David Goulet
61bd8f428b
Merge branch 'tor-github/pr/1049'
2019-05-30 09:56:18 -04:00
George Kadianakis
70553a9134
Merge branch 'tor-github/pr/1037'
2019-05-29 21:25:32 +03:00
George Kadianakis
650bdca97f
Merge branch 'maint-0.4.0'
2019-05-29 21:20:02 +03:00
George Kadianakis
00108b75d4
Merge branch 'tor-github/pr/924' into maint-0.4.0
2019-05-29 21:19:56 +03:00
Nick Mathewson
bdf685e476
Changes file for bug 30614
2019-05-29 09:05:26 -04:00
David Goulet
ff9aa32143
Merge branch 'tor-github/pr/1047'
2019-05-28 14:59:07 -04:00
George Kadianakis
0a86f14add
Merge branch 'tor-github/pr/1042'
2019-05-27 14:22:01 +03:00
George Kadianakis
130eb227ac
Merge branch 'tor-github/pr/1043'
2019-05-27 14:20:51 +03:00
Nick Mathewson
0bc1241494
Make sure that we send at least some random data in RELAY_DATA cells
...
Proposal 289 prevents SENDME-flooding by requiring the other side to
authenticate the data it has received. But this data won't actually
be random if they are downloading a known resource. "No problem",
we said, "let's fell the empty parts of our cells with some
randomness!" and we did that in #26871 .
Unfortunately, if the relay data payloads are all completely full,
there won't be any empty parts for us to randomize.
Therefore, we now pick random "randomness windows" between
CIRCWINDOW_INCREMENT/2 and CIRCWINDOW_INCREMENT. We remember whether we have
sent a cell containing at least 16 bytes of randomness in that window. If we
haven't, then when the window is exhausted, we send one. (This window approach
is designed to lower the number of rng checks we have to do. The number 16 is
pulled out of a hat to change the attacker's guessing difficulty to
"impossible".)
Implements 28646.
2019-05-27 14:20:07 +03:00
Nick Mathewson
6d9e47702f
changes file for test coverage
2019-05-24 07:42:59 -04:00
David Goulet
29955f13e5
Merge branch 'tor-github/pr/1022'
2019-05-23 09:50:28 -04:00
David Goulet
e13e2012b9
Merge branch 'tor-github/pr/1034'
2019-05-23 09:40:07 -04:00
David Goulet
327bb0e2ca
Merge branch 'tor-github/pr/988'
2019-05-23 09:30:36 -04:00
Nick Mathewson
57ee0e3af9
Only reject POSTDESCRIPTOR purpose= when the purpose is unrecognized
...
Fixes bug 30580; bugfix on 0.4.1.1-alpha.
2019-05-23 08:24:29 -04:00
Nick Mathewson
fa57b6cfb0
Fold last entry into changelog
2019-05-22 12:00:20 -04:00
Nick Mathewson
24c2502070
Merge remote-tracking branch 'dgoulet/ticket30454_035_01'
2019-05-22 11:50:46 -04:00
David Goulet
245dccb77d
Merge remote-tracking branch 'nickm/ticket30454_034_01_squashed' into ticket30454_035_01
2019-05-22 11:43:55 -04:00
Nick Mathewson
e2d3d44496
Add a new "autostyle" make target to run all of our reformatting
...
Closes ticket 30539.
2019-05-20 12:08:30 -04:00
David Goulet
9f52b87518
hs: Add changes file for #30454
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-20 08:56:34 -04:00
Nick Mathewson
aa4f2f7397
Initial changelog draft for 0.4.1.1-alpha (mostly automated)
2019-05-17 10:12:07 -04:00
Nick Mathewson
37aae23945
OOM-purge the DNS cache one part at a time
...
Previously we purged it in 1-hour increments -- but one-hour is the
maximum TTL for the cache! Now we do it in 25%-TTL increments.
Fixes bug 29617; bugfix on 0.3.5.1-alpha.
2019-05-17 10:03:41 -04:00
Nick Mathewson
b2b779228d
Merge remote-tracking branch 'tor-github/pr/1033'
2019-05-17 08:18:20 -04:00
Nick Mathewson
9cec7a7b5c
Merge branch 'maint-0.4.0'
2019-05-17 08:10:17 -04:00
Nick Mathewson
c7f9f7e542
Merge branch 'maint-0.3.5' into maint-0.4.0
2019-05-17 08:10:16 -04:00
Nick Mathewson
e5deb2bbc7
Merge branch 'maint-0.3.4' into maint-0.3.5
2019-05-17 08:10:16 -04:00
Nick Mathewson
a521c42788
Merge branch 'maint-0.2.9' into maint-0.3.4
2019-05-17 08:10:15 -04:00
Karsten Loesing
4e262196a8
Update geoip and geoip6 to the May 13 2019 database.
2019-05-17 08:52:13 +02:00
Mike Perry
1a79bedd97
Changes file.
2019-05-16 20:25:25 +00:00
George Kadianakis
338cfb3179
Merge branch 'tor-github/pr/1002'
2019-05-15 23:23:18 +03:00
David Goulet
39a14421b1
Merge branch 'tor-github/pr/1021'
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-15 15:35:22 -04:00
George Kadianakis
d71fa707dd
Merge branch 'bug28780-squashed3-rebased' into bug28780_rebase
2019-05-15 16:46:51 +03:00
Mike Perry
5cc988a947
Bug 28780: Changes file
2019-05-15 16:44:59 +03:00
George Kadianakis
a7779df84c
Merge branch 'bug29085_rebase'
2019-05-15 15:13:08 +03:00
Mike Perry
5ef0d89d91
Bug 29085: Changes file.
2019-05-15 15:10:48 +03:00
Nick Mathewson
9e5c27bd2c
changes file for ticket 28878
2019-05-15 07:50:56 -04:00
George Kadianakis
1de11dc47a
Merge branch 'maint-0.4.0'
2019-05-15 13:46:20 +03:00
George Kadianakis
cd264e145b
Merge branch 'tor-github/pr/1013' into maint-0.4.0
2019-05-15 13:45:39 +03:00
Nick Mathewson
1c95bdb83b
Merge branch 'ticket30452_035_v3' into ticket30452_041_v3
2019-05-14 19:20:53 -04:00
Nick Mathewson
1b16fcb70c
Add a --list-modules command
...
Closes ticket 30452.
2019-05-14 19:19:53 -04:00
Nick Mathewson
43d4119454
Merge remote-tracking branch 'tor-github/pr/1004'
2019-05-14 11:43:10 -04:00
Nick Mathewson
9ad2eb8f73
Merge branch 'bug28683_30173_29203_squashed'
2019-05-13 14:33:31 -04:00
Mike Perry
0d275ec592
Changes file for bugs28693+30173+29203.
2019-05-13 14:30:35 -04:00
Nick Mathewson
c6523a6398
Merge remote-tracking branch 'tor-github/pr/998'
2019-05-13 14:25:54 -04:00
David Goulet
2f44786e30
Merge branch 'tor-github/pr/976'
2019-05-13 07:34:00 -04:00
Nick Mathewson
ff55840343
Don't pass a NULL into a %s when logging client auth file load failure
...
Fortunately, in 0.3.5.1-alpha we improved logging for various
failure cases involved with onion service client auth.
Unfortunately, for this one, we freed the file right before logging
its name.
Fortunately, tor_free() sets its pointer to NULL, so we didn't have
a use-after-free bug.
Unfortunately, passing NULL to %s is not defined.
Fortunately, GCC 9.1.1 caught the issue!
Unfortunately, nobody has actually tried building Tor with GCC 9.1.1
before. Or if they had, they didn't report the warning.
Fixes bug 30475; bugfix on 0.3.5.1-alpha.
2019-05-10 17:47:43 -04:00
George Kadianakis
501d1ae0bd
Merge branch 'tor-github/pr/973'
2019-05-10 12:49:01 +03:00
David Goulet
3885e7b44b
Merge branch 'tor-github/pr/1000'
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-08 08:02:28 -04:00
Neel Chauhan
3cafdeb8c0
Only call tor_addr_parse() in circuit_is_acceptable() when needed
2019-05-07 11:52:56 -04:00
David Goulet
b72f5da03d
Merge branch 'tor-github/pr/994'
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-07 08:02:39 -04:00
Nick Mathewson
c8c64caf37
Merge remote-tracking branch 'tor-github/pr/923'
2019-05-06 17:16:37 -04:00