Commit Graph

28438 Commits

Author SHA1 Message Date
Daniel Winzen
6ea640dfc2
Create socket with correct family as given by sockshost 2024-10-13 22:32:56 +02:00
David Goulet
0577b630e1 Merge branch 'maint-0.4.8' 2024-10-10 09:55:57 -04:00
Waldemar Zimpel
6feaea8fa4 Fix: Memory leaks in cpuworker on shutdown
Resources allocated by cpuworker weren't being freed on clean shutdown.
This applies for worker threads, worker thread pool, reply queue, reply
event, ...
2024-10-10 09:55:46 -04:00
David Goulet
7383d462fb Merge branch 'empty-dns' into 'main'
Handle empty DNS reply without error as NOERROR

Closes #40248

See merge request tpo/core/tor!830
2024-10-10 13:22:23 +00:00
Cecylia Bocovich
1da650adb4
Fix unit test in test_entrynodes.c 2024-09-24 16:13:29 -04:00
Daniel Winzen
3d2f7c3467
Handle empty DNS reply without error as NOERROR 2024-09-24 15:07:59 +02:00
David Goulet
a56350abc8 Merge branch 'typo-socks-proxy' into 'main'
Fix a typo in the HTTP proxy error message.

See merge request tpo/core/tor!829
2024-09-10 12:49:51 +00:00
David Goulet
f909c86fc0 test: Add unit tests for prop351
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-09-10 08:46:02 -04:00
Pier Angelo Vendrame
7cb6e04acb
Fix a typo in the HTTP proxy error message. 2024-09-10 14:24:46 +02:00
Nick Mathewson
3dfbacc7b6 Implement proposal 351
This proposal adds new syntax to the SOCKS5 username/password extension scheme,
so that requests with usernames starting with <torS0X> are now reserved.

For C tor, all we need to do is reject every username starting with <torS0X>
unless it is exactly "<torS0X>0".
2024-09-09 17:00:50 -04:00
David Goulet
17a70ab7c5 Merge branch 'maint-0.4.8' 2024-08-05 15:26:38 -04:00
David Goulet
93df26b11a dirvote: Fix memleak when computing consensus
Fixes #40966

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-08-05 11:59:30 -04:00
Nick Mathewson
6c8b93538c Do not publish TAP key when publish-dummy-tap-key is 0. 2024-06-26 11:42:36 -04:00
Nick Mathewson
9466cc9fdc Update supported protovers for prop350
Relay=1 is no longer supported; it corresponds to TAP.

Microdesc=3 and Desc=3 are now supported; they correspond to the ability to
handle (micro)descriptors without TAP onion keys.
2024-06-26 11:42:36 -04:00
Nick Mathewson
ff66aa306b Add a test for parsing a routerdesc with no TAP key. 2024-06-26 11:42:36 -04:00
Nick Mathewson
71ca75cb19 Add a test for a microdesc with no onion key. 2024-06-26 11:42:36 -04:00
Nick Mathewson
48c1bebd9e Remove a now-unused variable. 2024-06-26 11:42:36 -04:00
Nick Mathewson
37f95e8dd2 process_descs: Authorities require TAP keys for now. 2024-06-26 11:42:36 -04:00
Nick Mathewson
73b73c07e1 Routerparse: accept routerdescs without TAP keys. 2024-06-26 11:42:36 -04:00
Nick Mathewson
6c3dd44762 routerparse: Simplify checking for now-mandatory elements
All of these elements are now mandatory, so we can now simplify
our logic for making sure that they are all present or all not-present.
2024-06-26 11:42:36 -04:00
Nick Mathewson
4cdf56a173 Rename "onion_pkey" fields in routerinfo_t, and make them optional.
(Renaming them has forced me to look at every place where they are used, so I
can make sure that they are really optional now.)
2024-06-26 11:42:36 -04:00
Nick Mathewson
cbbfb812a8 Remove node_get_rsa_onion_key 2024-06-26 11:42:36 -04:00
Nick Mathewson
0428aef13a Remove TAP key from extend_info_t 2024-06-26 11:42:36 -04:00
Nick Mathewson
07f0a2b964 Make onion-key body optional in microdescs
Also, stop storing onion keys in microdesc_t.

(In prop350, for microdescs, we are making the body optional; the "onion-key"
entry is still mandatory, so that we can tell where microdescs begin.)
2024-06-24 17:48:55 -04:00
Nick Mathewson
f631145cbf Remove support for deciding to use CREATE/EXTEND/TAP. 2024-06-24 13:54:26 -04:00
Nick Mathewson
f6f2d5c4a0 prop350: Remove all support for TAP, CREATE, and EXTEND. 2024-06-24 13:51:54 -04:00
Nick Mathewson
a696559d78 prop350: Stop accepting CREATE and EXTEND. 2024-06-24 13:29:04 -04:00
David Goulet
ef05979587 Merge branch 'maint-0.4.8' 2024-06-18 15:19:12 -04:00
David Goulet
d587ba01a7 bridge: Always put transport-info line
Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-06-18 15:15:32 -04:00
Alexander Færøy
1941f25f4c Clean-up Managed Proxy state in PT tests.
This patch makes sure we clean up our version and implementation fields
in our Managed Proxy struct after each test run.

This was detected by LeakSanitizer.

See: tpo/core/tor#11101.
2024-06-18 15:15:32 -04:00
Alexander Færøy
3c8035b452 Add changes file for tpo/core/tor#11101. 2024-06-18 15:15:32 -04:00
Alexander Færøy
b4f8518f8f Add implementation and version metadata to bridge extra-info.
This patch adds two new keys to bridges' extra-info document:
"transport-version" and "transport-implementation".

These two new values always appear together (if one is missing, the
other one will be missing too) and is parsed from PT's STATUS
TYPE=version messages.

See: tpo/core/tor#11101.
2024-06-18 15:15:20 -04:00
Alexander Færøy
f459344488 Include "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages. 2024-06-18 15:15:20 -04:00
Alexander Færøy
d27ce6b8f0 Drop requirement for TRANSPORT being present in STATUS messages. 2024-06-18 15:15:20 -04:00
Alexander Færøy
b6e260e699 Add support for PT STATUS TYPE=version messages.
This patch adds support for handling the version status message. Once we
receive such message, we add the given version string to the
managed_proxy_t instance. Note this value can be NULL and the value can
change throughout the lifetime of the PT as multiple status version
messages are handled.

See: tpo/core/tor#11101
2024-06-18 15:15:20 -04:00
Peter Palfrader
48b354e038 fix sandbox for bandwidth authority 2024-06-07 19:38:10 +02:00
David Goulet
bf9d2d3b89 Merge branch 'maint-0.4.8' 2024-06-06 08:56:54 -04:00
Tor CI Release
31f8b43e2d fallbackdir: Update list generated on June 06, 2024 2024-06-06 08:45:09 -04:00
Tor CI Release
9b69c25d3a Update geoip files to match ipfire location db, 2024/06/06. 2024-06-06 08:44:54 -04:00
David Goulet
5c0a0f7da0 Merge branch 'ticket40689_048_01' into 'main'
dirauth: Add new faravahar

Closes #40689

See merge request tpo/core/tor!819
2024-05-30 16:29:56 +00:00
David Goulet
39ba9ce0d7 dirauth: Add new faravahar
Brand new address, brand new keys, brand new day.

Closes #40689

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-05-30 09:49:27 -04:00
Roger Dingledine
d990aba613 fix a few comment typos 2024-05-29 12:45:51 -04:00
David Goulet
7a5d94bcf8 Merge branch 'maint-0.4.8' 2024-04-30 15:34:11 -04:00
hiro
7708f9a4ea Fix typo in tor-relays list address 2024-04-30 15:34:07 -04:00
David Goulet
36cd4a50fc Merge branch 'maint-0.4.8' 2024-04-29 16:02:12 -04:00
Roger Dingledine
f9624935bd typos in comments 2024-04-18 09:04:12 -04:00
trinity-1686a
881e0234e3 typo 2024-04-18 00:17:45 +02:00
David Goulet
bedc6a90d2 circuit: Remove log_warn triggered by a proto violation
Fixes #40932

Signed-off-by: David Goulet <dgoulet@torproject.org>
2024-04-16 13:49:42 -04:00
David Goulet
7ba70eeeea Merge branch 'count-log-bug' into 'main'
also consider LD_BUG logs when counting bug reached

Closes #40924

See merge request tpo/core/tor!805
2024-04-16 15:20:18 +00:00
David Goulet
a93759b46e Merge branch 'maint-0.4.8' 2024-04-15 15:11:30 -04:00