aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2024-04-30Merge branch 'maint-0.4.8'HEADmainDavid Goulet
2024-04-30Fix typo in tor-relays list addressmaint-0.4.8hiro
2024-04-29Merge branch 'maint-0.4.8'David Goulet
2024-04-18typos in commentsRoger Dingledine
2024-04-18typotrinity-1686a
2024-04-16circuit: Remove log_warn triggered by a proto violationDavid Goulet
Fixes #40932 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-16Merge branch 'count-log-bug' into 'main'David Goulet
also consider LD_BUG logs when counting bug reached Closes #40924 See merge request tpo/core/tor!805
2024-04-15Merge branch 'maint-0.4.8'David Goulet
2024-04-15Merge branch 'tor-gitlab/mr/808' into maint-0.4.8David Goulet
2024-04-15conflux: Don't process a closed circuit on get packaged windowDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15conflux: Avoid noting a cell was sent on a closed circuitDavid Goulet
It turns out that circuit_package_relay_cell() returns 0 in order to drop a cell but there is a code path, if the circuit queue is full, that also silently closes the circuit and returns 0. This lead to Conflux thinking a cell was sent but actually the cell was not and the circuit was closed leading to the hard assert. And so this function makes sure that circuit_package_relay_cell() and append_cell_to_circuit_queue() returns a value that indicate what happened with the cell and circuit so the caller can make an informed decision with it. This change makes it that we do NOT enter the Conflux subsystem if the cell is not queued on the circuit. Fixes #40921 Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-14rename metric bug_reached to bug_reached_counttrinity-1686a
2024-04-13also consider LD_BUG logs when counting bug reachedtrinity-1686a
2024-04-10Merge branch 'maint-0.4.8'David Goulet
2024-04-10fallbackdir: Update list generated on April 10, 2024Tor CI Release
2024-04-10Update geoip files to match ipfire location db, 2024/04/10.Tor CI Release
2024-04-09Merge branch 'maint-0.4.8'David Goulet
2024-04-08dirauth: New keys and address for tor26David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-03-20test: Disable unit test causing issue with nightly packageDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-03-14hs_service: don't force high intro point rotation for TestingTorNetworkJim Newsome
This was previously added to facilitate testing intro point rotation with chutney. However, the implementation is problematic since it forces excessive rotation whenever TestingTorNetwork is enabled, and can't be adjusted or disabled. Alternatives for testing intro point rotation include: * Using shadow to "fast forward" time * Overriding the consensus parameters hs_intro_min_lifetime and hs_intro_max_lifetime. Fixes #40922
2024-03-07In router_is_active, don't require non-zero bandwidthcapacityJim Newsome
This check was originally added in 962765a3, with the intent of preventing relays with 0 measured bandwidth from being listed in the consensus (part of fixing #13000). Currently, that decision and other relevant places effectively use `dirserv_get_credible_bandwidth_kb`, which prefers bwauth-measured bandwidth over the self-reported `bandwidthcapacity`, making this check mostly redundant. i.e. this change should only affect behavior when the relay has uploaded a descriptor with `bandwidthcapacity=0` *and* we have a non-zero measured bandwidth, in which case we'll still trust the measured bandwidth. This is what we want when bootstrapping a network (e.g. for testing), since it allows us to initialize bandwidths using a bandwidth authority file. A relay can still cause `router_is_active` to return false by setting the hibernate flag. Also see discussion in #40917. Fixes #40917.
2024-02-28Merge branch 'document-read-until-eof' into 'main'Alexander Færøy
make read_file_to_str_until_eof doc more explicit Closes #40852 See merge request tpo/core/tor!799
2024-02-28Merge branch 'maint-0.4.8'Alexander Færøy
2024-02-18make read_file_to_str_until_eof doc more explicittrinity-1686a
the sz_out param is set to what was read (i.e not including the final NULL the function adds for convenience), but could be understood to be set to what was read+1 (including the NULL terminator)
2024-02-08Merge branch 'bug40911' into 'main'David Goulet
Make two 1-bit fields unsigned Closes #40911 See merge request tpo/core/tor!796
2024-02-01Make two 1-bit fields unsignedSebastian Hahn
This should be a completely harmless warning as we only check whether the fields are true or false. Closes #40911.
2024-02-01Update test stringsSebastian Hahn
2024-02-01dirauth: Warn when failing to post during a voteSebastian Hahn
The only way to figure out that posting a vote or signatures to another dirauth failed is by counting how many success messages there are on notice level, and noticing that it is fewer than the number of configured dirauths. Closes #40910.
2024-01-30Merge branch 'tor-gitlab/mr/791'David Goulet
2024-01-30Merge branch 'ticket40816_049_01' into 'main'Alexander Færøy
metrics: Add new relay metrics to MetricsPort Closes #40816 See merge request tpo/core/tor!793
2024-01-30Merge branch 'maint-0.4.8'David Goulet
2024-01-30dirauth: Reject 0.4.7.x series at the authority levelDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-01-30bwauth: Allow "node_id" KeyValue without "$"juga
Allow "node_id" KeyValue without the dollar sign at the start of the hexdigit in the BandwidthFiles, in order to easier database queries combining Tor documents in which the relays fingerprint doesn't include it. Bugfix on all supported versions of Tor. Closes #40891
2024-01-30metrics: Add new relay metrics to MetricsPortDavid Goulet
This commit adds the total number of DROP cell seen, the total number of DESTROY cell received and the total number of protocol violation that lead to a circuit close. Closes #40816 Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-12-10dirauth: Reject 0.4.7.x series at the authority levelnonameformee
2023-12-08Merge branch 'maint-0.4.8'David Goulet
2023-12-08fallbackdir: Update list generated on December 08, 2023Tor CI Release
2023-12-08Update geoip files to match ipfire location db, 2023/12/08.Tor CI Release
2023-12-08Merge branch 'maint-0.4.8'David Goulet
2023-12-08Merge remote-tracking branch 'mikeperry-private/bug40897' into maint-0.4.8David Goulet
2023-12-07Merge branch 'maint-0.4.8'Alexander Færøy
2023-12-07Merge remote-tracking branch 'origin/merge-requests/776' into maint-0.4.8Alexander Færøy
2023-12-07Bug 40897 Bug Bounty: Double the number of max conflux circsMike Perry
We strongly suspect that bug 40897 was caused by a custom Tor client that tried to use more than the default number of conflux circuits, for either performance or traffic analysis defense gains, or both. This entity hit a safety check on the exit side, which caused a UAF. Our "belt and suspenders" snapped off, and hit us in the face... again... Since there are good reasons to try more than 2 conflux legs, and research has found some traffic analysis benefits with as many as 5, we're going to raise and parameterize this limit as a form of bug bounty for finding this UAF, so that this entity can try out a little more confluxing. This should also make it easier for researchers to try things like gathering traces with larger amounts of confluxing than normal, to measure real-world traffic analysis impacts of conflux. Shine on, you yoloing anonymous diamond. Let us know if you find out anything interesting!
2023-12-07Bug 40897: Add more checks to free pathsMike Perry
Similar double-frees would be caught earlier by these, so long as the pointers remain nulled out.
2023-12-07Bug 40897: Move safety check to proper location and give it error handling.Mike Perry
2023-11-22Merge branch 'fix-bridge-exit-warn' into 'main'David Goulet
Fix bridge exit warn Closes #40884 See merge request tpo/core/tor!783
2023-11-22Merge branch 'did-sanity-memmem' into 'main'David Goulet
add sanity check in tor_memmem Closes #40854 See merge request tpo/core/tor!785
2023-11-21Merge branch 'eol-config-no-spurious-warn' into 'main'Alexander Færøy
don't warn for empty RecommendedServerVersion Closes #40888 See merge request tpo/core/tor!787
2023-11-21bwauth: Allow "node_id" KeyValue without "$"juga
Allow "node_id" KeyValue without the dollar sign at the start of the hexdigit in the BandwidthFiles, in order to easier database queries combining Tor documents in which the relays fingerprint doesn't include it. Bugfix on all supported versions of Tor. Closes #40891
2023-11-16don't warn for empty RecommendedServerVersiontrinity-1686a