summaryrefslogtreecommitdiff
path: root/src/feature/dirauth
AgeCommit message (Collapse)Author
2020-06-17Update the list of recommended protocol versions to match >=0.3.5.Nick Mathewson
Since Tor 0.2.9 has been unsupported since January, 0.3.5 is the oldest supported version, and its features constitute the oldest recommended feature-set. This patch updates these recommendations: DirCache=2 Support for consensus diffs. New in 0.3.1.1-alpha. HSDir=2 Support for v3 onion service descriptors. New in 0.3.0.4-alpha. HSIntro=4 Support for Ed25519 intropoint authentication keys. New in 0.3.0-4-alpha. HSRend=2 Support for rendezvous cells longer than 20 bytes. New in 0.2.9.4-alpha. Link=5 Link padding and link padding negotiation. New in 0.3.3.2-alpha. LinkAuth=3 Ed25519 link authentication. New in 0.3.0.1-alpha.
2020-06-17Spelling fix: "RECCOMEND" => "RECOMMEND".Nick Mathewson
2020-05-21Check for NULL from tor_dup_ip()rl1987
2020-05-21Bail out of format_networkstatus_vote if fmt_addr32() failed.rl1987
Something is fishy if we cannot put IP address string into dir-vote line.
2020-05-21Check that fmt_addr32() returned non-empty string before putting it into ↵rl1987
documents
2020-05-07Merge remote-tracking branch 'tor-github/pr/1880/head'Nick Mathewson
2020-05-06Merge branch 'maint-0.4.3'Nick Mathewson
2020-05-06Merge branch 'maint-0.4.2' into maint-0.4.3Nick Mathewson
2020-05-06Merge branch 'maint-0.4.1' into maint-0.4.2Nick Mathewson
2020-05-06Merge branch 'bug34078_prelim_035' into bug34078_prelim_041Nick Mathewson
2020-05-06Replace a "fall through" comment that was outside a switch.Nick Mathewson
2020-05-05config: New file resolve_addr.{c|h}David Goulet
Move a series of function from config.c into that new file which is related to address resolving. Part of #33789 Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-05-04Merge branch 'maint-0.4.3'Nick Mathewson
2020-05-04Merge branch 'maint-0.4.1' into maint-0.4.2Nick Mathewson
2020-04-30Merge branch 'bug34077_042' into bug34077_043Nick Mathewson
2020-04-30Merge branch 'bug34077_041' into bug34077_042Nick Mathewson
2020-04-30Fix a GCC 10.0.1 compilation warning.Nick Mathewson
Fixes 34077 for 0.4.1; bugfix on 0.4.0.3-alpha. (Specifically, GCC first gives this warning for 9eeff921ae7b786d960ea4286d5bba56)
2020-04-07Merge branch 'pr1838_squashed'teor
2020-03-27spell consensus more right in commentsRoger Dingledine
2020-03-26Add a SUBSYS_DECLARE_LOCATION() to every subsystem.Nick Mathewson
2020-03-20Merge branch 'maint-0.4.3'Nick Mathewson
2020-03-20relay/dirauth: Set some output arguments in stubsteor
And document how some functions set their output arguments. Fixes bug 33674; bugfix on 0.4.3.1-alpha.
2020-03-20Merge branch 'maint-0.4.3'teor
2020-03-20dirauth: Remove a duplicate macro definitionteor
Obviously correct changes to already-reviewed code.
2020-03-16Merge branch 'maint-0.4.3'Nick Mathewson
2020-03-16Merge branch 'ticket32672_042_squashed_w_test' into maint-0.4.3Nick Mathewson
2020-03-16Merge branch 'ticket32672_041_squashed' into ticket32672_042_squashed_w_testNick Mathewson
2020-03-16Reject 0.2.9 and 0.4.0 in dirserv_rejects_tor_version()Neel Chauhan
2020-03-05Merge branch 'clang_format_prep_3'Nick Mathewson
2020-03-03Comment updates from review.Nick Mathewson
2020-03-03Make voting_schedule.h work correctly when dirauth-mode is disabled.Nick Mathewson
2020-03-03Stop using all dirauth-only options in shared_random_client.cNick Mathewson
This is not as clean a patch as I would like: see the comment on ASSUME_AUTHORITY_SCHEDULING. This issue here is that the unit tests sometimes assume that we are going to be looking at the dirauth options and behaving like a dirauth, but without setting the options to turn is into one. This isn't an issue for actually running Tor, as far as I can tell with chutney.
2020-02-24Dirauth-specific function to get voting interval.Nick Mathewson
2020-02-24Extract most of dirauth_sched_get_next_valid_after_time()Nick Mathewson
Most of this function was about recreating a voting schedule on demand if it didn't exist yet or was not up-to-date. I've made that into its own function.
2020-02-24Rename voting_schedule_*() functions.Nick Mathewson
This is an automated commit, generated by this command: ./scripts/maint/rename_c_identifier.py \ voting_schedule_recalculate_timing dirauth_sched_recalculate_timing \ voting_schedule_get_start_of_next_interval voting_sched_get_start_of_interval_after \ voting_schedule_get_next_valid_after_time dirauth_sched_get_next_valid_after_time
2020-02-24Move one voting schedule fn into networkstatus.cNick Mathewson
The 'voting_schdule_get_start_of_next_interval' function isn't actually dirauth-specific.
2020-02-24Move voting_schedule.[ch] to src/feature/dirauth/Nick Mathewson
2020-02-20Merge branch 'maint-0.4.3'Nick Mathewson
2020-02-20Merge remote-tracking branch 'tor-github/pr/1719/head' into maint-0.4.3Nick Mathewson
2020-02-20dirvote: Improve the posted vote log messageteor
Cleanup after 4631.
2020-02-19dirvote: Remove an incorrect log messageteor
Cleanup after 4631.
2020-02-18dirauth: Update disabled dirvote_add_vote()teor
Update the function that handles directory authority votes when the dirauth module is disabled. Part of 4631.
2020-02-18dirauth: Refactor dirvote_add_vote()teor
Refactor dirvote_add_vote() by splitting some code out into static functions. Cleanup after 4631.
2020-02-18Don't accept posted votes after :52:30Roger Dingledine
If we receive via 'post' a vote from a dir auth after the fetch_missing_votes cutoff, that means we didn't get it by the time we begin the "fetching missing votes from everybody else" phase, which means it is very likely to cause a consensus split if we count it. Instead, we reject it. But we still allow votes that we fetch ourselves after that cutoff. This is a demo branch for making progress on #4631. I've been running it on moria1 and it catches and handles real buggy behavior from directory authorities, e.g. Jan 28 15:59:50.804 [warn] Rejecting vote from 199.58.81.140 received at 2020-01-28 20:59:50; our cutoff for received votes is 2020-01-28 20:52:30 Jan 28 15:59:50.805 [warn] Rejected vote from 199.58.81.140 ("Vote received too late, would be dangerous to count it"). Jan 29 01:52:52.667 [warn] Rejecting vote from 204.13.164.118 received at 2020-01-29 06:52:52; our cutoff for received votes is 2020-01-29 06:52:30 Jan 29 01:52:52.669 [warn] Rejected vote from 204.13.164.118 ("Vote received too late, would be dangerous to count it"). Jan 29 04:53:26.323 [warn] Rejecting vote from 204.13.164.118 received at 2020-01-29 09:53:26; our cutoff for received votes is 2020-01-29 09:52:30 Jan 29 04:53:26.326 [warn] Rejected vote from 204.13.164.118 ("Vote received too late, would be dangerous to count it").
2020-02-14Merge remote-tracking branch 'tor-github/pr/1727/head'Nick Mathewson
2020-02-14dirvote: Update the comments for required protocolsteor
Add doxygen comments to the new recommended and required subprotocol version strings. Add a warning to the required protocol documentation, because requiring the wrong protocols can break the tor network. Also reference proposal 303: When and how to remove support for protocol versions. Part of 33285.
2020-02-12Run "make autostyle".Nick Mathewson
2020-02-12dirvote: Reorder required protocol liststeor
Use a consistent order, because the current order is going to trip someone up eventually. Preparation for 33285.
2020-02-12dirvote: Move required protos into private headerteor
Move the recommended and required protocol version lists into the private section of the dirvote header, and turn them into macros. Preparation for 33285.
2020-02-11Merge branch 'ticket33029_042_01' into ticket33029_043_03David Goulet
Conflicts: doc/tor.1.txt src/app/config/config.c src/app/config/or_options_st.h src/core/mainloop/connection.h Between 042 and 043, the dirauth options were modularized so this merge commit address this by moving the AuthDirRejectUncompressedRequests to the module along with a series of accessors. Signed-off-by: David Goulet <dgoulet@torproject.org>