aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2024-10-10Merge branch 'empty-dns' into 'main'David Goulet
Handle empty DNS reply without error as NOERROR Closes #40248 See merge request tpo/core/tor!830
2024-09-24Fix unit test in test_entrynodes.cCecylia Bocovich
2024-09-24Handle empty DNS reply without error as NOERRORDaniel Winzen
2024-09-10Merge branch 'typo-socks-proxy' into 'main'David Goulet
Fix a typo in the HTTP proxy error message. See merge request tpo/core/tor!829
2024-09-10test: Add unit tests for prop351David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-09-10Fix a typo in the HTTP proxy error message.Pier Angelo Vendrame
2024-09-09Implement proposal 351Nick Mathewson
This proposal adds new syntax to the SOCKS5 username/password extension scheme, so that requests with usernames starting with <torS0X> are now reserved. For C tor, all we need to do is reject every username starting with <torS0X> unless it is exactly "<torS0X>0".
2024-08-05Merge branch 'maint-0.4.8'David Goulet
2024-08-05dirvote: Fix memleak when computing consensusDavid Goulet
Fixes #40966 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-26Do not publish TAP key when publish-dummy-tap-key is 0.Nick Mathewson
2024-06-26Update supported protovers for prop350Nick Mathewson
Relay=1 is no longer supported; it corresponds to TAP. Microdesc=3 and Desc=3 are now supported; they correspond to the ability to handle (micro)descriptors without TAP onion keys.
2024-06-26Add a test for parsing a routerdesc with no TAP key.Nick Mathewson
2024-06-26Add a test for a microdesc with no onion key.Nick Mathewson
2024-06-26Remove a now-unused variable.Nick Mathewson
2024-06-26process_descs: Authorities require TAP keys for now.Nick Mathewson
2024-06-26Routerparse: accept routerdescs without TAP keys.Nick Mathewson
2024-06-26routerparse: Simplify checking for now-mandatory elementsNick Mathewson
All of these elements are now mandatory, so we can now simplify our logic for making sure that they are all present or all not-present.
2024-06-26Rename "onion_pkey" fields in routerinfo_t, and make them optional.Nick Mathewson
(Renaming them has forced me to look at every place where they are used, so I can make sure that they are really optional now.)
2024-06-26Remove node_get_rsa_onion_keyNick Mathewson
2024-06-26Remove TAP key from extend_info_tNick Mathewson
2024-06-24Make onion-key body optional in microdescsNick Mathewson
Also, stop storing onion keys in microdesc_t. (In prop350, for microdescs, we are making the body optional; the "onion-key" entry is still mandatory, so that we can tell where microdescs begin.)
2024-06-24Remove support for deciding to use CREATE/EXTEND/TAP.Nick Mathewson
2024-06-24prop350: Remove all support for TAP, CREATE, and EXTEND.Nick Mathewson
2024-06-24prop350: Stop accepting CREATE and EXTEND.Nick Mathewson
2024-06-18Merge branch 'maint-0.4.8'David Goulet
2024-06-18bridge: Always put transport-info lineDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-18Clean-up Managed Proxy state in PT tests.Alexander Færøy
This patch makes sure we clean up our version and implementation fields in our Managed Proxy struct after each test run. This was detected by LeakSanitizer. See: tpo/core/tor#11101.
2024-06-18Add changes file for tpo/core/tor#11101.Alexander Færøy
2024-06-18Add implementation and version metadata to bridge extra-info.Alexander Færøy
This patch adds two new keys to bridges' extra-info document: "transport-version" and "transport-implementation". These two new values always appear together (if one is missing, the other one will be missing too) and is parsed from PT's STATUS TYPE=version messages. See: tpo/core/tor#11101.
2024-06-18Include "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.Alexander Færøy
2024-06-18Drop requirement for TRANSPORT being present in STATUS messages.Alexander Færøy
2024-06-18Add support for PT STATUS TYPE=version messages.Alexander Færøy
This patch adds support for handling the version status message. Once we receive such message, we add the given version string to the managed_proxy_t instance. Note this value can be NULL and the value can change throughout the lifetime of the PT as multiple status version messages are handled. See: tpo/core/tor#11101
2024-06-07fix sandbox for bandwidth authorityPeter Palfrader
2024-06-06Merge branch 'maint-0.4.8'David Goulet
2024-06-06fallbackdir: Update list generated on June 06, 2024Tor CI Release
2024-06-06Update geoip files to match ipfire location db, 2024/06/06.Tor CI Release
2024-05-30Merge branch 'ticket40689_048_01' into 'main'David Goulet
dirauth: Add new faravahar Closes #40689 See merge request tpo/core/tor!819
2024-05-30dirauth: Add new faravaharDavid Goulet
Brand new address, brand new keys, brand new day. Closes #40689 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-05-29fix a few comment typosRoger Dingledine
2024-04-30Merge branch 'maint-0.4.8'David Goulet
2024-04-30Fix typo in tor-relays list addresshiro
2024-04-29Merge branch 'maint-0.4.8'David Goulet
2024-04-18typos in commentsRoger Dingledine
2024-04-18typotrinity-1686a
2024-04-16circuit: Remove log_warn triggered by a proto violationDavid Goulet
Fixes #40932 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-16Merge branch 'count-log-bug' into 'main'David Goulet
also consider LD_BUG logs when counting bug reached Closes #40924 See merge request tpo/core/tor!805
2024-04-15Merge branch 'maint-0.4.8'David Goulet
2024-04-15Merge branch 'tor-gitlab/mr/808' into maint-0.4.8David Goulet
2024-04-15conflux: Don't process a closed circuit on get packaged windowDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15conflux: Avoid noting a cell was sent on a closed circuitDavid Goulet
It turns out that circuit_package_relay_cell() returns 0 in order to drop a cell but there is a code path, if the circuit queue is full, that also silently closes the circuit and returns 0. This lead to Conflux thinking a cell was sent but actually the cell was not and the circuit was closed leading to the hard assert. And so this function makes sure that circuit_package_relay_cell() and append_cell_to_circuit_queue() returns a value that indicate what happened with the cell and circuit so the caller can make an informed decision with it. This change makes it that we do NOT enter the Conflux subsystem if the cell is not queued on the circuit. Fixes #40921 Signed-off-by: David Goulet <dgoulet@torproject.org>