- 28 May, 2020 1 commit
-
-
David Goulet authored
Add an inline helper function that indicates if the cached object contains a decrypted descriptor or not. The descriptor object is NULL if tor is unable to decrypt it (lacking client authorization) and some actions need to be done only when we have a decrypted object. This improves code semantic. Fixes #33458 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 10 Mar, 2020 4 commits
-
-
Nick Mathewson authored
-
-
-
-
- 26 Feb, 2020 4 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This should improve the usability of our configuration error messages.
-
Nick Mathewson authored
Part of 33460.
-
Nick Mathewson authored
Part of 33460.
-
- 20 Feb, 2020 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 18 Feb, 2020 1 commit
-
-
teor authored
Allow the "practracker" coding best practices checking script to read unicode files, when using Python 2. We made the script use unicode literals in 0.4.3.1-alpha, but didn't change the codec for opening files. Fixes bug 33374; bugfix on 0.4.3.1-alpha.
-
- 14 Feb, 2020 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 13 Feb, 2020 4 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Conflicts: src/core/or/circuitmux_ewma.c
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 12 Feb, 2020 13 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Attempt to diagnose 32464; fixes 33290.
-
Nick Mathewson authored
-
Taylor Yu authored
-
swati authored
-
swati authored
-
teor authored
-
teor authored
"ours" merge, because simiar BridgeDistribution fixes have already been merged to maint-0.4.3. (See 32753.) The stem changes in 33075 have already been merged to maint-0.4.3, so this "ours" merge does not affect them.
-
Fixes #28992 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
teor authored
-
teor authored
-
This patch ensures that we always lowercase the BridgeDistribution from torrc in descriptors before submitting it. See: https://bugs.torproject.org/32753
-
teor authored
-
- 11 Feb, 2020 8 commits
-
-
David Goulet authored
Conflicts: doc/tor.1.txt src/app/config/config.c src/app/config/or_options_st.h src/core/mainloop/connection.h Between 042 and 043, the dirauth options were modularized so this merge commit address this by moving the AuthDirRejectUncompressedRequests to the module along with a series of accessors. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Part of #33029 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Authorities were never sending back 503 error code because by design they should be able to always answer directory requests regardless of bandwidth capacity. However, that recently backfired because of a large number of requests from unknown source using the DirPort that are _not_ getting their 503 code which overloaded the DirPort leading to the authority to be unable to answer to its fellow authorities. This is not a complete solution to the problem but it will help ease off the load on the authority side by sending back 503 codes *unless* the connection is from a known relay or an authority. Fixes #33029 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This controls the previous feature added that makes dirauth send back a 503 error code on non relay connections if under bandwidth pressure. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The configured, within the torrc or hardcoded, directory authorities addresses are now added to the nodelist address set. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We separate v4 and v6 because we often use an IPv4 address represented with a uint32_t instead of a tor_addr_t. This will be used to also add the trusted directory addresses taken from the configuration. The trusted directories from the consensus are already added to the address set from their descriptor. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-