Neel Chauhan
419aa78b3a
Remove unused RendPostPeriod option
2022-06-23 09:09:01 -04:00
Nick Mathewson
0dc9561f21
Add a missing "not" to a message.
...
Closes #40619 .
Bugfix on 0.2.5.4-alpha.
2022-06-17 12:00:09 -04:00
David Goulet
d563d1a4b7
changelog: Merge 0.4.7.8 changelog
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-06-17 10:48:58 -04:00
David Goulet
9492dc3645
Merge branch 'maint-0.4.7'
2022-06-17 10:45:52 -04:00
Tor CI Release
e234df6098
version: Bump version to 0.4.7.8-dev
2022-06-17 10:45:24 -04:00
David Goulet
5ce8b82edc
Merge branch 'maint-0.4.7'
2022-06-17 10:12:30 -04:00
Tor CI Release
7528524aee
version: Bump version to 0.4.7.8
2022-06-17 10:10:27 -04:00
Tor CI Release
edde188cf2
release: ChangeLog and ReleaseNotes for 0.4.7.8
2022-06-17 10:10:16 -04:00
Tor CI Release
9cab60183d
fallbackdir: Update list generated on June 17, 2022
2022-06-17 10:04:15 -04:00
Tor CI Release
223886c118
Update geoip files to match ipfire location db, 2022/06/17.
2022-06-17 10:04:06 -04:00
David Goulet
7fc474bd3f
Merge branch 'maint-0.4.7'
2022-06-17 09:13:31 -04:00
Mike Perry
5a25374209
Add changes file for bug40626
2022-06-17 09:03:13 -04:00
Mike Perry
b0496d4019
Fix for RTT calculation hang during congestion control.
...
Only cache RTT on explicit stalls; Only use this cache for the
RTT decrease case. Otherwise use only local circuit RTT state for clock jump
checks.
2022-06-17 08:56:54 -04:00
Nick Mathewson
0eb21427c9
Don't add redundant quotes with escaped() in log messages.
...
The escaped() function and its kin already wrap their output in
quotes: there's no reason to do so twice.
I am _NOT_ making a corresponding change in calls that make the same
mistake in controller-related functions, however, due to the risk of
a compatibility break. :(
Closes #22723 .
2022-06-16 14:35:38 -04:00
Nick Mathewson
95080794eb
Fix the name of AuthDirMiddleOnly in the manpage.
2022-06-16 11:53:26 -04:00
Nick Mathewson
6c1aad13e2
Fix check-docs
to avoid false-positives on missing anchors.
...
Also add an anchor for the second ClientTranportPlugin instance.
See #40339 .
This doesn't need a changes file because it isn't user-facing.
2022-06-16 11:50:59 -04:00
David Goulet
1d6470a2a8
Merge branch 'maint-0.4.7'
2022-06-15 12:25:46 -04:00
Mike Perry
254ca6717f
Changes file for Bug 40612
2022-06-15 14:43:52 +00:00
Mike Perry
84e31c00da
Demote "Unexpected path length" log to info.
...
You win Maze; we surrender.
2022-06-15 14:42:37 +00:00
Mike Perry
2ce5142718
Changes file for Bug #40603 .
2022-06-15 14:14:03 +00:00
Mike Perry
e41b680f50
Demote a warning about finding hops in path if no dir info.
...
Leave it at notice if we do have enough dir info.
2022-06-15 14:13:09 +00:00
Alex Xu (Hello71)
b65ffa6f06
Enable IP_BIND_ADDRESS_NO_PORT if supported
2022-06-15 08:35:40 -04:00
Alex Xu (Hello71)
ad6b451b56
doc/include.am: fix EXTRA_DIST
2022-06-06 11:30:12 -04:00
David Goulet
b733f9d6ac
Merge branch 'maint-0.4.7'
2022-06-02 16:11:04 -04:00
David Goulet
dc7902ed55
Merge branch 'tor-gitlab/mr/583' into maint-0.4.7
2022-06-02 16:09:56 -04:00
Mike Perry
89a273e7f7
Bug 40620: Changes file
2022-06-02 18:54:11 +00:00
Mike Perry
9769b77c9b
Demote log message to info.
...
This log is harmless, and can be common at relays if clients are sending XOFF.
2022-06-02 18:48:14 +00:00
Alex Xu (Hello71)
36c714687b
Fix dispatch_cfg_t comment
2022-05-31 16:15:14 -04:00
David Goulet
69e3b8bb84
Merge branch 'tor-gitlab/mr/567'
2022-05-24 15:24:48 -04:00
David Goulet
62f505efd8
Merge branch 'tor-gitlab/mr/566'
2022-05-24 13:10:14 -04:00
David Goulet
d18b118bcc
Merge branch 'tor-gitlab/mr/568'
2022-05-24 13:09:36 -04:00
Alex Xu (Hello71)
87b2ce6f84
Trigger OOS on bind failures ( fixes #40597 )
2022-05-21 21:30:06 -04:00
David Goulet
4f038d224f
Merge branch 'tor-gitlab/mr/489'
2022-05-16 08:51:00 -04:00
David Goulet
bae04e6a98
Merge branch 'tor-gitlab/mr/555'
2022-05-16 08:45:32 -04:00
David Goulet
0f7a1f0351
Merge branch 'tor-gitlab/mr/561'
2022-05-16 08:45:15 -04:00
David Goulet
2a4663fee8
Merge branch 'tor-gitlab/mr/562'
2022-05-16 08:43:42 -04:00
David Goulet
faced20ddf
Merge branch 'tor-gitlab/mr/565'
2022-05-16 08:42:14 -04:00
David Goulet
c080d8b922
Merge branch 'tor-gitlab/mr/577'
2022-05-09 10:59:18 -04:00
Alexander Færøy
4ba89c0ccc
Merge branch 'maint-0.4.5' into maint-0.4.6
2022-05-09 14:37:26 +00:00
Alexander Færøy
5f2b75aafd
Merge branch 'maint-0.4.6' into maint-0.4.7
2022-05-09 14:37:26 +00:00
Alexander Færøy
20112c13ac
Merge branch 'maint-0.4.7'
2022-05-09 14:37:26 +00:00
Alexander Færøy
c213c1b0d1
Add changes entry to tor!575.
...
See: tpo/core/tor#40601.
2022-05-09 14:35:42 +00:00
pmu-ipf
d422a66f87
sandbox: Permit rseq syscall as well
...
This was found to be necessary in conjunction with glibc 2.35 on Linux.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-05-09 14:17:22 +00:00
Nick Mathewson
853270a871
Merge remote-tracking branch 'tor-gitlab/mr/574'
2022-05-04 10:34:03 -04:00
Pierre Bourdon
42034ae9da
changes: add entry for MR !574
2022-05-04 08:00:10 +02:00
Pierre Bourdon
eb0749d649
sandbox: replace SCMP_CMP_NEG with masked equality checks
...
For some syscalls the kernel ABI uses 32 bit signed integers. Whether
these 32 bit integer values are sign extended or zero extended to the
native 64 bit register sizes is undefined and dependent on the {arch,
compiler, libc} being used. Instead of trying to detect which cases
zero-extend and which cases sign-extend, this commit uses a masked
equality check on the lower 32 bits of the value.
2022-05-04 07:19:40 +02:00
Nick Mathewson
8d5692a2f7
Changes file for mr 569
2022-05-03 10:05:04 -04:00
Silvio Rhatto
f31d9cc3f9
Update man page on client auth revocation ( #40418 )
...
Revoking an Onion Service key does work with SIGHUP now.
The manual page is updated to reflect this change.
2022-05-03 10:37:32 -03:00
Pierre Bourdon
8fd13f7a7b
sandbox: filter {chown,chmod,rename} via their *at variant on Aarch64
...
The chown/chmod/rename syscalls have never existed on AArch64, and libc
implements the POSIX functions via the fchownat/fchmodat/renameat
syscalls instead.
Add new filter functions for fchownat/fchmodat/renameat, not made
architecture specific since the syscalls exists everywhere else too.
However, in order to limit seccomp filter space usage, we only insert
rules for one of {chown, chown32, fchownat} depending on the
architecture (resp. {chmod, fchmodat}, {rename, renameat}).
2022-04-30 13:13:45 +02:00
Pierre Bourdon
531275b0f3
sandbox: fix openat filtering on AArch64
...
New glibc versions not sign-extending 32 bit negative constants seems to
not be a thing on AArch64. I suspect that this might not be the only
architecture where the sign-extensions is happening, and the correct fix
might be instead to use a proper 32 bit comparison for the first openat
parameter. For now, band-aid fix this so the sandbox can work again on
AArch64.
2022-04-30 11:52:59 +02:00