Commit Graph

10673 Commits

Author SHA1 Message Date
David Goulet
89e5e03dd5 Merge branch 'maint-0.4.8' 2024-11-19 11:05:03 -05:00
Jim Newsome
3e54c985a2 test-network: include IPv6 tests unconditionally
Previously we would incorrectly detect that ipv6 isn't supported if the
ping binary isn't present (as it may not be in a relatively stripped
down container image), or if ICMP packets aren't permitted (as they
often aren't in containers).

We don't really have a need to run these network tests on non-IPv6
systems, so it makes more sense to just run them unconditionally.
2024-11-19 09:25:35 -06:00
David Goulet
9b03f0288a Merge branch 'maint-0.4.8' 2024-10-31 08:37:51 -04:00
Waldemar Zimpel
4759350b9a Fix: Use FREE_AND_NULL() for releasing workqueue resources
See issue #40989
2024-10-31 08:37:37 -04:00
David Goulet
6c8238f313 Merge branch 'pin-chutney' into 'main'
CI: use a fixed version of chutney

See merge request tpo/core/tor!843
2024-10-30 17:36:28 +00:00
Jim Newsome
f79a5e6629 CI: use a fixed version of chutney
While chutney currently runs tor's chutney test in its own CI,
it's difficult to guarantee the two won't accidentally diverge.
Probably best to use a fixed version here so that we can control
chutney version bumps and avoid surprise breakage in tor's CI.

This will also free us to intentionally make breaking changes in
chutney (though I don't have any immediate plans for any).
2024-10-30 12:16:35 -05:00
David Goulet
0567401805 Merge branch 'maint-0.4.8' 2024-10-24 10:33:31 -04:00
Tor CI Release
200e89ee69 fallbackdir: Update list generated on October 24, 2024 2024-10-24 10:32:45 -04:00
Tor CI Release
dd9c6a4992 Update geoip files to match ipfire location db, 2024/10/24. 2024-10-24 10:30:55 -04:00
David Goulet
8f43b97895 Merge branch 'maint-0.4.8' 2024-10-16 09:05:34 -04:00
Daniel Winzen
b5d2ef2aeb
Add changes file 2024-10-15 22:26:49 +02:00
Roger Dingledine
7cca6dc1a3 don't build preemptive conflux circuits if no predicted ports
Conflux circuit building was ignoring the "predicted ports" feature,
which aims to make Tor stop building circuits if there have been
no user requests lately. This bug led to every idle Tor on the
network building and discarding circuits every 30 seconds, which
added overall load to the network, used bandwidth and battery from
clients that weren't actively using their Tor, and kept sockets open
on guards which added connection padding essentially forever.

Bug went in on commit 39c2927d when we added preemptive conflux circuit
pools.

Fixes bug 40981; bugfix on 0.4.8.1-alpha.
2024-10-15 15:59:25 -04:00
David Goulet
0577b630e1 Merge branch 'maint-0.4.8' 2024-10-10 09:55:57 -04:00
Waldemar Zimpel
6feaea8fa4 Fix: Memory leaks in cpuworker on shutdown
Resources allocated by cpuworker weren't being freed on clean shutdown.
This applies for worker threads, worker thread pool, reply queue, reply
event, ...
2024-10-10 09:55:46 -04:00
David Goulet
cd04eee7e5 changes: Add file for ticket 40248
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-10-10 09:24:39 -04:00
Nick Mathewson
3dfbacc7b6 Implement proposal 351
This proposal adds new syntax to the SOCKS5 username/password extension scheme,
so that requests with usernames starting with <torS0X> are now reserved.

For C tor, all we need to do is reject every username starting with <torS0X>
unless it is exactly "<torS0X>0".
2024-09-09 17:00:50 -04:00
David Goulet
17a70ab7c5 Merge branch 'maint-0.4.8' 2024-08-05 15:26:38 -04:00
David Goulet
93df26b11a dirvote: Fix memleak when computing consensus
Fixes #40966

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-08-05 11:59:30 -04:00
Nick Mathewson
e4307daef0 Changes file for proposal 350 phase 1 2024-06-26 11:42:36 -04:00
David Goulet
ef05979587 Merge branch 'maint-0.4.8' 2024-06-18 15:19:12 -04:00
Alexander Færøy
3c8035b452 Add changes file for tpo/core/tor#11101. 2024-06-18 15:15:32 -04:00
Peter Palfrader
48b354e038 fix sandbox for bandwidth authority 2024-06-07 19:38:10 +02:00
David Goulet
bf9d2d3b89 Merge branch 'maint-0.4.8' 2024-06-06 08:56:54 -04:00
Tor CI Release
31f8b43e2d fallbackdir: Update list generated on June 06, 2024 2024-06-06 08:45:09 -04:00
Tor CI Release
9b69c25d3a Update geoip files to match ipfire location db, 2024/06/06. 2024-06-06 08:44:54 -04:00
David Goulet
5c0a0f7da0 Merge branch 'ticket40689_048_01' into 'main'
dirauth: Add new faravahar

Closes #40689

See merge request tpo/core/tor!819
2024-05-30 16:29:56 +00:00
David Goulet
39ba9ce0d7 dirauth: Add new faravahar
Brand new address, brand new keys, brand new day.

Closes #40689

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-05-30 09:49:27 -04:00
David Goulet
36cd4a50fc Merge branch 'maint-0.4.8' 2024-04-29 16:02:12 -04:00
David Goulet
bedc6a90d2 circuit: Remove log_warn triggered by a proto violation
Fixes #40932

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-16 13:49:42 -04:00
David Goulet
a93759b46e Merge branch 'maint-0.4.8' 2024-04-15 15:11:30 -04:00
David Goulet
29e3601c42 Merge branch 'tor-gitlab/mr/808' into maint-0.4.8 2024-04-15 15:11:16 -04:00
David Goulet
612b801ea5 conflux: Don't process a closed circuit on get packaged window
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15 14:45:29 -04:00
David Goulet
269b4561a1 conflux: Avoid noting a cell was sent on a closed circuit
It turns out that circuit_package_relay_cell() returns 0 in order to drop a
cell but there is a code path, if the circuit queue is full, that also silently
closes the circuit and returns 0.

This lead to Conflux thinking a cell was sent but actually the cell was not and
the circuit was closed leading to the hard assert.

And so this function makes sure that circuit_package_relay_cell() and
append_cell_to_circuit_queue() returns a value that indicate what happened with
the cell and circuit so the caller can make an informed decision with it.

This change makes it that we do NOT enter the Conflux subsystem if the cell is
not queued on the circuit.

Fixes #40921

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-15 14:24:45 -04:00
David Goulet
94bcfd042b Merge branch 'maint-0.4.8' 2024-04-10 12:59:04 -04:00
Tor CI Release
461679e8c0 fallbackdir: Update list generated on April 10, 2024 2024-04-10 12:58:56 -04:00
Tor CI Release
3064d57712 Update geoip files to match ipfire location db, 2024/04/10. 2024-04-10 12:58:51 -04:00
David Goulet
deae11797a Merge branch 'maint-0.4.8' 2024-04-09 09:23:47 -04:00
David Goulet
e3e4fa35e8 dirauth: New keys and address for tor26
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-08 10:57:29 -04:00
David Goulet
51ef4ce094 test: Disable unit test causing issue with nightly package
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-03-20 09:23:24 -04:00
Jim Newsome
d224961609 hs_service: don't force high intro point rotation for TestingTorNetwork
This was previously added to facilitate testing intro point rotation
with chutney. However, the implementation is problematic since it forces
excessive rotation whenever TestingTorNetwork is enabled, and can't be
adjusted or disabled.

Alternatives for testing intro point rotation include:
 * Using shadow to "fast forward" time
 * Overriding the consensus parameters hs_intro_min_lifetime and
   hs_intro_max_lifetime.

Fixes #40922
2024-03-14 09:36:59 -05:00
Alexander Færøy
72ac1de514 Merge branch 'maint-0.4.8' 2024-02-28 16:52:56 +00:00
David Goulet
b0b943a161 Merge branch 'bug40911' into 'main'
Make two 1-bit fields unsigned

Closes #40911

See merge request tpo/core/tor!796
2024-02-08 19:41:22 +00:00
Sebastian Hahn
6b665f25e2 Try to appease the changefile format checker 2024-02-06 19:52:44 +01:00
Sebastian Hahn
4c0e9f1418 Make two 1-bit fields unsigned
This should be a completely harmless warning as we only check whether
the fields are true or false.

Closes #40911.
2024-02-01 19:45:04 +01:00
Sebastian Hahn
bbf8f0f1fb Add a changes file 2024-02-01 16:45:58 +01:00
Alexander Færøy
824a0c4665 Merge branch 'ticket40816_049_01' into 'main'
metrics: Add new relay metrics to MetricsPort

Closes #40816

See merge request tpo/core/tor!793
2024-01-30 16:24:55 +00:00
David Goulet
4a94d0394e Merge branch 'maint-0.4.8' 2024-01-30 10:57:02 -05:00
David Goulet
fbca1df9dd dirauth: Reject 0.4.7.x series at the authority level
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-01-30 10:56:16 -05:00
juga
56819b0a50 bwauth: Allow "node_id" KeyValue without "$"
Allow "node_id" KeyValue without the dollar sign at the start of the
hexdigit in the BandwidthFiles, in order to easier database queries
combining Tor documents in which the relays fingerprint doesn't
include it.
Bugfix on all supported versions of Tor.

Closes #40891
2024-01-30 10:47:13 -05:00
David Goulet
5a5ca444c8 metrics: Add new relay metrics to MetricsPort
This commit adds the total number of DROP cell seen, the total number of
DESTROY cell received and the total number of protocol violation that lead to a
circuit close.

Closes #40816

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-01-30 10:13:09 -05:00