aboutsummaryrefslogtreecommitdiff
path: root/src/app
AgeCommit message (Collapse)Author
4 daysMerge branch 'maint-0.4.8'David Goulet
4 daysfallbackdir: Update list generated on June 06, 2024Tor CI Release
11 daysMerge branch 'ticket40689_048_01' into 'main'David Goulet
dirauth: Add new faravahar Closes #40689 See merge request tpo/core/tor!819
11 daysdirauth: Add new faravaharDavid Goulet
Brand new address, brand new keys, brand new day. Closes #40689 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-10Merge branch 'maint-0.4.8'David Goulet
2024-04-10fallbackdir: Update list generated on April 10, 2024Tor CI Release
2024-04-09Merge branch 'maint-0.4.8'David Goulet
2024-04-08dirauth: New keys and address for tor26David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-12-08Merge branch 'maint-0.4.8'David Goulet
2023-12-08fallbackdir: Update list generated on December 08, 2023Tor CI Release
2023-11-09Merge branch 'maint-0.4.8'David Goulet
2023-11-09fallbackdir: Update list generated on November 09, 2023Tor CI Release
2023-11-03Merge branch 'maint-0.4.8'David Goulet
2023-11-03fallbackdir: Update list generated on November 03, 2023Tor CI Release
2023-10-18Merge branch 'ticket40870_048_02' into 'main'David Goulet
conflux: Flag set as in full teardown in the free path Closes #40870 See merge request tpo/core/tor!777
2023-10-16conflux: Flag set as in full teardown in the free pathDavid Goulet
We suspect a shutdown race of some sort for which the full teardown is not noticed during the close but should be during the free. For that, we flag the conflux set as in full teardown (if so) in the free path in case the close path didn't caught it. Fixes #40870 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-09-25Merge branch 'maint-0.4.8'David Goulet
2023-09-25fallbackdir: Update list generated on September 25, 2023Tor CI Release
2023-09-18Merge branch 'maint-0.4.8'David Goulet
2023-09-18Merge branch 'maint-0.4.7' into maint-0.4.8David Goulet
2023-09-18fallbackdir: Update list generated on September 18, 2023Tor CI Release
2023-09-18Match fallbackdir with maint-0.4.8 for releaseDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-09-13Merge remote-tracking branch 'upstream/merge-requests/493' into ↵Alexander Færøy
ahf/android-gp-fixes-bulk
2023-09-13Merge remote-tracking branch 'upstream/merge-requests/460' into ↵Alexander Færøy
ahf/android-gp-fixes-bulk
2023-08-30Merge branch 'maint-0.4.8'David Goulet
2023-08-30fallbackdir: Update list generated on August 30, 2023Tor CI Release
2023-08-25Merge branch 'reapply-exit-policy-on-reload' into 'main'David Goulet
reapply exit policy on reload Closes #40676 See merge request tpo/core/tor!735
2023-08-23fallbackdir: Update list generated on August 23, 2023Tor CI Release
2023-08-04fallbackdir: Update list generated on August 04, 2023Tor CI Release
2023-07-29add config ReevaluateExitPolicytrinity-1686a
2023-07-29reapply exit policy on reloadtrinity-1686a
2023-07-26Merge branch 'maint-0.4.7'David Goulet
2023-07-26fallbackdir: Update list generated on July 26, 2023Tor CI Release
2023-07-26fallback: Take file from main for our release CIDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-07-12fallbackdir: Update list generated on July 12, 2023Tor CI Release
2023-07-05trivial typo fix in commentRoger Dingledine
2023-06-01fallbackdir: Update list generated on June 01, 2023Tor CI Release
2023-05-28hs_pow: Add CompiledProofOfWorkHash torrc optionMicah Elizabeth Scott
This exposes the new fallback behavior in hashx via a new AUTOBOOL configuration option, available to both clients and services. The default should be fine for nearly everyone, but it might be necessary to enable or disable the compiler manually for diagnostic purposes. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-24Merge branch 'tor-gitlab/mr/709'David Goulet
2023-05-24Merge branch 'tor-gitlab/mr/708'David Goulet
2023-05-24ipv6: Flip ClientUseIPv6 to 1agowa338
Fixes #40785 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-11Add torrc option for conflux client UX.Mike Perry
2023-05-10hs_pow: Replace libb2 dependency with hashx's internal blake2Micah Elizabeth Scott
This forgoes another external library dependency, and instead introduces a compatibility header so that interested parties (who already depend on equix, like hs_pow and unit tests) can use the implementation of blake2b included in hashx. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10hs_pow: Make proof-of-work support optional in configureMicah Elizabeth Scott
This adds a new "pow" module for the user-visible proof of work support in ./configure, and this disables src/feature/hs/hs_pow at compile-time. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10configure: Add --enable-gpl optionMicah Elizabeth Scott
This change on its own doesn't use the option for anything, but it includes support for configure and a message in 'tor --version' Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10hs_pow: Rate limited dequeueMicah Elizabeth Scott
This adds a token bucket ratelimiter on the dequeue side of hs_pow's priority queue. It adds config options and docs for those options. (HiddenServicePoWQueueRate/Burst) I'm testing this as a way to limit the overhead of circuit creation when we're experiencing a flood of rendezvous requests. Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-05-10start the cpuworkers always, even for clientsRoger Dingledine
prepares the way for client-side pow cpuworkers also happens to resolve bug https://bugs.torproject.org/tpo/core/tor/40617 (which went into 0.4.7.4-alpha) because now we survive initing the cpuworker subsystem when we're not a relay.
2023-05-10hs: Setup service side PoW defensesDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-05-10hs: Add solve and verify PoW functionsDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-04-06Prop#329 Pool: Handle linking, unlinking, and relaunching conflux circuit legs.David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>