Nick Mathewson
27099ffe6a
Merge remote-tracking branch 'tor-github/pr/1689'
2020-01-28 07:55:34 -05:00
rl1987
9879eae17e
Remove contrib/dist/rc.subr
2020-01-28 20:32:40 +08:00
teor
9d771ccc86
Travis: Stop allowing stem test failures
...
Stop allowing failures on the Travis CI stem tests job. It looks like
all the stem hangs we were seeing are now fixed, but let's make sure we
see them if they happen again.
Closes ticket 33075.
2020-01-28 19:56:56 +10:00
cclauss
3208a74f90
Use print() function in both Python 2 and Python 3
2020-01-28 01:38:54 +01:00
George Kadianakis
ba99287d13
Write unittest that covers cases of INTRODUCE1 handling.
...
Also fix some memleaks of other OB unittests.
2020-01-28 01:08:41 +02:00
George Kadianakis
635f58bad2
Introduce an hs_ob_free_all() function.
2020-01-28 01:07:51 +02:00
George Kadianakis
0133169481
Allow clients to connect to the instance even with OB enabled.
...
We do this by including the instance's subcredentials to the list of
subcredentials that are used during INTRO2 decryption.
2020-01-28 01:07:51 +02:00
George Kadianakis
c731988cb2
Unify INTRO2 handling codepaths in OB and normal cases.
...
Now we use the exact same INTRO2 decrypt logic regardless of whether the
service is an OB instance or not.
The new get_subcredential_for_handling_intro2_cell() function is responsible
for loading the right subcredentials in either case.
2020-01-28 01:07:51 +02:00
George Kadianakis
da15feb0d3
Refresh OB keys when we build a new descriptor.
...
We now assign OB subcredentials to the service instead of computing them on the
spot. See hs_ob_refresh_keys() for more details.
2020-01-28 01:07:28 +02:00
David Goulet
aba31e2187
Merge branch 'tor-github/pr/1683'
2020-01-27 12:04:25 -05:00
Taylor Yu
f10e6b7234
changes file for ticket 33039
2020-01-24 12:20:52 -06:00
Taylor Yu
76a8a734c9
tests for ticket 33039
2020-01-24 12:20:52 -06:00
Taylor Yu
f7a2b98674
fix leak in GETCONF
...
Fix a memory leak introduced by refactoring of control reply
formatting code. Fixes bug 33039; bugfix on 0.4.3.1-alpha.
2020-01-24 12:20:47 -06:00
Nick Mathewson
cda10a2e89
Git hooks: remove support for 0.2.9 directory layout.
...
We no longer will be pushing or committing things in branches that
use src/common or src/or.
Resolves ticket 32957.
2020-01-23 10:28:09 -05:00
Nick Mathewson
7c76cedf0f
update doc/HACKING/ReleasingTor.md
2020-01-23 08:55:55 -05:00
Nick Mathewson
e34d963c44
Bump to 0.4.3.1-alpha-dev
2020-01-22 20:30:46 -05:00
David Goulet
21d0d81d82
Merge branch 'tor-github/pr/1677'
2020-01-22 14:32:30 -05:00
Alexander Færøy
35721b38e4
Lower log level of standard error messages from PT's.
...
This patch lowers the log level of error messages from PT processes from
warning to debug.
See: https://bugs.torproject.org/33005
2020-01-22 14:32:13 -05:00
Nick Mathewson
6166af5077
pick a release date
2020-01-22 13:10:54 -05:00
Nick Mathewson
d3e63ee206
Add some changelog edits from seborn
2020-01-22 13:10:09 -05:00
Nick Mathewson
5b98eee4da
draft a changelog blurb for 0.4.3.1-alpha
2020-01-22 11:56:44 -05:00
rl1987
a207fd7226
Add changes file
2020-01-22 20:26:04 +08:00
rl1987
f1c50a0e75
Run doxygen makefile target on Travis
2020-01-22 20:26:04 +08:00
teor
08efb28743
dir_connection_t: Explain dirconn_direct better
...
Direct connections can use a DirPort or ORPort.
Indirect connections must use a multi-hop Tor circuit.
Comment-only changes.
2020-01-22 09:27:40 +10:00
Nick Mathewson
e144134294
Bump to 0.4.3.1-alpha
2020-01-21 12:33:05 -05:00
Nick Mathewson
87f129977c
changelog: small edits
2020-01-21 12:32:33 -05:00
Nick Mathewson
2d8090fc66
Run format_changelog.py
2020-01-21 11:38:56 -05:00
Nick Mathewson
9aebb252a1
Initial incorporation of 0.4.3.x changelogs.
2020-01-21 11:35:59 -05:00
Nick Mathewson
722a6d3eb8
Remove changes files that already appeared in 0.4.2.5
2020-01-21 11:33:26 -05:00
Nick Mathewson
942543253a
Use time-invariant conditional memcpy to make onionbalance loop safer
2020-01-21 10:31:36 -05:00
Nick Mathewson
4269ab97c6
Add a function to maybe memcpy() a value, in constant time.
2020-01-21 10:31:36 -05:00
Nick Mathewson
b6250236a2
Pass multiple subcredentials all the way down to hs_ntor.
...
This approach saves us a pair of curve25519 operations for every
subcredential but the first. It is not yet constant-time.
I've noted a few places where IMO we should refactor the code so
that the complete list of subcredentials is passed in earlier.
2020-01-21 10:31:36 -05:00
Nick Mathewson
46e6a4819a
Define a variant of hs_ntor that takes multiple subcredentials.
2020-01-21 10:31:29 -05:00
Nick Mathewson
bd0efb2702
Remove a dead BUG() check.
2020-01-21 10:31:29 -05:00
Nick Mathewson
4532c7ef6a
Turn hs_subcredential_t into a proper struct.
2020-01-21 10:31:29 -05:00
David Goulet
3484608bda
practracker: Make it happy
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:31:29 -05:00
David Goulet
7c18860c3e
test: Add HS onion balance tests
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:31:29 -05:00
David Goulet
faada6af8d
hs-v3: Implement hs_ob_service_is_instance()
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:31:29 -05:00
David Goulet
780e498f76
hs-v3: Code improvement for INTRO2 MAC validation
...
Pointed by nickm during the review of #32709 .
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:31:29 -05:00
David Goulet
02f1caa583
hs-v3: Validate INTRO2 cells for onion balance
...
Closes #32709
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:31:29 -05:00
David Goulet
ef28afa255
hs-v3: Add the Onion Balance config file option
...
At this commit, the service reads the config file and parse it to finally set
the service config object with the options.
Part of #32709
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:31:29 -05:00
George Kadianakis
f1498e75dd
hs-v3: Extract INTRO2 key computation to its own function.
...
Part of #32709
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:28:26 -05:00
David Goulet
16a201e703
hs-v3: Implement hs_parse_address_no_log()
...
The hs_parse_address() can not be used without an options_t object existing
since on error it uses the escaped_safe_str() that looks at the options.
This new function won't log and returns an error message in case of failure
that can then be used to log.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-01-21 10:28:26 -05:00
David Goulet
ff93133403
Merge branch 'tor-github/pr/1675'
2020-01-20 10:47:49 -05:00
David Goulet
ca8b90a843
Merge branch 'tor-github/pr/1668'
2020-01-20 10:44:03 -05:00
teor
51c76215db
doc: Minor man page fixes
...
Fix a client port list that's missing HTTPTunnelPort.
Wrap a long line.
2020-01-20 16:41:07 +10:00
teor
6898131b41
doc: Improve port flags in man page
...
Explain that:
* most flags default to off
* flags that default to on are specified
Document PreferIPv6Automap in its "No" form, because it's on by
default.
Cleanup after 32637.
2020-01-20 16:38:02 +10:00
teor
bf2a399fc0
config: Make clients tell dual-stack exits they prefer IPv6
...
Make Tor clients tell dual-stack exits that they prefer IPv6
connections.
This change is equivalent to setting the PreferIPv6 flag on
SOCKSPorts (and most other listener ports). Tor Browser has
been setting this flag for some time, and we want to remove a
client distinguisher at exits.
Also update the man page, putting all the IP flags in their
non-default forms.
Closes ticket 32637.
2020-01-20 16:36:58 +10:00
teor
b23b8fa4a1
Merge remote-tracking branch 'tor-github/pr/1673'
2020-01-20 15:52:40 +10:00
teor
af30be9515
test/nodelist: Remove ROUTERSTATUS_FORMAT_NO_CONSENSUS_METHOD
...
When we removed obsolete consensus methods in 32695, we also
removed ROUTERSTATUS_FORMAT_NO_CONSENSUS_METHOD, so we need to
remove it from the routerstatus format tests.
Part of 20218.
2020-01-20 15:51:30 +10:00