aboutsummaryrefslogtreecommitdiff
path: root/src/app
AgeCommit message (Collapse)Author
2022-02-04Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
2022-02-04fallbackdir: Update list generated on February 04, 2022Tor CI Release
2022-02-04fallbackdir: Update list generated on December 15, 2021Tor CI Release
2022-01-18Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
2022-01-18Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2022-01-18main: Update a dead URL in a log noticeDavid Goulet
Change https://www.torproject.org/download/download#warning to https://support.torproject.org/faq/staying-anonymous/ Closes #40544 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-12-16fallbackdir: Update list generated on December 15, 2021Tor CI Release
2021-10-21Merge branch 'maint-0.4.5' into maint-0.4.6David Goulet
2021-10-21Merge branch 'maint-0.3.5' into maint-0.4.5David Goulet
2021-10-21fallbackdir: Regenerate the list for October 2021David Goulet
Closes #40493 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-10-21Merge branch 'maint-0.4.5' into maint-0.4.6Alexander Færøy
2021-10-21Merge remote-tracking branch 'tor-gitlab/mr/338' into maint-0.4.5Alexander Færøy
2021-08-11Merge branch 'maint-0.4.5' into maint-0.4.6Alexander Færøy
2021-08-11Merge branch 'maint-0.3.5' into maint-0.4.5Alexander Færøy
2021-08-11fallbackdir: Regenerate listDavid Goulet
New list for all stable releases. Closes #40447 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-05-17Merge branch 'maint-0.4.5' into maint-0.4.6Nick Mathewson
2021-05-17Make SAVECONF keep only one backup and add sandbox rules for it. #40317Daniel Pinto
When seccomp sandbox is active, SAVECONF failed because it was not able to save the backup files for torrc. This commit simplifies the implementation of SAVECONF and sandbox by making it keep only one backup of the configuration file.
2021-05-11Make MinTimeToReportBandwidth a testing-only option (and rename it)Nick Mathewson
2021-04-19Merge branch 'mr_347_squashed' into maint-0.4.6Nick Mathewson
2021-04-19relay: Emit log warning if Address is internal and can't be usedDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-04-14Merge branch 'maint-0.4.5'David Goulet
2021-04-14Merge branch 'maint-0.4.4' into maint-0.4.5David Goulet
2021-04-14Merge branch 'maint-0.3.5' into maint-0.4.4David Goulet
2021-04-14fallbackdir: Remove two unspec linesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-04-13Merge branch 'maint-0.4.5'Nick Mathewson
2021-04-13Merge branch 'maint-0.4.4' into maint-0.4.5Nick Mathewson
2021-04-13Merge branch 'maint-0.3.5' into maint-0.4.4Nick Mathewson
2021-04-13fallbackdir: Renegerate list with 200 relaysDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-03-28Add long format name --torrc-file for command line option -f. #40324Daniel Pinto
2021-03-17Merge branch 'mr/334'George Kadianakis
2021-03-17Implement backbone of overload statistics.George Kadianakis
- Implement overload statistics structure. - Implement function that keeps track of overload statistics. - Implement function that writes overload statistics to descriptor. - Unittest for the whole logic.
2021-03-17Merge branch 'tor-gitlab/mr/337'David Goulet
2021-03-17Add a DormantTimeoutEnabled to disable dormant mode entirelyNick Mathewson
(If you need to do this in an older version you can just set DormantClientTimeout to something huge.) Closes #40228.
2021-03-17Add a MinTimeToReportBandwidth option; make it 0 for testing networks.Nick Mathewson
This option changes the time for which a bandwidth measurement period must have been in progress before we include it when reporting our observed bandwidth in our descriptors. Without this option, we only consider a time period towards our maximum if it has been running for a full day. Obviously, that's unacceptable for testing networks, where we'd like to get results as soon as possible. For non-testing networks, I've put a (somewhat arbitrary) 2-hour minimum on the option, since there are traffic analysis concerns with immediate reporting here. Closes #40337.
2021-03-12Run "make autostyle" in advance of new series.Nick Mathewson
2021-03-12Update copyrights to 2021, using "make update-copyright"Nick Mathewson
2021-02-23Merge branch 'maint-0.4.5'David Goulet
2021-02-23Merge branch 'tor-gitlab/mr/326' into maint-0.4.5David Goulet
2021-02-23Remove mallinfo() from codebaseDavid Goulet
Now deprecated in libc >= 2.33 Closes #40309 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-23Remove mallinfo() from codebaseDavid Goulet
Now deprecated in libc >= 2.33 Closes #40309 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-19man: Cleanup of v2 options and configDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-19hs-v2: Removal of service and relay supportDavid Goulet
This is unfortunately massive but both functionalities were extremely intertwined and it would have required us to actually change the HSv2 code in order to be able to split this into multiple commits. After this commit, there are still artefacts of v2 in the code but there is no more support for service, intro point and HSDir. The v2 support for rendezvous circuit is still available since that code is the same for the v3 and we will leave it in so if a client is able to rendezvous on v2 then it can still transfer traffic. Once the entire network has moved away from v2, we can remove v2 rendezvous point support. Related to #40266 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-19hs-v2: Remove client supportDavid Goulet
Related to #40266 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-12Merge branch 'maint-0.4.5'David Goulet
2021-02-12Merge branch 'tor-gitlab/mr/304' into maint-0.4.5David Goulet
2021-02-12Merge branch 'maint-0.4.5'David Goulet
2021-02-11config: Set flag for implicit port addressDavid Goulet
Fun bug where we thought we were using the default "false" value when an implicit address was detected but if we had an explicit address before, the flag was set to true and then we would only use that value. And thus, for some configurations, implicit addresses would be flagged as explicit and then configuring ports goes bad. Related to #40289 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-10relay: Allow RFC1918 addresses for non public relaysDavid Goulet
In other words, if PublishServerDescriptor is set to 0 and AssumeReachable to 1, then allow a relay to hold a RFC1918 address. Reasons for this are documented in #40208 Fixes #40208 Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-02-08Merge remote-tracking branch 'tor-gitlab/mr/278'Nick Mathewson
2021-02-08Merge branch 'bug40249_squashed'Nick Mathewson