Neel Chauhan
b558971c07
Add changes file for Ticket #28279
2020-07-01 12:00:53 -04:00
George Kadianakis
8d8a9d7f1d
Merge branch 'tor-github/pr/1898'
2020-05-27 15:17:55 +03:00
Neel Chauhan
f6943d702c
Add changes file for ticket #24844
2020-05-27 15:16:39 +03:00
Nick Mathewson
43f4324e29
Merge remote-tracking branch 'tor-github/pr/1899/head'
2020-05-21 10:08:48 -04:00
George Kadianakis
3121e5c103
Merge branch 'tor-github/pr/1850'
2020-05-21 16:24:32 +03:00
George Kadianakis
fb281daf29
Merge branch 'tor-github/pr/1861'
2020-05-21 16:22:47 +03:00
Damon Harris
c4fb3bfed5
Add support for console control signals in Windows
2020-05-20 23:28:39 +05:30
Nick Mathewson
9b55a62e73
Merge branch 'maint-0.4.3'
2020-05-19 09:39:12 -04:00
Nick Mathewson
68fe8826dd
Doxygen: fix unbalanced groups.
...
Closes ticket 34255.
2020-05-19 09:18:39 -04:00
Nick Mathewson
db4815dd8e
Merge branch 'maint-0.4.3'
2020-05-15 10:28:36 -04:00
Nick Mathewson
6f2b6ede1b
Add a changes file for 34233.
...
This bug was merged back to 0.3.5 with our #34078 fix, but only
released in 0.4.3.5, so the changes file goes here.
2020-05-15 10:27:49 -04:00
Nick Mathewson
85cfd04c0c
remove changes files that have already appeared in 0.4.3.
2020-05-14 20:29:00 -04:00
Nick Mathewson
1557e73c82
Merge branch 'bug34130_035'
2020-05-12 12:58:19 -04:00
Daniel Pinto
2913dbd6d9
Fix crash when tor is compiled with NSS and seccomp sandbox is enabled
...
Adds seccomp rules for socket and getpeername used by NSS
2020-05-12 12:56:06 -04:00
Nick Mathewson
86b5bcd80a
Merge remote-tracking branch 'tor-github/pr/1885/head'
2020-05-12 12:52:41 -04:00
Daniel Pinto
cc169eb120
Add documentation about %include and seccomp sandbox limitations
2020-05-08 00:21:12 +01:00
Nick Mathewson
b7a165228f
Merge remote-tracking branch 'tor-github/pr/1880/head'
2020-05-07 08:19:11 -04:00
Nick Mathewson
3a785dd5be
Merge branch 'maint-0.4.3'
2020-05-06 17:17:19 -04:00
Nick Mathewson
b444096be5
Fix a boolean logic error when logging about invalid hostnames.
...
Fixes bug 34131; bugfix on 0.4.3.1-alpha.
2020-05-06 17:15:37 -04:00
Nick Mathewson
e39b35f1de
Merge branch 'maint-0.4.3'
2020-05-06 16:58:12 -04:00
Nick Mathewson
ae1ebb5f44
Merge branch 'maint-0.4.2' into maint-0.4.3
2020-05-06 16:58:12 -04:00
Nick Mathewson
d46f67ef0e
Merge branch 'maint-0.4.1' into maint-0.4.2
2020-05-06 16:58:12 -04:00
Nick Mathewson
633366efcd
Merge branch 'maint-0.3.5' into maint-0.4.1
2020-05-06 16:58:12 -04:00
Nick Mathewson
dd795fbee4
changes file for bug 34078.
2020-05-06 16:58:06 -04:00
Alex Xu (Hello71)
42dfcd0ae3
core/or: Lift slow call out of loop, #33977
2020-05-05 15:07:42 -04:00
David Goulet
2e519fbfb0
changes: File for #33789
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2020-05-05 14:24:04 -04:00
Nick Mathewson
f96b6ccee1
Merge branch 'maint-0.4.3'
2020-05-04 10:25:53 -04:00
Nick Mathewson
bbfc498e21
Merge branch 'maint-0.4.1' into maint-0.4.2
2020-05-04 10:25:52 -04:00
Nick Mathewson
6aaee6133d
Merge branch 'bug34077_042' into bug34077_043
2020-04-30 23:01:58 -04:00
Nick Mathewson
b4b1882da0
Merge branch 'bug34077_041' into bug34077_042
2020-04-30 22:59:08 -04:00
Nick Mathewson
d7e166bd95
Fix a GCC 10.0.1 compilation warning.
...
Fixes 34077 for 0.4.1; bugfix on 0.4.0.3-alpha. (Specifically, GCC
first gives this warning for 9eeff921ae
)
2020-04-30 22:56:31 -04:00
teor
6dc9930d3a
Merge branch 'pr1870_squashed'
2020-04-30 22:22:09 +10:00
Neel Chauhan
7bf257b129
Define and use TOR_ADDRPORT_BUF_LEN
2020-04-30 22:21:48 +10:00
Nick Mathewson
49800cf539
Merge remote-tracking branch 'tor-github/pr/1864/head'
2020-04-29 19:16:40 -04:00
teor
528a1fe985
changes: file for 33817
2020-04-29 22:43:09 +10:00
teor
6c458d2d6e
log/util_bug: Make IF_BUG_ONCE() support ALL_BUGS_ARE_FATAL
...
... and DISABLE_ASSERTS_IN_UNIT_TESTS.
Make all of tor's assertion macros support the ALL_BUGS_ARE_FATAL and
DISABLE_ASSERTS_IN_UNIT_TESTS debugging modes.
Implements these modes for IF_BUG_ONCE(). (It used to log a non-fatal
warning, regardless of the debugging mode.)
Fixes bug 33917; bugfix on 0.2.9.1-alpha.
2020-04-29 22:43:09 +10:00
teor
587a7fbcf6
core/or: Check extends for zero addresses and ports
...
Check for invalid zero IPv4 addresses and ports, when sending and
receiving extend cells.
Fixes bug 33900; bugfix on 0.2.4.8-alpha.
2020-04-29 22:43:09 +10:00
teor
bd6ab90ad4
core/or: Support IPv6 EXTEND2 cells
...
Allow clients and relays to send dual-stack and IPv6-only EXTEND2 cells.
Parse dual-stack and IPv6-only EXTEND2 cells on relays.
Relays do not make connections or extend circuits via IPv6: that's the
next step.
Closes ticket 33901.
2020-04-29 22:43:09 +10:00
Nick Mathewson
4dd4dbf046
Merge remote-tracking branch 'onionk/inbufoverflow1-043' into ticket33131_044
2020-04-24 08:15:53 -04:00
Nick Mathewson
7f9eaec538
Merge remote-tracking branch 'tor-github/pr/1862/head'
2020-04-24 08:14:59 -04:00
Nick Mathewson
b2849f449b
Merge branch 'maint-0.4.3'
2020-04-21 12:22:37 -04:00
teor
42507429ce
channeltls: Stop truncating IPv6 in logs
...
Stop truncating IPv6 addresses and ports in channel and connection logs.
Fixes bug 33918; bugfix on 0.2.4.4-alpha.
2020-04-21 12:22:30 -04:00
teor
8c55d34e0a
core/or: Accurately log remote relay IPv6 addresses
...
Log IPv6 addresses on connections where this relay is the responder.
Previously, responding relays would replace the remote IPv6 address with
the IPv4 address from the consensus.
(The port is replaced with the IPv6 ORPort from the consensus, we will
resolve this issue in 33898.)
Fixes bug 33899; bugfix on 0.3.1.1-alpha.
2020-04-14 12:21:49 +10:00
teor
41fa07f751
core/or: Allow IPv6 connections to be canonical
...
Consider IPv6 addresses when checking if a connection is canonical.
In 17604, relays assumed that a remote relay could consider an IPv6
connection canonical, but did not set the canonical flag on their side
of the connection.
Fixes bug 33899; bugfix on 0.3.1.1-alpha.
2020-04-14 12:16:48 +10:00
Nick Mathewson
e22a8d9c95
Merge branch 'maint-0.4.3'
2020-04-13 14:14:41 -04:00
Nick Mathewson
55cb6c3fcd
Merge branch 'bug33545_043_squashed' into maint-0.4.3
2020-04-13 14:13:44 -04:00
George Kadianakis
37bcc9f3d2
hs-v3: Don't allow registration of an all-zeroes client auth key.
...
The client auth protocol allows attacker-controlled x25519 private keys being
passed around, which allows an attacker to potentially trigger the all-zeroes
assert for client_auth_sk in hs_descriptor.c:decrypt_descriptor_cookie().
We fixed that by making sure that an all-zeroes client auth key will not be
used.
There are no guidelines for validating x25519 private keys, and the assert was
there as a sanity check for code flow issues (we don't want to enter that
function with an unitialized key if client auth is being used). To avoid such
crashes in the future, we also changed the assert to a BUG-and-err.
2020-04-13 14:13:33 -04:00
Neel Chauhan
8e59b8560a
Return a descriptive error for 'GETINFO status/fresh-relay-descs'
2020-04-12 13:13:50 -07:00
Nick Mathewson
80031db32a
Merge remote-tracking branch 'tor-github/pr/1801/head'
2020-04-09 11:50:20 -04:00
Nick Mathewson
c2aea6134a
Merge remote-tracking branch 'tor-github/pr/1723/head' into maint-0.4.3
2020-04-09 08:30:14 -04:00