Richard Pospesel
c71f31dccc
Reworded OpenSSL bug 7712 detection warning to avoid OpenSSL 1.1.1b detection false positive.
2023-02-16 13:27:30 +00:00
Roger Dingledine
36612b9bf8
vote AuthDirMaxServersPerAddr in consensus params
...
Directory authorities now include their AuthDirMaxServersPerAddr
config option in the consensus parameter section of their vote. Now
external tools can better predict how they will behave.
In particular, the value should make its way to the
https://consensus-health.torproject.org/#consensusparams page.
Once enough dir auths vote this param, they should also compute a
consensus value for it in the consensus document. Nothing uses this
consensus value yet, but we could imagine having dir auths consult it
in the future.
Implements ticket 40753.
2023-02-13 13:54:29 -05:00
David Goulet
482ce87a8d
Merge branch 'maint-0.4.7'
2023-02-13 10:16:13 -05:00
Gabriela Moldovan
21b3397f9b
metrics: Decrement hs_intro_established_count on intro circuit close.
...
Closes #40751 .
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-02-10 20:31:36 +00:00
Gabriela Moldovan
c98d78c95c
Update find_service
documentation.
...
This updates the docs to stop suggesting `pk` can be NULL, as that doesn't seem
to be the case anymore (`tor_assert(pk)`).
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-02-10 15:27:43 +00:00
Nick Mathewson
43d3a41157
Extend blinding testvec with timeperiod test.
...
When I copied this to arti, I messed up and thought that the default
time period was 1440 seconds for some weird testing reason. That led
to confusion.
This commit adds a test case that time period 1440 is May 20, 1973:
now arti and c tor match!
2023-02-10 08:11:39 -05:00
Gabriela Moldovan
a9c7cd6b2c
Fix small typo in mainloop.c docs.
...
The docs should reference `tor_event_new()` rather than `tor_libevent_new()`.
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
2023-02-07 12:15:12 +00:00
Dimitris Apostolou
c1b940cebf
Fix typos
2023-02-05 00:36:37 +02:00
Roger Dingledine
a4d61c84e3
fix trivial typos
2023-01-30 16:23:24 -05:00
David Goulet
7770c5a2ae
Merge branch 'tor-gitlab/mr/686'
2023-01-27 08:47:46 -05:00
David Goulet
fc11b38f2a
Merge branch 'maint-0.4.7'
2023-01-26 13:11:22 -05:00
David Goulet
e390a7cdee
Merge branch 'tor-gitlab/mr/687' into maint-0.4.7
2023-01-26 13:11:18 -05:00
David Goulet
21109ba5d5
Merge branch 'maint-0.4.7'
2023-01-25 14:13:35 -05:00
David Goulet
7b87ecf7e2
Merge branch 'maint-0.4.5' into maint-0.4.7
2023-01-25 14:13:35 -05:00
Micah Elizabeth Scott
a1d3d201ae
compress_lzma: New enum values from liblzma 5.3.x
...
Add new liblzma enums (LZMA_SEEK_NEEDED and LZMA_RET_INTERNAL*)
conditional to the API version they arrived in. The first stable
version of liblzma this affects is 5.4.0
Fixes #40741
Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-01-25 14:13:31 -05:00
David Goulet
bff6d7a944
relay: Use the right max queue size value in log
...
Fixes #40745
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-25 14:10:20 -05:00
Nick Mathewson
a5d8c9fef7
Add a test vector for disaster SRV calculation.
2023-01-25 09:04:07 -05:00
Micah Elizabeth Scott
3d7e3af91e
compress_lzma: New enum values from liblzma 5.3.x
...
Add new liblzma enums (LZMA_SEEK_NEEDED and LZMA_RET_INTERNAL*)
conditional to the API version they arrived in. The first stable
version of liblzma this affects is 5.4.0
Fixes #40741
Signed-off-by: Micah Elizabeth Scott <beth@torproject.org>
2023-01-19 13:59:08 -05:00
Nick Mathewson
ee153db5a1
Add more test-vectors for key blinding.
...
These are verified-as-correct against the current C implementation;
adding them here gives us something to copy into Arti.
2023-01-19 12:54:33 -05:00
David Goulet
d02d2a4338
Fix compiler warnings about unused variables
...
Fixes #40743
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-19 11:18:02 -05:00
David Goulet
49f10c5130
Merge branch 'tor-gitlab/mr/683'
2023-01-19 10:10:14 -05:00
Nick Mathewson
5629a391c2
Add a test vector for crypto_mac_sha3
2023-01-19 09:09:09 -05:00
David Goulet
0221c88f10
doc: Add tpo website update to ReleasingTor.md
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-19 08:43:59 -05:00
David Goulet
ce5ec4d825
changelog: Update with latest releases
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-12 12:11:16 -05:00
David Goulet
a6a01c6b0d
Merge branch 'maint-0.4.7'
2023-01-12 12:09:42 -05:00
Tor CI Release
fa2face3b5
version: Bump version to 0.4.7.13-dev
2023-01-12 12:09:34 -05:00
David Goulet
348a394c00
Merge branch 'maint-0.4.5' into maint-0.4.7
2023-01-12 12:09:26 -05:00
Tor CI Release
40e39b1e65
version: Bump version to 0.4.5.16-dev
2023-01-12 12:09:10 -05:00
David Goulet
aa38ce6c38
Merge branch 'maint-0.4.7'
2023-01-12 11:15:59 -05:00
Tor CI Release
89d1db6ad9
version: Bump version to 0.4.7.13
2023-01-12 11:15:53 -05:00
David Goulet
7441fee3e7
Merge branch 'maint-0.4.5' into maint-0.4.7
2023-01-12 11:15:43 -05:00
Tor CI Release
5a085a8f0f
version: Bump version to 0.4.5.16
2023-01-12 11:15:23 -05:00
David Goulet
d9821bdea5
Merge branch 'maint-0.4.7'
2023-01-12 11:07:40 -05:00
David Goulet
64cebf4e1b
Merge branch 'maint-0.4.5' into maint-0.4.7
2023-01-12 11:07:39 -05:00
Tor CI Release
64c0a9fa74
fallbackdir: Update list generated on January 12, 2023
2023-01-12 11:07:33 -05:00
Tor CI Release
049d0818c6
Update geoip files to match ipfire location db, 2023/01/12.
2023-01-12 11:07:23 -05:00
David Goulet
610b791aa6
Merge branch 'maint-0.4.7'
2023-01-12 10:52:35 -05:00
David Goulet
0df4083299
Merge branch 'maint-0.4.5' into maint-0.4.7
2023-01-12 10:52:35 -05:00
David Goulet
7b83e336ec
Merge branch 'ticket40730_045_01' into maint-0.4.5
2023-01-12 10:52:31 -05:00
David Goulet
637213fce3
Merge branch 'maint-0.4.7'
2023-01-12 10:49:57 -05:00
David Goulet
f2e9ce72d6
dirauth: Reject 0.4.6.x series at the authority level
...
Closes #40664
Signed-off-by: David Goulet <dgoulet@torproject.org>
2023-01-12 09:07:52 -05:00
David Goulet
754dbcd6d3
Merge branch 'maint-0.4.7'
2023-01-11 13:14:45 -05:00
Mike Perry
c6ef04e0d0
Coverity CID 1518991: Tighter bounds on consensus param value.
...
This prevents sign extension overflow in cwnd_became_full().
2023-01-11 17:32:20 +00:00
David Goulet
b38630ca56
Merge branch 'maint-0.4.7'
2023-01-11 09:03:29 -05:00
David Goulet
b9c7825f0e
Merge branch 'maint-0.4.5' into maint-0.4.7
2023-01-11 09:03:29 -05:00
David Goulet
85547a9b5b
Merge branch 'tor-gitlab/mr/538' into maint-0.4.5
2023-01-11 09:03:26 -05:00
David Goulet
5d6e0b8e13
Merge branch 'maint-0.4.7'
2023-01-10 15:58:28 -05:00
Mike Perry
482cde5931
Do not reset our RTT in slow start.
...
If a circuit only sends a tiny amount of data such that its cwnd is not
full, it won't increase its cwnd above the minimum. Since slow start circuits
should never hit the minimum otherwise, we can just ignore them for RTT reset
to handle this.
2023-01-10 20:47:11 +00:00
David Goulet
33657037a1
Merge branch 'maint-0.4.7'
2023-01-10 11:57:11 -05:00
David Goulet
d6cf3ca5c1
Merge branch 'tor-gitlab/mr/678'
2023-01-10 11:57:07 -05:00