Age | Commit message (Collapse) | Author | |
---|---|---|---|
2024-06-18 | Add support for PT STATUS TYPE=version messages. | Alexander Færøy | |
This patch adds support for handling the version status message. Once we receive such message, we add the given version string to the managed_proxy_t instance. Note this value can be NULL and the value can change throughout the lifetime of the PT as multiple status version messages are handled. See: tpo/core/tor#11101 | |||
2024-06-06 | fallbackdir: Update list generated on June 06, 2024 | Tor CI Release | |
2024-06-06 | Update geoip files to match ipfire location db, 2024/06/06. | Tor CI Release | |
2024-05-30 | dirauth: Add new faravahar | David Goulet | |
Brand new address, brand new keys, brand new day. Closes #40689 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-04-30 | Fix typo in tor-relays list address | hiro | |
2024-04-16 | circuit: Remove log_warn triggered by a proto violation | David Goulet | |
Fixes #40932 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-04-15 | Merge branch 'tor-gitlab/mr/808' into maint-0.4.8 | David Goulet | |
2024-04-15 | conflux: Don't process a closed circuit on get packaged window | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-04-15 | conflux: Avoid noting a cell was sent on a closed circuit | David Goulet | |
It turns out that circuit_package_relay_cell() returns 0 in order to drop a cell but there is a code path, if the circuit queue is full, that also silently closes the circuit and returns 0. This lead to Conflux thinking a cell was sent but actually the cell was not and the circuit was closed leading to the hard assert. And so this function makes sure that circuit_package_relay_cell() and append_cell_to_circuit_queue() returns a value that indicate what happened with the cell and circuit so the caller can make an informed decision with it. This change makes it that we do NOT enter the Conflux subsystem if the cell is not queued on the circuit. Fixes #40921 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-04-10 | fallbackdir: Update list generated on April 10, 2024 | Tor CI Release | |
2024-04-10 | Update geoip files to match ipfire location db, 2024/04/10. | Tor CI Release | |
2024-04-08 | dirauth: New keys and address for tor26 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-02-01 | Update test strings | Sebastian Hahn | |
2024-02-01 | dirauth: Warn when failing to post during a vote | Sebastian Hahn | |
The only way to figure out that posting a vote or signatures to another dirauth failed is by counting how many success messages there are on notice level, and noticing that it is fewer than the number of configured dirauths. Closes #40910. | |||
2024-01-30 | dirauth: Reject 0.4.7.x series at the authority level | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2024-01-30 | bwauth: Allow "node_id" KeyValue without "$" | juga | |
Allow "node_id" KeyValue without the dollar sign at the start of the hexdigit in the BandwidthFiles, in order to easier database queries combining Tor documents in which the relays fingerprint doesn't include it. Bugfix on all supported versions of Tor. Closes #40891 | |||
2023-12-08 | fallbackdir: Update list generated on December 08, 2023 | Tor CI Release | |
2023-12-08 | Update geoip files to match ipfire location db, 2023/12/08. | Tor CI Release | |
2023-12-08 | Merge remote-tracking branch 'mikeperry-private/bug40897' into maint-0.4.8 | David Goulet | |
2023-12-07 | Merge remote-tracking branch 'origin/merge-requests/776' into maint-0.4.8 | Alexander Færøy | |
2023-12-07 | Bug 40897 Bug Bounty: Double the number of max conflux circs | Mike Perry | |
We strongly suspect that bug 40897 was caused by a custom Tor client that tried to use more than the default number of conflux circuits, for either performance or traffic analysis defense gains, or both. This entity hit a safety check on the exit side, which caused a UAF. Our "belt and suspenders" snapped off, and hit us in the face... again... Since there are good reasons to try more than 2 conflux legs, and research has found some traffic analysis benefits with as many as 5, we're going to raise and parameterize this limit as a form of bug bounty for finding this UAF, so that this entity can try out a little more confluxing. This should also make it easier for researchers to try things like gathering traces with larger amounts of confluxing than normal, to measure real-world traffic analysis impacts of conflux. Shine on, you yoloing anonymous diamond. Let us know if you find out anything interesting! | |||
2023-12-07 | Bug 40897: Add more checks to free paths | Mike Perry | |
Similar double-frees would be caught earlier by these, so long as the pointers remain nulled out. | |||
2023-12-07 | Bug 40897: Move safety check to proper location and give it error handling. | Mike Perry | |
2023-11-09 | fallbackdir: Update list generated on November 09, 2023 | Tor CI Release | |
2023-11-09 | Update geoip files to match ipfire location db, 2023/11/09. | Tor CI Release | |
2023-11-09 | Merge branch 'ticket40883_048_01' into maint-0.4.8 | David Goulet | |
2023-11-09 | Merge branch 'tor-gitlab/mr/778' into maint-0.4.8 | David Goulet | |
2023-11-08 | hs: Always check if the hs_ident is available when processing a cell | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-11-07 | hs: Fix assert in hs_metrics_update_by_ident() | David Goulet | |
The hs_metrics_failed_rdv() macro could pass a NULL value for the identity key when a building circuit would end up in a failure path *before* the "hs_ident" was able to be set which leading to this assert. This was introduced in 0.4.8.1-alpha with the addition of rendezvous circuit failure metrics for the MetricsPort. This fixes TROVE-2023-006 for which its severity is considered high. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-11-03 | Update geoip files to match ipfire location db, 2023/11/03. | Tor CI Release | |
2023-11-03 | fallbackdir: Update list generated on November 03, 2023 | Tor CI Release | |
2023-11-03 | Merge branch 'maint-0.4.7' into maint-0.4.8 | David Goulet | |
2023-11-03 | Fix TROVE-2023-004: Remote crash when compiled against OpenSSL | Alexander Færøy | |
Fixes #40874 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-11-01 | Bug 40876: Extra logging | Mike Perry | |
2023-11-01 | Bug 40876: Don't reduce primary list for temporary restrictions | Mike Perry | |
2023-10-30 | Bug 40878: Count a valid conflux linked cell as valid data | Mike Perry | |
For vanguards addon. | |||
2023-10-12 | fix bridge transport statistics | trinity-1686a | |
2023-10-11 | Fix the spelling of maxunmeasur(e)dbw. | Nick Mathewson | |
This has been misspelled when using consensus method 31 or later since 0.4.6.1-alpha. Fixes bug 40869. This commit is a backport of b9b0abd6c26d9b361923 to 0.4.8. | |||
2023-09-25 | fallbackdir: Update list generated on September 25, 2023 | Tor CI Release | |
2023-09-25 | Update geoip files to match ipfire location db, 2023/09/25. | Tor CI Release | |
2023-09-20 | Bug 40862: Check if circuits are unused more ways | Mike Perry | |
2023-09-18 | version: Bump version to 0.4.7.15-dev | Tor CI Release | |
2023-09-18 | version: Bump version to 0.4.7.15 | Tor CI Release | |
2023-09-18 | Merge branch 'maint-0.4.7' into maint-0.4.8 | David Goulet | |
2023-09-18 | fallbackdir: Update list generated on September 18, 2023 | Tor CI Release | |
2023-09-18 | Update geoip files to match ipfire location db, 2023/09/18. | Tor CI Release | |
2023-09-18 | Match fallbackdir with maint-0.4.8 for release | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-09-18 | geoip: Match maint-0.4.8 files for release | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-09-18 | Merge branch 'tor-gitlab/mr/759' into maint-0.4.8 | David Goulet | |
2023-09-18 | Merge branch 'tor-gitlab/mr/761' into maint-0.4.8 | David Goulet | |