Tor CI Release
b117ce48db
version: Bump version to 0.4.5.15-dev
2022-12-06 11:14:09 -05:00
Tor CI Release
236b9ff513
version: Bump version to 0.4.7.12
2022-12-06 10:22:24 -05:00
Tor CI Release
2be4c8319a
version: Bump version to 0.4.5.15
2022-12-06 10:22:12 -05:00
David Goulet
d75d02d202
Merge branch 'maint-0.4.7'
2022-12-06 10:10:41 -05:00
David Goulet
d889eba875
Merge branch 'maint-0.4.5' into maint-0.4.7
2022-12-06 10:10:41 -05:00
Tor CI Release
1992c553d5
fallbackdir: Update list generated on December 06, 2022
2022-12-06 10:09:32 -05:00
Tor CI Release
ec0414270a
Update geoip files to match ipfire location db, 2022/12/06.
2022-12-06 10:09:26 -05:00
David Goulet
c20732e423
fallbackdir: Update files from latest 047 release
...
We need the fallbackdir file to be the same so our release CI can
generate a new list and apply it uniformly on all series.
(Same as geoip)
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-06 09:59:27 -05:00
David Goulet
8b345f8ced
geoip: Update files from latest 047 release
...
We need all geoip files to be the same so our release CI can generate a
new list and apply it uniformly on all series.
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-12-06 09:47:55 -05:00
David Goulet
60f70be547
Merge branch 'maint-0.4.7'
2022-12-06 08:56:05 -05:00
David Goulet
01efb15496
Merge branch 'maint-0.4.5' into maint-0.4.7
2022-12-06 08:56:04 -05:00
David Goulet
9a06fee5a1
Merge branch 'maint-0.4.7'
2022-12-05 13:23:34 -05:00
Mike Perry
a51cd9a569
Ticket 40724: Add metrics for CC circuit counts
2022-12-02 21:50:59 +00:00
Mike Perry
07b521560f
Ticket 40724: Additional congestion control metrics
2022-12-01 22:19:08 +00:00
Roger Dingledine
72b04a5aa4
dirauth: rotate moria1 keys and ports
...
Rotate the relay identity key and v3 identity key for moria1. They
have been online for more than a decade, there was a known potential
compromise, and anyway refreshing keys periodically is good practice.
Advertise new ports too, to avoid confusion.
Closes ticket 40722.
2022-11-29 20:33:58 -05:00
Rasmus Dahlberg
15efc25fb5
dns: Make TTLs fuzzy at exit relays
...
This change mitigates DNS-based website oracles by making the time that
a domain name is cached uncertain (+- 4 minutes of what's measurable).
Resolves TROVE-2021-009.
Fixes #40674
2022-11-28 10:25:06 -05:00
Rasmus Dahlberg
be7afe658e
Clip DNS TTL values once in event callback
...
This change ensures that other parts of the code base always operate on
the same clipped TTL values, notably without being aware of clipping.
2022-11-28 10:25:04 -05:00
David Goulet
21121eb231
Merge branch 'tor-gitlab/mr/652'
2022-11-28 09:37:12 -05:00
David Goulet
c408d0a7f9
Merge branch 'tor-gitlab/mr/657'
2022-11-28 09:35:53 -05:00
David Goulet
3ac08ac200
Merge branch 'tor-gitlab/mr/658'
2022-11-28 09:33:32 -05:00
Vinícius Zavam
642e56bdb6
perform proper 'OR' while checking defined vars
...
* the || is not possible with #ifdef statement;
* here the #ifdef turns into '#if defined()'.
2022-11-27 18:41:09 +00:00
qontinuum
0b015c9731
Rely on kernel errno when logging resource exhaustion
...
Signed-off-by: qontinuum <qontinuum@monaco.mc>
2022-11-25 19:38:48 +01:00
David Goulet
04d8753676
Merge branch 'maint-0.4.7'
2022-11-23 14:54:43 -05:00
David Goulet
fbc9e92fdb
relay: Use the configured number of threads for worker work calculation
...
We cap our number of CPU worker threads to at least 2 even if we have a
single core. But also, before we used to always add one extra thread
regardless of the number of core.
This meant that we were off when re-using the get_num_cpus() function
when calculating our onionskin work overhead because we were always off
by one.
This commit makes it that we always use the number of thread our actual
thread pool was configured with.
Fixes #40719
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-23 14:05:10 -05:00
David Goulet
b9de73e46e
cpu: Set number of threads to number of cores
...
Cap this to 2 threads always because we need a low and high priority
thread even with a single core.
Fixes #40713
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-23 13:52:36 -05:00
David Goulet
8713d9762a
log: Remove extra newline in a log statement
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-23 13:28:22 -05:00
Tor CI Release
cca19a4099
version: Bump version to 0.4.7.11-dev
2022-11-10 10:21:05 -05:00
Tor CI Release
ffcb8a76af
version: Bump version to 0.4.7.11
2022-11-10 09:51:29 -05:00
David Goulet
e14c4fe771
Merge branch 'maint-0.4.7'
2022-11-10 09:44:52 -05:00
Tor CI Release
58bd4e0899
fallbackdir: Update list generated on November 10, 2022
2022-11-10 09:43:55 -05:00
Tor CI Release
e39be4a14f
Update geoip files to match ipfire location db, 2022/11/10.
2022-11-10 09:43:47 -05:00
David Goulet
b5afc7d62a
Merge branch 'maint-0.4.7'
2022-11-10 09:30:42 -05:00
David Goulet
e94c27c0ab
metrics: Split cc with counters and gauges
...
Part of #40712
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-10 08:57:39 -05:00
David Goulet
2737037ccd
metrics: Split connections with a counter and gauge
...
Created and Rejected connections are ever going up counters. While
Opened connections are gauges going up and down.
Fixes #40712
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-10 07:29:18 -05:00
David Goulet
f39f8b30f4
Merge branch 'maint-0.4.7'
2022-11-09 15:35:58 -05:00
David Goulet
c13dc8b08a
Merge branch 'ticket40674_047_01' into maint-0.4.7
2022-11-09 15:32:18 -05:00
Rasmus Dahlberg
21eac1e8d8
dns: Make TTLs fuzzy at exit relays
...
This change mitigates DNS-based website oracles by making the time that
a domain name is cached uncertain (+- 4 minutes of what's measurable).
Resolves TROVE-2021-009.
Fixes #40674
2022-11-09 15:30:43 -05:00
David Goulet
560d44b08b
Merge branch 'maint-0.4.7'
2022-11-09 15:29:04 -05:00
David Goulet
780ca741f3
relay: Cache onion queue parameters on consensus change
...
This is part of the fast path so we need to cache consensus parameters
instead of querying it everytime we need to learn a value.
Part of #40704
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 15:12:51 -05:00
David Goulet
e3f6908984
relay: Make the max pending tasks per CPU a consensus parameter
...
Until now, there was this magic number (64) used as the maximum number
of tasks a CPU worker can take at once.
This commit makes it a consensus parameter so our future selves can
think of a better value depending on network conditions.
Part of #40704
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 13:13:21 -05:00
David Goulet
9c8c7804d5
relay: Add the onion_queue_wait_cutoff consensus param
...
Transform the hardcoded value ONIONQUEUE_WAIT_CUTOFF into a consensus
parameter so we can control it network wide.
Closes #40704
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 11:57:32 -05:00
David Goulet
93523ed0d6
relay: Make MaxOnionQueueDelay into a consensus param
...
Part of #40704
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-09 11:57:32 -05:00
David Goulet
bd055a258a
Merge branch 'maint-0.4.7'
2022-11-09 11:51:52 -05:00
David Goulet
4db03ac360
Merge branch 'tor-gitlab/mr/654' into maint-0.4.7
2022-11-09 11:51:46 -05:00
Mike Perry
04fafeb2dd
metrics: Reorganize state labels so rate() can be applied
...
Part of #40708 .
2022-11-09 11:48:42 -05:00
Mike Perry
09d32ac667
metrics: Use N_EWMA for moving avg, with N=100.
...
Part of #40708 .
2022-11-09 11:48:42 -05:00
David Goulet
8b8873b759
Merge branch 'maint-0.4.7'
2022-11-08 15:26:44 -05:00
David Goulet
5b0103cfb4
Merge branch 'tor-gitlab/mr/651' into maint-0.4.7
2022-11-08 15:25:08 -05:00
Mike Perry
59bef48490
metrics: Record percentage of blocked channels
...
Part of #40708 .
2022-11-08 18:25:07 +00:00
David Goulet
56ee2131f1
Merge branch 'maint-0.4.7'
2022-11-08 12:47:17 -05:00
Mike Perry
00633bc619
metrics: Report amount of cwnd drop from delta and gamma
...
Part of #40708 .
2022-11-08 12:47:14 -05:00
David Goulet
2adc73afdb
Merge branch 'maint-0.4.7'
2022-11-08 12:36:44 -05:00
David Goulet
fde87096c3
Merge branch 'tor-gitlab/mr/650' into maint-0.4.7
2022-11-08 12:36:19 -05:00
David Goulet
d634a5ebc7
relay: Remove unused conn->ext_or_conn_id
...
This also incidently removes a use of uninitialized stack data from the
connection_or_set_ext_or_identifier() function.
Fixes #40648
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-08 12:35:09 -05:00
David Goulet
2066e0494c
math: Replace naughty macro by an inline function
...
Part of #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-07 14:49:41 -05:00
Mike Perry
fec9757a37
metrics: Add flow control metrics.
...
Part of #40708 .
2022-11-07 09:55:06 -05:00
Mike Perry
2f7e05d89d
metrics: Add stats when the clock stalls.
...
Part of #40708 .
2022-11-07 09:55:06 -05:00
Mike Perry
83fdaff7c0
metrics: Add running average of CC cwnd in slow start when closing circuit
...
Count slow start separately.
Part of #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-07 09:55:06 -05:00
David Goulet
62ce557b0b
metrics: Add stats when reaching vegas delta or ss_cwnd_max
...
Part of #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-07 09:55:06 -05:00
David Goulet
a0e72fcb97
metrics: Add running average of CC cwnd when closing circuit
...
Part of #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-07 09:55:06 -05:00
David Goulet
c565ef9c58
metrics: Add running average of CC cwnd when exiting slow start
...
Part of #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-07 09:55:06 -05:00
Vinícius Zavam
bd64e6bd08
fix: %s/param.sh/param.h
...
while here also reflect the check for __NETBSD_SOURCE on
tor_libc_get_version_str
2022-11-05 20:51:26 +00:00
Vinícius Zavam
cc95be8e17
fix: we shall not produce warnings compiling tor
2022-11-05 20:49:04 +00:00
Vinícius Zavam
64f8490ede
present __DragonFly_version, from DragonFlyBSD
2022-11-05 18:58:59 +00:00
Vinícius Zavam
2077b880d8
once NetBSD was presented, return its version
...
* defined by __NetBSD_Version__ on <sys/param.h> too.
2022-11-05 18:46:09 +00:00
Vinícius Zavam
8a879395ab
make tor_libc_get_name aware of NetBSD
...
* __NETBSD_SOURCE was used here to verify if we are running on NetBSD
2022-11-05 18:41:17 +00:00
Vinícius Zavam
c98ec6d001
return what OpenBSD gives as base system version
...
* it also uses sys/param.h to track its version;
* present that to tor_libc_get_version_str() as libc version;
while here, we also fix the return of FreeBSD version
* __FreeBSD_version is the correct var tracking the OSVERSION
2022-11-05 18:38:04 +00:00
Vinícius Zavam
9c7f919d6f
should we identify __FreeBSD__, return its version
...
* we use OSVERSION here (defined by __FreeBSD__);
* it's part of the <sys/param.h> include;
* that tracks all noteworthy changes made to the base system.
2022-11-05 18:31:46 +00:00
Vinícius Zavam
dba3090a68
return BSD if tor_libc_get_name sees __BSD_VISIBLE
...
* __BSD_VISIBLE is defined by systems like FreeBSD and OpenBSD;
* that also extends to DragonFlyBSD;
* it's used on stdlib.h and ctypes.h on those systems.
2022-11-05 18:17:12 +00:00
David Goulet
6196e9596a
metrics: Add connection socket family to metrics
...
Adds either ipv4 or ipv6 to the "tor_relay_connections_total" stats.
Closes #40710
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-03 13:05:21 -04:00
David Goulet
87e820a0c5
metrics: Add stats for num circ reaching max cell outq
...
Part of #40708
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-11-03 09:37:38 -04:00
Rasmus Dahlberg
0fe2096144
Clip DNS TTL values once in event callback
...
This change ensures that other parts of the code base always operate on
the same clipped TTL values, notably without being aware of clipping.
2022-11-01 09:29:19 -04:00
David Goulet
b04705305b
Merge branch 'tor-gitlab/mr/649'
2022-11-01 09:14:33 -04:00
David Goulet
15e5b203cd
Merge branch 'tor-gitlab/mr/594'
2022-11-01 09:11:29 -04:00
Alexander Færøy
75d12dffe7
Remove BUG()
in Windows process read callback.
...
This BUG() was added when the code was written to see if this callback
was ever executed after we marked the handle as EOF. It turns out, it
does, but we handle it gracefully. We can therefore remove the BUG().
Fixes tpo/core/tor#40596.
2022-11-01 11:11:20 +01:00
David Goulet
c733ccda99
Merge branch 'tor-gitlab/mr/579'
2022-10-31 15:28:36 -04:00
David Goulet
2a838c196d
Merge branch 'maint-0.4.7'
2022-10-31 15:00:15 -04:00
David Goulet
3596d193be
Merge branch 'tor-gitlab/mr/636'
2022-10-31 14:15:00 -04:00
David Goulet
619dd35321
sandbox: Add my-consensus-<flavor-name> to sandbox for dirauth
...
Fixese #40663
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-31 11:37:43 -04:00
David Goulet
65a85a9d23
Merge branch 'maint-0.4.7'
2022-10-31 11:21:21 -04:00
David Goulet
19b080f2aa
Merge branch 'tor-gitlab/mr/646'
2022-10-28 12:07:51 -04:00
David Goulet
5db238f3e3
thread: Bump max detectable CPU from 16 to 128
...
Lets take advantage of those beefy machines ;).
Closes #40703
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-28 11:28:43 -04:00
Jeremy Saklad
7e80ad4787
relay: Skip warnings for single onion services
...
Single onion services are not secret, so there is no added risk from
using accounting or running a relay in the same instance.
Related to #40691
2022-10-28 09:15:14 -05:00
Roger Dingledine
338185d840
resolve a BUG() on relays at startup
...
Remove a harmless "Bug" log message that can happen in
relay_addr_learn_from_dirauth() on relays during startup:
tor_bug_occurred_(): Bug: ../src/feature/relay/relay_find_addr.c:225: relay_addr_learn_from_dirauth: Non-fatal assertion !(!ei) failed. (on Tor 0.4.7.10 )
Bug: Tor 0.4.7.10: Non-fatal assertion !(!ei) failed in relay_addr_learn_from_dirauth at ../src/feature/relay/relay_find_addr.c:225. Stack trace: (on Tor 0.4.7.10 )
Finishes fixing bug 40231.
Fixes bug 40523; bugfix on 0.4.5.4-rc.
2022-10-27 20:07:48 -04:00
David Goulet
3c58fa8a6f
Merge branch 'maint-0.4.7'
2022-10-27 11:41:48 -04:00
David Goulet
72f52d2c85
Merge branch 'tor-gitlab/mr/644' into maint-0.4.7
2022-10-27 11:41:43 -04:00
David Goulet
0918cc2783
Merge branch 'maint-0.4.7'
2022-10-27 11:41:26 -04:00
David Goulet
6d40e980fb
metrics: Treat relay connections as gauge, not counter
...
Fixes #40699
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 11:37:21 -04:00
David Goulet
177f3a40eb
metrics: Add number of opened circuits to MetricsPort
...
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 10:48:52 -04:00
David Goulet
1a2d93f72a
relay: Add our consensus relay flag to MetricsPort
...
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 10:48:52 -04:00
David Goulet
48ab17cc72
metrics: Add traffic related stats to MetricsPort
...
At this commit, bytes read and written are exported.
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 10:48:48 -04:00
David Goulet
cd7be492d1
relay: Add DoS subsystem stats to MetricsPort
...
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 10:47:56 -04:00
David Goulet
fff2b92682
Merge branch 'maint-0.4.7'
2022-10-27 10:46:54 -04:00
David Goulet
a1c40c8511
metrics: Fix naming and documentation
...
After nickm's review, minor changes to names and comments.
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-27 10:45:08 -04:00
David Goulet
dcbedc6c3f
Merge branch 'tor-gitlab/mr/596'
2022-10-26 15:27:03 -04:00
David Goulet
06a26f1872
relay: Change the connection metrics name
...
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 15:16:48 -04:00
David Goulet
00f714b374
relay: Add CC RTT reset stats to MetricsPort
...
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 15:16:48 -04:00
David Goulet
e7e18ae914
relay: Add total number of streams seen on MetricsPort
...
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 15:16:48 -04:00
David Goulet
98b98fd3ce
rephist: Track number of streams seen per type
...
Related to #40194
Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 15:16:48 -04:00
David Goulet
dd272b6ef4
Merge remote-tracking branch 'tor-gitlab/mr/638'
2022-10-26 15:12:54 -04:00