summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2018-09-07test: HS v3 client authorization loading secret keySuphanat Chunhapanya
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07hs-v3: Load client authorization secret key from fileSuphanat Chunhapanya
The new ClientOnionAuthDir option is introduced which is where tor looks to find the HS v3 client authorization files containing the client private key material. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07test: HS v3 descriptor encoding with client authorizationSuphanat Chunhapanya
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07hs-v3: Encrypt the descriptor using a cookieSuphanat Chunhapanya
Previously, we encrypted the descriptor without the descriptor cookie. This commit, when the client auth is enabled, the descriptor cookie is always used. I also removed the code that is used to generate fake auth clients because it will not be used anymore. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07test: Build an HSv3 descriptor with authorized clientSuphanat Chunhapanya
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07test: HS v3 building a descriptor with client authSuphanat Chunhapanya
This commit tests that the descriptor building result, when the client authorization is enabled, includes everything that is needed. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07hs-v3: Generate all descriptor related keysSuphanat Chunhapanya
We need to generate all the related keys when building the descriptor, so that we can encrypt the descriptor. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07test: HS v3 loading client auth keys service sideSuphanat Chunhapanya
Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-09-07hs-v3: Load all client auth keys to the serviceSuphanat Chunhapanya
This commit loads all client public keys from every file in `authorized_clients/` directory. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-29Merge branch 'ticket27246_035_01_squashed'Nick Mathewson
2018-08-29Expand the comments on ASN.1-encoded TAP keysNick Mathewson
2018-08-29router: Keep RSA onion public key in ASN.1 formatDavid Goulet
The OpenSSL "RSA" object is currently 408 bytes compares to the ASN.1 encoding which is 140 for a 1024 RSA key. We save 268 bytes per descriptor (routerinfo_t) *and* microdescriptor (microdesc_t). Scaling this to 6000 relays, and considering client usually only have microdescriptors, we save 1.608 MB of RAM which is considerable for mobile client. This commit makes it that we keep the RSA onion public key (used for TAP handshake) in ASN.1 format instead of an OpenSSL RSA object. Changes is done in both routerinfo_t and microdesc_t. Closes #27246 Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28Merge remote-tracking branch 'onionk/prototest1'Nick Mathewson
2018-08-28make a comment more rightRoger Dingledine
(from #20874 fix)
2018-08-28Merge remote-tracking branch 'onionk/connection-comments1'Nick Mathewson
2018-08-28Merge branch 'bug26367_035_01'Nick Mathewson
2018-08-28hs: Remove rend_client_non_anonymous_mode_enabledDavid Goulet
The removal of Tor2Web made this function useless. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28hs: Remove rend_client_allow_non_anonymous_connectionDavid Goulet
By removing Tor2Web, there is no way a client can be non anonymous so we remove that function and the callsites. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28circ: Remove useless param from cannibalization functionDavid Goulet
Because we just removed Tor2web support, the need_specific_rp is not needed anymore when cannibalizing a circuit. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28hs: Render obsolete Tor2webDavid Goulet
Remove support for Tor2web in the code and build system. At this commit, tor doesn't have Tor2web support anymore. Ref: https://lists.torproject.org/pipermail/tor-dev/2018-July/013295.html Close #26367 Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28Fix log.c comments about assert vs tor_assert vs raw_assert.Nick Mathewson
2018-08-28Merge remote-tracking branch 'tor-github/pr/245'Nick Mathewson
2018-08-28Merge branch 'bug26896_034'Nick Mathewson
2018-08-28fixup! hs: Learn service version by trying to load the keysDavid Goulet
2018-08-27Merge branch 'maint-0.3.4'Nick Mathewson
2018-08-27Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson
2018-08-27Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-08-27When running make test-network-all, use the mixed+hs-v2 networkteor
No behaviour change. A previous fix to chutney removed v3 onion services from the mixed+hs-v23 network, so seeing "mixed+hs-v23" in tests is confusing. Fixes bug 27345; bugfix on 0.3.2.1-alpha.
2018-08-27core/mainloop: more comments documenting connection.ccypherpunks
2018-08-27core/mainloop: fix documentation of connection_handle_write_impl()cypherpunks
Inaccurate since ​d9746bd468f551d1ada57d962b20eddd15256ce9.
2018-08-24Update to 0.3.4.7-rc-devNick Mathewson
2018-08-24Fix a compilation warning on i386 with clangNick Mathewson
2018-08-24Merge remote-tracking branch 'tor-github/pr/289'Nick Mathewson
2018-08-24Merge remote-tracking branch 'teor/bug27237'Nick Mathewson
2018-08-24Merge branch 'maint-0.3.4'Nick Mathewson
2018-08-24Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson
2018-08-24Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-08-24Merge branch 'ticket27286_032_v2' into maint-0.3.2Nick Mathewson
2018-08-24Update the protocol versions recommendations to remove LinkAuth=1Nick Mathewson
LinkAuth method 1 is the one where we pull the TLS master secrets out of the OpenSSL data structures and authenticate them with RSA. Right now we list method 1 as required for clients and relays. That's a problem, since we can't reasonably support it with NSS. So let's remove it as a requirement and a recommendation. As for method 3: I'd like to recommend it it, but that would make 0.2.9 start warning. Let's not do that till at least some time after 0.3.5 (the next LTS) is stable. Closes ticket 27286
2018-08-24Merge branch 'maint-0.3.4'Nick Mathewson
2018-08-24Bootstrap: add some extra loggingteor
Diagnostics for 27236.
2018-08-24Bootstrap: allow internal-only onion service networks to bootstrapteor
This fix requires chutney's 27230 fix to bridge client bootstrap. Part of 27236.
2018-08-24Bump to 0.3.4.7-rcNick Mathewson
2018-08-24Merge branch 'maint-0.3.4'Nick Mathewson
2018-08-24Bootstrap: try harder to get descriptors in non-exit test networksteor
Use the mid weight for the third hop when there are no exits. Fixes bug 27237; bugfix on 0.2.6.2-alpha.
2018-08-24Bootstrap: stop requiring descriptors to count exits as usableteor
Instead, count exits as usable if they have the exit flag, and present if they also have a non-reject exit policy. Requiring a threshold of usable descriptors avoids directories trickling exit descriptors to clients to discover their ExitNodes settings. Part of 27236.
2018-08-23Merge branch 'maint-0.3.4'Nick Mathewson
2018-08-23Merge branch 'maint-0.3.2' into maint-0.3.3Nick Mathewson
2018-08-23Merge branch 'maint-0.2.9' into maint-0.3.2Nick Mathewson
2018-08-23Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson