1. 12 Jul, 2021 4 commits
  2. 06 Jul, 2021 1 commit
    • Nick Mathewson's avatar
      Use native timegm when available. · c1d96358
      Nick Mathewson authored
      Continue having a tor_gmtime_impl() unit test so that we can detect
      any problems in our replacement function; add a new test function to
      make sure that gmtime<->timegm are a round-trip on now-ish times.
      
      This is a fix for bug #40383, wherein we ran into trouble because
      tor_timegm() does not believe that time_t should include a count of
      leap seconds, but FreeBSD's gmtime believes that it should.  This
      disagreement meant that for a certain amount of time each day,
      instead of calculating the most recent midnight, our voting-schedule
      functions would calculate the second-most-recent midnight, and lead
      to an assertion failure.
      
      I am calling this a bugfix on 0.2.0.3-alpha when we first started
      calculating our voting schedule in this way.
      c1d96358
  3. 01 Jul, 2021 5 commits
  4. 29 Jun, 2021 4 commits
  5. 25 Jun, 2021 1 commit
  6. 08 Jun, 2021 1 commit
  7. 25 May, 2021 1 commit
  8. 05 May, 2021 1 commit
  9. 04 May, 2021 1 commit
    • David Goulet's avatar
      hs: Fix ADD_ONION with client authorization · cf6e72b7
      David Goulet authored
      
      
      Turns out that passing client authorization keys to ADD_ONION for v3 was
      not working because we were not setting the "is_client_auth_enabled"
      flag to true once the clients were configured. This lead to the
      descriptor being encoded without the clients.
      
      This patch removes that flag and instead adds an inline function that
      can be used to check if a given service has client authorization
      enabled.
      
      This will be much less error prone of needing to keep in sync the client
      list and a flag instead.
      
      Fixes #40378
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      cf6e72b7
  10. 23 Apr, 2021 1 commit
  11. 13 Apr, 2021 3 commits
  12. 29 Mar, 2021 1 commit
  13. 24 Mar, 2021 1 commit
  14. 23 Mar, 2021 1 commit
  15. 19 Mar, 2021 1 commit
  16. 18 Mar, 2021 1 commit
  17. 17 Mar, 2021 4 commits
  18. 12 Mar, 2021 2 commits
  19. 24 Feb, 2021 1 commit
  20. 23 Feb, 2021 4 commits
    • David Goulet's avatar
      Remove mallinfo() from codebase · ad4f87ed
      David Goulet authored
      
      
      Now deprecated in libc >= 2.33
      
      Closes #40309
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      ad4f87ed
    • David Goulet's avatar
      Remove mallinfo() from codebase · 296a557b
      David Goulet authored
      
      
      Now deprecated in libc >= 2.33
      
      Closes #40309
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      296a557b
    • David Goulet's avatar
      relay: Avoid a directory early fetch · 39d0f69d
      David Goulet authored
      
      
      The directory_fetches_from_authorities() is used to know if a client or relay
      should fetch data from an authority early in the boot process.
      
      We had a condition in that function that made a relay trigger that fetch if it
      didn't know its address (so we can learn it). However, when this is called,
      the address discovery has not been done yet so it would always return true for
      a relay.
      
      Furthermore, it would always trigger a log notice that the IPv4 couldn't be
      found which was inevitable because the address discovery process has not been
      done yet (done when building our first descriptor).
      
      It is also important to point out that starting in 0.4.5.1-alpha, asking an
      authority for an address is done during address discovery time using a one-hop
      circuit thus independent from the relay deciding to fetch or not documents
      from an authority.
      
      Small fix also is to reverse the "IPv(4|6)Only" flag in the notice so that if
      we can't find IPv6 it would output to use IPv4Only.
      
      Fixes #40300
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      39d0f69d
    • David Goulet's avatar
      dos: Change the DoS heartbeat line format · c9646525
      David Goulet authored
      Fix a bug introduced in 94b56eaa
      
       which
      overwrite the connection message line.
      
      Furthermore, improve how we generate that line by using a smartlist and change
      the format so it is clearer of what is being rejected/detected and, if
      applicable, which option is disabled thus yielding no stats.
      
      Closes #40308
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      c9646525
  21. 22 Feb, 2021 1 commit