David Goulet
f39f8b30f4
Merge branch 'maint-0.4.7'
2022-11-09 15:35:58 -05:00
David Goulet
e2a94e050d
changes: Add file for ticket 40674
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 15:35:51 -05:00
David Goulet
560d44b08b
Merge branch 'maint-0.4.7'
2022-11-09 15:29:04 -05:00
David Goulet
e3f6908984
relay: Make the max pending tasks per CPU a consensus parameter
...
Until now, there was this magic number (64) used as the maximum number
of tasks a CPU worker can take at once.
This commit makes it a consensus parameter so our future selves can
think of a better value depending on network conditions.
Part of #40704
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 13:13:21 -05:00
David Goulet
9c8c7804d5
relay: Add the onion_queue_wait_cutoff consensus param
...
Transform the hardcoded value ONIONQUEUE_WAIT_CUTOFF into a consensus
parameter so we can control it network wide.
Closes #40704
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 11:57:32 -05:00
David Goulet
2adc73afdb
Merge branch 'maint-0.4.7'
2022-11-08 12:36:44 -05:00
David Goulet
fde87096c3
Merge branch 'tor-gitlab/mr/650' into maint-0.4.7
2022-11-08 12:36:19 -05:00
David Goulet
d634a5ebc7
relay: Remove unused conn->ext_or_conn_id
...
This also incidently removes a use of uninitialized stack data from the
connection_or_set_ext_or_identifier() function.
Fixes #40648
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-08 12:35:09 -05:00
David Goulet
f270d20cb0
changes: Add file for ticket 40708
...
Closes #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-07 09:55:06 -05:00
David Goulet
b04705305b
Merge branch 'tor-gitlab/mr/649'
2022-11-01 09:14:33 -04:00
David Goulet
15e5b203cd
Merge branch 'tor-gitlab/mr/594'
2022-11-01 09:11:29 -04:00
Alexander Færøy
75d12dffe7
Remove BUG()
in Windows process read callback.
...
This BUG() was added when the code was written to see if this callback
was ever executed after we marked the handle as EOF. It turns out, it
does, but we handle it gracefully. We can therefore remove the BUG().
Fixes tpo/core/tor#40596.
2022-11-01 11:11:20 +01:00
David Goulet
c733ccda99
Merge branch 'tor-gitlab/mr/579'
2022-10-31 15:28:36 -04:00
David Goulet
2a838c196d
Merge branch 'maint-0.4.7'
2022-10-31 15:00:15 -04:00
David Goulet
3596d193be
Merge branch 'tor-gitlab/mr/636'
2022-10-31 14:15:00 -04:00
David Goulet
619dd35321
sandbox: Add my-consensus-<flavor-name> to sandbox for dirauth
...
Fixese #40663
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-31 11:37:43 -04:00
David Goulet
65a85a9d23
Merge branch 'maint-0.4.7'
2022-10-31 11:21:21 -04:00
David Goulet
19b080f2aa
Merge branch 'tor-gitlab/mr/646'
2022-10-28 12:07:51 -04:00
David Goulet
5db238f3e3
thread: Bump max detectable CPU from 16 to 128
...
Lets take advantage of those beefy machines ;).
Closes #40703
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-28 11:28:43 -04:00
Jeremy Saklad
7e80ad4787
relay: Skip warnings for single onion services
...
Single onion services are not secret, so there is no added risk from
using accounting or running a relay in the same instance.
Related to #40691
2022-10-28 09:15:14 -05:00
Roger Dingledine
338185d840
resolve a BUG() on relays at startup
...
Remove a harmless "Bug" log message that can happen in
relay_addr_learn_from_dirauth() on relays during startup:
tor_bug_occurred_(): Bug: ../src/feature/relay/relay_find_addr.c:225: relay_addr_learn_from_dirauth: Non-fatal assertion !(!ei) failed. (on Tor 0.4.7.10 )
Bug: Tor 0.4.7.10: Non-fatal assertion !(!ei) failed in relay_addr_learn_from_dirauth at ../src/feature/relay/relay_find_addr.c:225. Stack trace: (on Tor 0.4.7.10 )
Finishes fixing bug 40231.
Fixes bug 40523; bugfix on 0.4.5.4-rc.
2022-10-27 20:07:48 -04:00
David Goulet
4481c1e609
Merge branch 'maint-0.4.7'
2022-10-27 11:42:10 -04:00
David Goulet
f09b913e18
Merge branch 'tor-gitlab/mr/645' into maint-0.4.7
2022-10-27 11:42:07 -04:00
David Goulet
0918cc2783
Merge branch 'maint-0.4.7'
2022-10-27 11:41:26 -04:00
Mike Perry
b30193416c
Changes file for 40683
2022-10-27 15:36:53 +00:00
David Goulet
504a6da5ab
changes: Update changes for ticket 40194
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 10:50:37 -04:00
David Goulet
dd272b6ef4
Merge remote-tracking branch 'tor-gitlab/mr/638'
2022-10-26 15:12:54 -04:00
David Goulet
609a82a595
changes: Ticket 40694
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 15:10:41 -04:00
David Goulet
fb21387882
Merge branch 'tor-gitlab/mr/637'
2022-10-26 15:07:42 -04:00
David Goulet
a7aa22a4e7
hs: Retry rdv circuit if repurposed
...
This can happen if our measurement subsystem decides to snatch it.
Fixes #40696
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 15:05:44 -04:00
David Goulet
ca135a127d
Merge branch 'maint-0.4.7'
2022-10-26 15:01:43 -04:00
David Goulet
0a49e04691
Merge branch 'tor-gitlab/mr/635' into maint-0.4.7
2022-10-26 15:01:40 -04:00
David Goulet
a2ee39452a
Merge branch 'tor-gitlab/mr/633'
2022-10-26 14:58:21 -04:00
David Goulet
59008c6f51
hs: Change the error for a collapsing client circuit
...
Change it to an "unreachable" error so the intro point can be retried
and not flagged as a failure and never retried again.
Closes #40692
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 14:56:45 -04:00
David Goulet
bb9f2ea8fb
Merge branch 'maint-0.4.7'
2022-10-26 14:21:41 -04:00
David Goulet
a317326aae
Merge branch 'maint-0.4.5' into maint-0.4.7
2022-10-26 14:21:41 -04:00
David Goulet
7a851e8983
Merge branch 'tor-gitlab/mr/631' into maint-0.4.5
2022-10-26 14:21:35 -04:00
David Goulet
efad436432
dirauth: Remove Faravahar
...
Closes #40688
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 14:20:07 -04:00
David Goulet
4a7824b9ae
Merge branch 'maint-0.4.7'
2022-10-26 14:12:51 -04:00
David Goulet
e19cf2dac6
Merge branch 'maint-0.4.5' into maint-0.4.7
2022-10-26 14:12:51 -04:00
David Goulet
b113b08722
Merge branch 'maint-0.4.7'
2022-10-26 14:07:49 -04:00
David Goulet
b20f72943e
Merge branch 'tor-gitlab/mr/629' into maint-0.4.7
2022-10-26 14:06:33 -04:00
David Goulet
a2c034d8f5
dos: Apply circuit creation defenses if circ max queue cell reached
...
This adds two consensus parameters to control the outbound max circuit
queue cell size limit and how many times it is allowed to reach that
limit for a single client IP.
Closes #40680
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 14:05:28 -04:00
Roger Dingledine
c56980f5e5
use consensus ip:port for dir auths if different
...
Directory authorities and relays now interact properly with directory
authorities if they change addresses. In the past, they would continue
to upload votes, signatures, descriptors, etc to the hard-coded address
in the configuration. Now, if the directory authority is listed in
the consensus at a different address, they will direct queries to this
new address.
Specifically, these three activities have changed:
* Posting a vote, a signature, or a relay descriptor to all the dir auths.
* Dir auths fetching missing votes or signatures from all the dir auths.
* Dir auths fetching new descriptors from a specific dir auth when they
just learned about them from that dir auth's vote.
We already do this desired behavior (prefer the address in the consensus,
but fall back to the hard-coded dirservers info if needed) when fetching
missing certs.
There is a fifth case, in router_pick_trusteddirserver(), where clients
and relays are trying to reach a random dir auth to fetch something. I
left that case alone for now because the interaction with fallbackdirs
is complicated.
Implements ticket 40705.
2022-10-25 04:19:37 -04:00
David Goulet
4ed67fe174
changes: Ticket 40694
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-24 11:14:50 -04:00
David Goulet
6300a9548d
hs: Retry rdv circuit if repurposed
...
This can happen if our measurement subsystem decides to snatch it.
Fixes #40696
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-24 11:03:38 -04:00
Roger Dingledine
bab8375ef5
dir auths now omit Measured= if rs->is_authority
...
Directory authorities stop voting a consensus "Measured" weight
for relays with the Authority flag. Now these relays will be
considered unmeasured, which should reserve their bandwidth
for their dir auth role and minimize distractions from other roles.
In place of the "Measured" weight, they now include a
"MeasuredButAuthority" weight (not used by anything) so the bandwidth
authority's opinion on this relay can be recorded for posterity.
Resolves ticket 40698.
2022-10-24 04:34:49 -04:00
Roger Dingledine
e6899dcdf4
fix typo in #40673 's changes file
2022-10-20 19:46:27 -04:00
David Goulet
8463111c9b
hs: Change the error for a collapsing client circuit
...
Change it to an "unreachable" error so the intro point can be retried
and not flagged as a failure and never retried again.
Closes #40692
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-19 14:41:48 -04:00
David Goulet
938070f5c4
dirauth: Change dizum IP address
...
Closes #40687
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-18 10:35:54 -04:00
David Goulet
e86833ade6
Merge branch 'maint-0.4.5' into maint-0.4.7
2022-10-14 09:12:23 -04:00
David Goulet
28413e7560
Merge branch 'maint-0.4.7'
2022-10-14 09:12:23 -04:00
Nick Mathewson
e531d4d1b9
Fix a completely wrong calculation in mach monotime_init_internal()
...
Bug 1: We were purporting to calculate milliseconds per tick, when we
*should* have been computing ticks per millisecond.
Bug 2: Instead of computing either one of those, we were _actually_
computing femtoseconds per tick.
These two bugs covered for one another on x86 hardware, where 1 tick
== 1 nanosecond. But on M1 OSX, 1 tick is about 41 nanoseconds,
causing surprising results.
Fixes bug 40684; bugfix on 0.3.3.1-alpha.
2022-10-13 13:40:10 -04:00
David Goulet
5080a4ff67
Merge branch 'maint-0.4.7'
2022-10-12 15:52:04 -04:00
David Goulet
d543db5ac0
relay: Add connection stats to MetricsPort
...
This adds the number of created and opened connections to the
MetricsPort for a relay for each connection type and direction.
Output looks like:
# HELP tor_relay_connections Connections metrics of this relay
# TYPE tor_relay_connections counter
tor_relay_connections{type="OR listener",direction="initiated",state="created"} 0
tor_relay_connections{type="OR listener",direction="received",state="created"} 0
tor_relay_connections{type="OR listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="OR listener",direction="received",state="opened"} 0
tor_relay_connections{type="OR",direction="initiated",state="created"} 5
tor_relay_connections{type="OR",direction="received",state="created"} 0
tor_relay_connections{type="OR",direction="initiated",state="opened"} 5
tor_relay_connections{type="OR",direction="received",state="opened"} 0
tor_relay_connections{type="Exit",direction="initiated",state="created"} 0
tor_relay_connections{type="Exit",direction="received",state="created"} 0
tor_relay_connections{type="Exit",direction="initiated",state="opened"} 0
tor_relay_connections{type="Exit",direction="received",state="opened"} 0
tor_relay_connections{type="Socks listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Socks listener",direction="received",state="created"} 0
tor_relay_connections{type="Socks listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Socks listener",direction="received",state="opened"} 0
tor_relay_connections{type="Socks",direction="initiated",state="created"} 0
tor_relay_connections{type="Socks",direction="received",state="created"} 0
tor_relay_connections{type="Socks",direction="initiated",state="opened"} 0
tor_relay_connections{type="Socks",direction="received",state="opened"} 0
tor_relay_connections{type="Directory listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Directory listener",direction="received",state="created"} 0
tor_relay_connections{type="Directory listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Directory listener",direction="received",state="opened"} 0
tor_relay_connections{type="Directory",direction="initiated",state="created"} 0
tor_relay_connections{type="Directory",direction="received",state="created"} 0
tor_relay_connections{type="Directory",direction="initiated",state="opened"} 0
tor_relay_connections{type="Directory",direction="received",state="opened"} 0
tor_relay_connections{type="Control listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Control listener",direction="received",state="created"} 0
tor_relay_connections{type="Control listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Control listener",direction="received",state="opened"} 0
tor_relay_connections{type="Control",direction="initiated",state="created"} 0
tor_relay_connections{type="Control",direction="received",state="created"} 0
tor_relay_connections{type="Control",direction="initiated",state="opened"} 0
tor_relay_connections{type="Control",direction="received",state="opened"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="created"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="opened"} 0
tor_relay_connections{type="Transparent natd listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Transparent natd listener",direction="received",state="created"} 0
tor_relay_connections{type="Transparent natd listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Transparent natd listener",direction="received",state="opened"} 0
tor_relay_connections{type="DNS listener",direction="initiated",state="created"} 0
tor_relay_connections{type="DNS listener",direction="received",state="created"} 0
tor_relay_connections{type="DNS listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="DNS listener",direction="received",state="opened"} 0
tor_relay_connections{type="Extended OR",direction="initiated",state="created"} 0
tor_relay_connections{type="Extended OR",direction="received",state="created"} 0
tor_relay_connections{type="Extended OR",direction="initiated",state="opened"} 0
tor_relay_connections{type="Extended OR",direction="received",state="opened"} 0
tor_relay_connections{type="Extended OR listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Extended OR listener",direction="received",state="created"} 0
tor_relay_connections{type="Extended OR listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Extended OR listener",direction="received",state="opened"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="created"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="received",state="created"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="HTTP tunnel listener",direction="received",state="opened"} 0
tor_relay_connections{type="Metrics listener",direction="initiated",state="created"} 0
tor_relay_connections{type="Metrics listener",direction="received",state="created"} 1
tor_relay_connections{type="Metrics listener",direction="initiated",state="opened"} 0
tor_relay_connections{type="Metrics listener",direction="received",state="opened"} 1
tor_relay_connections{type="Metrics",direction="initiated",state="created"} 0
tor_relay_connections{type="Metrics",direction="received",state="created"} 0
tor_relay_connections{type="Metrics",direction="initiated",state="opened"} 0
tor_relay_connections{type="Metrics",direction="received",state="opened"} 0
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-12 09:25:19 -04:00
David Goulet
4692cf8688
Merge branch 'maint-0.4.7'
2022-10-11 10:09:37 -04:00
Andy
d09414858e
Properly compute cell-drop overload fraction
...
Patch to address #40673 . An additional check has been added to
onion_pending_add() in order to ensure that we avoid counting create
cells from clients.
In the cpuworker.c assign_onionskin_to_cpuworker
method if total_pending_tasks >= max_pending_tasks
and channel_is_client(circ->p_chan) returns false then
rep_hist_note_circuit_handshake_dropped() will be called and
rep_hist_note_circuit_handshake_assigned() will not be called. This
causes relays to run into errors due to the fact that the number of
dropped packets exceeds the total number of assigned packets.
To avoid this situation a check has been added to
onion_pending_add() to ensure that these erroneous calls to
rep_hist_note_circuit_handshake_dropped() are not made.
See the #40673 ticket for the conversation with armadev about this issue.
2022-10-06 00:46:29 -04:00
David Goulet
0cc27ecfdc
Merge branch 'maint-0.4.7'
2022-08-12 09:56:54 -04:00
David Goulet
c4ff6a4f55
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-08-12 09:56:54 -04:00
David Goulet
8244eefcd3
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-08-12 09:56:54 -04:00
David Goulet
bb88086c72
geoip: Update geoip files with August 9th, 2022 database
...
Fixes #40658
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-12 09:56:50 -04:00
David Goulet
c142b59503
Merge branch 'maint-0.4.7'
2022-08-11 09:44:47 -04:00
David Goulet
9b4d3ed492
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-08-11 09:44:47 -04:00
David Goulet
c65d8b2aad
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-08-11 09:44:47 -04:00
Tor CI Release
65ffb97c2f
fallbackdir: Update list generated on August 11, 2022
2022-08-11 09:44:39 -04:00
Tor CI Release
f9acdd0630
Update geoip files to match ipfire location db, 2022/08/11.
2022-08-11 09:44:32 -04:00
David Goulet
c9232e8f3f
Merge branch 'maint-0.4.7'
2022-08-11 09:27:03 -04:00
Mike Perry
9fb52305ee
Add changes file for bug40642.
2022-08-11 09:26:51 -04:00
David Goulet
4d18f4aa9a
Merge branch 'maint-0.4.7'
2022-08-10 08:53:08 -04:00
Roger Dingledine
d48eaff86d
ignore families for L2 guard independence
...
mike is concerned that we would get too much exposure to adversaries,
if we enforce that none of our L2 guards can be in the same family.
this change set now essentially finishes the feature that commit a77727cdc
was attempting to add, but strips the "_and_family" part of that plan.
2022-08-09 16:39:26 -04:00
Roger Dingledine
7b1fffe0dd
make L2 vanguards actually independent
...
We had omitted some checks for whether our vanguards (second layer
guards from proposal 333) overlapped or came from the same family.
Now make sure to pick each of them to be independent.
Fixes bug 40639; bugfix on 0.4.7.1-alpha.
2022-08-09 14:47:11 -04:00
David Goulet
16664c0017
Merge branch 'maint-0.4.7'
2022-08-09 11:01:44 -04:00
David Goulet
8bf1a86ae1
dirauth: Make voting flag threshold tunable via torrc
...
Remove UPTIME_TO_GUARANTEE_STABLE, MTBF_TO_GUARANTEE_STABLE,
TIME_KNOWN_TO_GUARANTEE_FAMILIAR WFU_TO_GUARANTEE_GUARD and replace each
of them with a tunnable torrc option.
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-09 11:01:12 -04:00
David Goulet
681c15a32d
dirauth: Add a AuthDirVoteGuard to pin Guard flags
...
Related to #40652
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-04 13:32:56 -04:00
David Goulet
5cc6ab0c1e
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-08-02 16:14:02 -04:00
David Goulet
bf30943cb7
Merge branch 'maint-0.4.7'
2022-08-02 16:14:02 -04:00
David Goulet
eee35adf74
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-08-02 16:14:02 -04:00
David Goulet
10d755ead5
Merge branch 'tor-gitlab/mr/608' into maint-0.4.5
2022-08-02 16:13:58 -04:00
David Goulet
e69cf2340b
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-08-02 16:08:50 -04:00
David Goulet
4d3f42a6f2
Merge branch 'maint-0.4.7'
2022-08-02 16:08:50 -04:00
David Goulet
645eff49ac
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-08-02 16:08:50 -04:00
David Goulet
6fcae8e0d0
relay: Don't send DESTROY remote reason backward or forward
...
Fixes #40649
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-02 15:53:31 -04:00
David Goulet
f51c68729f
Merge branch 'maint-0.4.7'
2022-08-02 15:31:00 -04:00
Mike Perry
af5ef98d1b
Changes file for bug 40644.
2022-08-02 18:13:46 +00:00
David Goulet
0c984e0ec2
conn: Notify btrack subsys on normal OR conn close
...
Fixes #40604
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-08-01 10:58:40 -04:00
David Goulet
e618a7e445
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-07-27 11:33:19 -04:00
David Goulet
22cb4c23d0
Merge branch 'maint-0.4.7'
2022-07-27 11:33:19 -04:00
David Goulet
7654e12be8
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-07-27 11:33:19 -04:00
Nick Mathewson
8e7bd96362
Fix a check, make a netflow padding function more safe.
...
Previously, `channelpadding_get_netflow_inactive_timeout_ms` would
crash with an assertion failure if `low_timeout` was greater than
`high_timeout`. That wasn't possible in practice because of checks
in `channelpadding_update_padding_for_channel`, but it's better not
to have a function whose correctness is this tricky to prove.
Fixes #40645 . Bugfix on 0.3.1.1-alpha.
2022-07-27 09:16:50 -04:00
David Goulet
ce1675ef65
Merge branch 'tor-gitlab/mr/601'
2022-07-26 16:18:04 -04:00
David Goulet
5260b4ef34
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-07-26 16:16:04 -04:00
David Goulet
e98995bb08
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-07-26 16:16:04 -04:00
David Goulet
028f5fd6ea
Merge branch 'maint-0.4.7'
2022-07-26 16:16:04 -04:00
David Goulet
ed74c52158
cmux: Remove a log bug that is actually an acceptable race
...
Closes #40647
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-26 16:14:09 -04:00
David Goulet
8d8afc4efa
relay: Send DESTROY cell instead of TRUNCATED cell
...
Note that with this commit, TRUNCATED cells won't be used anymore that
is client and relays won't emit them.
Fixes #40623
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-26 14:01:21 -04:00
David Goulet
b7f9a24c08
relay: Remove unused conn->ext_or_conn_id
...
This also incidently removes a use of uninitialized stack data from the
connection_or_set_ext_or_identifier() function.
Fixes #40648
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-07-26 11:56:33 -04:00
Nick Mathewson
da52d7206a
Merge remote-tracking branch 'tor-gitlab/mr/598'
2022-07-21 15:21:59 -04:00
Nick Mathewson
3cee70e87d
Merge remote-tracking branch 'tor-gitlab/mr/592'
2022-07-21 15:19:28 -04:00
Nick Mathewson
0bd2065062
Merge remote-tracking branch 'tor-gitlab/mr/591'
2022-07-21 15:19:24 -04:00
Alex Xu (Hello71)
b1545b6d18
Changes file for #40630 (LibreSSL 3.5 compatibility)
2022-07-19 16:18:29 -04:00
David Goulet
331204e100
Revert "cmux: Don't pick a marked for close circuit as active"
...
This reverts commit 4f1298e418
.
2022-06-23 10:55:56 -04:00
David Goulet
4f1298e418
cmux: Don't pick a marked for close circuit as active
...
Fixes #25312
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-23 09:44:25 -04:00
Neel Chauhan
5d2dc2d403
Add changes file for ticket #40431
2022-06-23 09:09:01 -04:00
Nick Mathewson
0dc9561f21
Add a missing "not" to a message.
...
Closes #40619 .
Bugfix on 0.2.5.4-alpha.
2022-06-17 12:00:09 -04:00
Tor CI Release
edde188cf2
release: ChangeLog and ReleaseNotes for 0.4.7.8
2022-06-17 10:10:16 -04:00
Tor CI Release
9cab60183d
fallbackdir: Update list generated on June 17, 2022
2022-06-17 10:04:15 -04:00
Tor CI Release
223886c118
Update geoip files to match ipfire location db, 2022/06/17.
2022-06-17 10:04:06 -04:00
David Goulet
7fc474bd3f
Merge branch 'maint-0.4.7'
2022-06-17 09:13:31 -04:00
Mike Perry
5a25374209
Add changes file for bug40626
2022-06-17 09:03:13 -04:00
Nick Mathewson
0eb21427c9
Don't add redundant quotes with escaped() in log messages.
...
The escaped() function and its kin already wrap their output in
quotes: there's no reason to do so twice.
I am _NOT_ making a corresponding change in calls that make the same
mistake in controller-related functions, however, due to the risk of
a compatibility break. :(
Closes #22723 .
2022-06-16 14:35:38 -04:00
David Goulet
1d6470a2a8
Merge branch 'maint-0.4.7'
2022-06-15 12:25:46 -04:00
Mike Perry
254ca6717f
Changes file for Bug 40612
2022-06-15 14:43:52 +00:00
Mike Perry
2ce5142718
Changes file for Bug #40603 .
2022-06-15 14:14:03 +00:00
Alex Xu (Hello71)
b65ffa6f06
Enable IP_BIND_ADDRESS_NO_PORT if supported
2022-06-15 08:35:40 -04:00
Simon South
a187fde7f4
changes: Add file for tickets 40465, 40599
2022-06-13 09:09:54 -04:00
David Goulet
b733f9d6ac
Merge branch 'maint-0.4.7'
2022-06-02 16:11:04 -04:00
David Goulet
dc7902ed55
Merge branch 'tor-gitlab/mr/583' into maint-0.4.7
2022-06-02 16:09:56 -04:00
Mike Perry
89a273e7f7
Bug 40620: Changes file
2022-06-02 18:54:11 +00:00
Alex Xu (Hello71)
87b2ce6f84
Trigger OOS on bind failures ( fixes #40597 )
2022-05-21 21:30:06 -04:00
David Goulet
4f038d224f
Merge branch 'tor-gitlab/mr/489'
2022-05-16 08:51:00 -04:00
Alexander Færøy
4ba89c0ccc
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-05-09 14:37:26 +00:00
Alexander Færøy
5f2b75aafd
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-05-09 14:37:26 +00:00
Alexander Færøy
20112c13ac
Merge branch 'maint-0.4.7'
2022-05-09 14:37:26 +00:00
Alexander Færøy
c213c1b0d1
Add changes entry to tor!575.
...
See: tpo/core/tor#40601.
2022-05-09 14:35:42 +00:00
Nick Mathewson
853270a871
Merge remote-tracking branch 'tor-gitlab/mr/574'
2022-05-04 10:34:03 -04:00
Pierre Bourdon
42034ae9da
changes: add entry for MR !574
2022-05-04 08:00:10 +02:00
Nick Mathewson
8d5692a2f7
Changes file for mr 569
2022-05-03 10:05:04 -04:00
Tor CI Release
3ca370c8b1
release: ChangeLog and ReleaseNotes for 0.4.7.7
2022-04-27 10:00:27 -04:00
Tor CI Release
06ed65bd85
fallbackdir: Update list generated on April 27, 2022
2022-04-27 09:41:38 -04:00
Tor CI Release
2270648baa
Update geoip files to match ipfire location db, 2022/04/27.
2022-04-27 09:41:28 -04:00
Mike Perry
940e255fa8
Changes file for bug40598
2022-04-26 12:14:26 -04:00
David Goulet
32356a6076
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-04-14 09:37:46 -04:00
David Goulet
dc90226cc3
Merge branch 'tor-gitlab/mr/491' into maint-0.4.5
2022-04-14 09:37:43 -04:00
David Goulet
b33f69abb5
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-04-14 09:34:49 -04:00
David Goulet
9ac479ce1c
Merge branch 'tor-gitlab/mr/497' into maint-0.4.5
2022-04-14 09:34:46 -04:00
Tor CI Release
0d90b0e5d1
release: ChangeLog and ReleaseNotes for 0.4.7.6-rc
2022-04-07 09:04:39 -04:00
Tor CI Release
133c64075b
fallbackdir: Update list generated on April 07, 2022
2022-04-07 09:00:46 -04:00
Tor CI Release
28193dbf9d
Update geoip files to match ipfire location db, 2022/04/07.
2022-04-07 09:00:42 -04:00
David Goulet
62fb184979
Merge branch 'maint-0.4.6'
2022-03-28 09:45:16 -04:00
David Goulet
d14af825ce
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-03-28 09:45:16 -04:00
David Goulet
b882b8d5d4
Merge branch 'tor-gitlab/mr/556' into maint-0.4.5
2022-03-28 09:44:31 -04:00
Nick Mathewson
de3872656a
Sandbox: Permit the clone3 system call
...
Apparently glibc-2.34 uses clone3, when previously it just used
clone.
Closes ticket #40590 .
2022-03-27 18:34:25 -04:00
Tor CI Release
9fdf02f1eb
release: ChangeLog and ReleaseNotes for 0.4.7.5-alpha
2022-03-25 09:19:07 -04:00
Tor CI Release
9e5676031d
fallbackdir: Update list generated on March 25, 2022
2022-03-25 09:11:19 -04:00
Tor CI Release
aaac633eb0
Update geoip files to match ipfire location db, 2022/03/25.
2022-03-25 09:10:16 -04:00
Nick Mathewson
8fcdc4c63f
Light editing to changes entries for 0.4.7.5-alpha
2022-03-24 11:41:20 -04:00
David Goulet
dd63e8cf9d
hs: Transfer ccontrol from circuit to cpath
...
Once the cpath is finalized, e2e encryption setup, transfer the ccontrol
from the rendezvous circuit to the cpath.
This allows the congestion control subsystem to properly function for
both upload and download side of onion services.
Closes #40586
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-16 14:03:27 -04:00
David Goulet
347eaa32bf
relay: Lower DNS Exit-side timeout
...
Introduces two new consensus parameter:
exit_dns_timeout: Number of seconds before libevent should consider
the DNS request a timeout.
exit_dns_num_attempts: Number of attempts that libeven should retry a
previously failing query before calling it a timeout.
Closes #40312
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-15 15:26:19 -04:00
David Goulet
17a8b3c735
Merge branch 'tor-gitlab/mr/547'
2022-03-15 15:16:30 -04:00
David Goulet
9841e7173d
changes: Add changes file for ticket 40560
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-15 13:54:05 -04:00
David Goulet
1760a12f83
dns: Wake up a dormant tor with a DNSPort request
...
Fixes #40577
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-15 12:12:57 -04:00
David Goulet
1934e24469
Merge branch 'tor-gitlab/mr/546'
2022-03-14 15:17:05 -04:00
Mike Perry
9f0b0afa2e
Changes file for #40568
2022-03-14 15:16:26 -04:00
David Goulet
df6625300d
Merge branch 'tor-gitlab/mr/543'
2022-03-11 09:29:41 -05:00
David Goulet
be80383a7c
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-03-10 09:18:57 -05:00
David Goulet
c076ac787f
Merge branch 'maint-0.4.6'
2022-03-10 09:18:57 -05:00
David Goulet
254b23ab9d
hs: Schedule mainloop event on dirinfo change
...
Due to a possible Guard subsystem recursion, when the HS client gets
notified that the directory information has changed, it must run it in a
seperate mainloop event to avoid such issue.
See the ticket for more information on the recursion. This also fixes a
fatal assert.
Fixes #40579
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-10 08:58:26 -05:00
David Goulet
069b278601
hs: Don't BUG() when setting up RP congestion control
...
It is possible to not have the descriptor anymore by the time the
rendezvous circuit opens. Don't BUG() on that.
Instead, when sending the INTRODUCE1 cell, make sure the descriptor we
have (or have just fetched) matches what we setup in the rendezvous
circuit.
If not, the circuit is closed and another one is opened for a retry.
Fixes #40576
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-09 12:15:12 -05:00
David Goulet
472c7127c7
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-03-09 08:46:55 -05:00
David Goulet
9efb04bb3e
hs: Fix multiple port label on single metric
...
Prometheus needs unique labels and so this bug was causing an onion
service with multiple ports to have multiple "port=" label for the
metrics requiring a port label.
Fixes #40581
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-08 13:56:54 -05:00
David Goulet
f4aa985cf7
hs: Fix multiple port label on single metric
...
Prometheus needs unique labels and so this bug was causing an onion
service with multiple ports to have multiple "port=" label for the
metrics requiring a port label.
Fixes #40581
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-03-08 13:50:34 -05:00
Nick Mathewson
ecbab95998
Add a changes file for 40563.
2022-03-02 09:38:45 -05:00
Tor CI Release
a6b948d1cc
release: ChangeLog and ReleaseNotes for 0.4.7.4-alpha
2022-02-25 09:20:59 -05:00
Tor CI Release
211e093761
fallbackdir: Update list generated on February 25, 2022
2022-02-25 09:12:27 -05:00
Tor CI Release
a424f6c7bf
Update geoip files to match ipfire location db, 2022/02/25.
2022-02-25 09:11:55 -05:00
David Goulet
45416356ed
Merge branch 'tor-gitlab/mr/488'
2022-02-23 15:21:40 -05:00
Mike Perry
933e4b4788
Add changes file
2022-02-22 19:28:35 +00:00
David Goulet
d057f45c6c
Merge branch 'tor-gitlab/mr/531'
2022-02-16 13:59:37 -05:00
David Goulet
7eb5437878
dirauth: Reject EOL 0.3.5.x relays
...
Closes #40559
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-16 13:59:30 -05:00
David Goulet
ea48ddc955
dns: Do not trigger overload general on DNS timeout
...
This was missed in #40527 when the DNS timeout overload general signal
was removed.
Closes #40564
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-14 13:20:53 -05:00
David Goulet
763d72238d
kist: Don't try to flush empty outbuf
...
It is possible that a scheduled channel ended up with 0 bytes in its
outbuf after the scheduling loop and having an outbuf table entry
indicating that we need to flush bytes on the wire after the loop.
This lead to attempt to write 0 bytes up to the TLS layer that would
prevent such action.
All in all, this fixes wasted CPU cycles on attempting to flush nothing.
Fixes #40548
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-08 09:31:17 -05:00
Nick Mathewson
9e86491cf8
Add a changes file for exit notice redesign (40529)
2022-02-07 11:37:50 -05:00
David Goulet
d0d45a97d8
Merge branch 'maint-0.4.6'
2022-02-04 11:07:34 -05:00
David Goulet
728191fc2e
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-02-04 11:07:34 -05:00
Tor CI Release
6a6332a683
fallbackdir: Update list generated on February 04, 2022
2022-02-04 11:05:21 -05:00
Tor CI Release
5ab4fa9fd8
Update geoip files to match ipfire location db, 2022/02/04.
2022-02-04 11:05:13 -05:00
Tor CI Release
cfe022d01d
Update geoip files to match ipfire location db, 2021/12/15.
2022-02-04 10:56:29 -05:00
Tor CI Release
f03cab5dbb
fallbackdir: Update list generated on December 15, 2021
2022-02-04 10:17:10 -05:00
David Goulet
d6f643e4dd
changes: Remove uneeded file due to empty merge forward
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-03 08:31:49 -05:00
David Goulet
6b06803e0d
Merge branch 'maint-0.4.6'
2022-02-03 08:30:59 -05:00
David Goulet
a08b12568e
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-02-03 08:30:40 -05:00
David Goulet
3c73622f27
hs: Double quote the metrics label value
...
Fixes #40552
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-02-03 08:30:23 -05:00
David Goulet
28881d0a92
fallbackdir: Update list generated on January 24, 2022
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24 10:35:18 -05:00
David Goulet
324ded93be
geoip: Update to match ipfire location db, 2022/01/24.
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-24 10:31:43 -05:00
Nick Mathewson
935d7b5803
Resolve typedef conflict from congestion_control_t
...
Resumes being able to build on old / esoteric gcc versions.
Fixes bug 40550; bugfix on 0.4.7.1-alpha.
2022-01-20 14:22:00 -05:00
David Goulet
ec5611e876
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-01-18 13:15:29 -05:00
David Goulet
e949586889
Merge branch 'maint-0.4.6'
2022-01-18 13:15:29 -05:00
David Goulet
49c758af47
Merge branch 'maint-0.3.5' into maint-0.4.5
2022-01-18 13:15:29 -05:00
David Goulet
e523480691
Merge branch 'tor-gitlab/mr/510' into maint-0.3.5
2022-01-18 13:15:23 -05:00
David Goulet
7d9d769123
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-01-18 13:12:35 -05:00
David Goulet
a4510603f7
Merge branch 'maint-0.4.6'
2022-01-18 13:12:35 -05:00
David Goulet
aac5731f86
Merge branch 'maint-0.3.5' into maint-0.4.5
2022-01-18 13:12:13 -05:00
David Goulet
b9c06718a8
main: Update a dead URL in a log notice
...
Change https://www.torproject.org/download/download#warning to
https://support.torproject.org/faq/staying-anonymous/
Closes #40544
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18 12:51:52 -05:00
David Goulet
72041c6306
relay: Don't advertise HSv2 protocol version
...
We removed HSIntro=3 and HSDir=1 that are v2 specific. Since 0.3.5.17,
we do not support introducing or being a directory for onion service v2.
Closes #40509
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-01-18 12:39:06 -05:00
Alexander Færøy
66e7ddb551
Merge remote-tracking branch 'tor-gitlab/mr/503' into main
2021-12-17 16:53:47 +00:00
Tor CI Release
adc0d49ef2
release: ChangeLog and ReleaseNotes for 0.4.7.3-alpha
2021-12-16 09:32:04 -05:00
David Goulet
7a8aa8e36d
Merge branch 'maint-0.4.6'
2021-12-16 09:28:17 -05:00
Tor CI Release
9a4366b3e3
Update geoip files to match ipfire location db, 2021/12/15.
2021-12-16 09:27:46 -05:00
Tor CI Release
57e8a9b8cb
fallbackdir: Update list generated on December 15, 2021
2021-12-16 09:27:39 -05:00
David Goulet
48e993be95
changes: Minor syntax editing fixes
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2021-12-15 10:53:32 -05:00