tracking branch 'upstream/merge-requests/460' into ↵Alexander Færøy
ahf/android-gp-fixes-bulk
2023-07-29add config ReevaluateExitPolicytrinity-1686a
2023-07-29reapply exit policy on reloadtrinity-1686a
2023-07-05trivial typo fix in commentRoger Dingledine
2023-05-28hs_pow: Add CompiledProofOfWorkHash torrc optionMicah Elizabeth Scott
This exposes the new fallback behavior in hashx via a new AUTOBOOL configuration option, available to both clients and services. The default should be fine for nearly everyone, but it might be necessary to enable or disable the compiler manually for diagnostic purposes. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-24Merge branch 'tor-gitlab/mr/709'David Goulet
2023-05-24Merge branch 'tor-gitlab/mr/708'David Goulet
2023-05-24ipv6: Flip ClientUseIPv6 to 1agowa338
Fixes #40785 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-11Add torrc option for conflux client UX.Mike Perry
2023-05-10hs_pow: Make proof-of-work support optional in configureMicah Elizabeth Scott
This adds a new "pow" module for the user-visible proof of work support in ./configure, and this disables src/feature/hs/hs_pow at compile-time. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10configure: Add --enable-gpl optionMicah Elizabeth Scott
This change on its own doesn't use the option for anything, but it includes support for configure and a message in 'tor --version' Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10hs_pow: Rate limited dequeueMicah Elizabeth Scott
This adds a token bucket ratelimiter on the dequeue side of hs_pow's priority queue. It adds config options and docs for those options. (HiddenServicePoWQueueRate/Burst) I'm testing this as a way to limit the overhead of circuit creation when we're experiencing a flood of rendezvous requests. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10hs: Setup service side PoW defensesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-04-06Prop#329 params: Consensus parameter and torrc handlingMike Perry
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-16Fix typosDimitris Apostolou
2022-11-09Merge branch 'maint-0.4.7'David Goulet
2022-11-09relay: Make MaxOnionQueueDelay into a consensus paramDavid Goulet
Part of #40704 Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-23Remove unused RendPostPeriod optionNeel Chauhan
2022-02-22Use path type hint for Vegas queue parameters.Mike Perry
These parameters will vary depending on path length, especially for onions.
2022-02-22Add hidden torrc option to always try CC negotiation.Mike Perry
This is for public network testing and for sbws. Should not otherwise be used, hence it is an undocumented __option. The option deliberately does not allow force-disabling congestion control, as this is bad for queueing and fairness.
2021-11-19On Android, get_data_directory() should not use LOCALSTATEDIRHans-Christoph Steiner
closes https://gitlab.torproject.org/tpo/core/tor/-/issues/40487
2021-10-21Implement a MiddleOnly flag for vote generation.Nick Mathewson
This proposal implements part of Prop335; it's based on a patch from Neel Chauhan. When configured to do so, authorities will assign a MiddleOnly flag to certain relays. Any relay which an authority gives this flag will not get Exit, V2Dir, Guard, or HSDir, and might get BadExit if the authority votes for that one.
2021-10-20do not use SHARE_DATADIR on AndroidHans-Christoph Steiner
There is no absolute install path that an app can expect data files on Android. Everything is expected to be a path inside of the app, and those paths depend on the Application ID of the app. /data/local/tmp is guaranteed to exist, but will only be usable by the 'shell' and 'root' users, so this fallback is for debugging only. This fixes a reproducible issue where the tor-android build harness ended up including build paths for SHARE_DATADIR. https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/460
2021-07-12Add a switch to toggle the feature on/offGeorge Kadianakis
2021-06-29Merge branch 'tor-gitlab/mr/275'David Goulet
2021-06-14Merge remote-tracking branch 'tor-gitlab/mr/338'Nick Mathewson
2021-05-11Make MinTimeToReportBandwidth a testing-only option (and rename it)Nick Mathewson
2021-04-23Merge branch 'tor-gitlab/mr/327'David Goulet
Conflicts: src/test/test.c Minor comment issue.
2021-04-07Make SAVECONF keep only one backup and add sandbox rules for it. #40317Daniel Pinto
When seccomp sandbox is active, SAVECONF failed because it was not able to save the backup files for torrc. This commit simplifies the implementation of SAVECONF and sandbox by making it keep only one backup of the configuration file.
2021-03-28Add long format name --torrc-file for command line option -f. #40324Daniel Pinto
2021-03-24Add an extra prop330 test, and clarifying comments.Nick Mathewson
This test makes sure that we reject "upload=" URLs with bad IP addresses. Also, add a warning when we can't parse the address.
2021-03-17Merge branch 'mr/334'George Kadianakis
2021-03-17Implement backbone of overload statistics.George Kadianakis
- Implement overload statistics structure. - Implement function that keeps track of overload statistics. - Implement function that writes overload statistics to descriptor. - Unittest for the whole logic.
2021-03-17Merge branch 'tor-gitlab/mr/337'David Goulet
2021-03-17Add a DormantTimeoutEnabled to disable dormant mode entirelyNick Mathewson
(If you need to do this in an older version you can just set DormantClientTimeout to something huge.) Closes #40228.
2021-03-17Add a MinTimeToReportBandwidth option; make it 0 for testing networks.Nick Mathewson
This option changes the time for which a bandwidth measurement period must have been in progress before we include it when reporting our observed bandwidth in our descriptors. Without this option, we only consider a time period towards our maximum if it has been running for a full day. Obviously, that's unacceptable for testing networks, where we'd like to get results as soon as possible. For non-testing networks, I've put a (somewhat arbitrary) 2-hour minimum on the option, since there are traffic analysis concerns with immediate reporting here. Closes #40337.
2021-03-12Run "make autostyle" in advance of new series.Nick Mathewson
2021-03-12Update copyrights to 2021, using "make update-copyright"Nick Mathewson
2021-02-24Allow extra dirport URLs to be configured for authorities.Nick Mathewson
2021-02-19man: Cleanup of v2 options and configDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-19hs-v2: Removal of service and relay supportDavid Goulet
This is unfortunately massive but both functionalities were extremely intertwined and it would have required us to actually change the HSv2 code in order to be able to split this into multiple commits. After this commit, there are still artefacts of v2 in the code but there is no more support for service, intro point and HSDir. The v2 support for rendezvous circuit is still available since that code is the same for the v3 and we will leave it in so if a client is able to rendezvous on v2 then it can still transfer traffic. Once the entire network has moved away from v2, we can remove v2 rendezvous point support. Related to #40266 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-19hs-v2: Remove client supportDavid Goulet
Related to #40266 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-12Merge branch 'maint-0.4.5'David Goulet
2021-02-11config: Set flag for implicit port addressDavid Goulet
Fun bug where we thought we were using the default "false" value when an implicit address was detected but if we had an explicit address before, the flag was set to true and then we would only use that value. And thus, for some configurations, implicit addresses would be flagged as explicit and then configuring ports goes bad. Related to #40289 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-08Merge remote-tracking branch 'tor-gitlab/mr/278'Nick Mathewson
2021-02-08Merge branch 'bug40249_squashed'Nick Mathewson
2021-02-08Add stream ID to ADDRMAP control eventNeel Chauhan
2021-01-27dos: Move config options within the subsystemDavid Goulet
Closes #40261 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-01-27Merge remote-tracking branch 'tor-gitlab/mr/248'George Kadianakis