- 15 Feb, 2021 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 12 Feb, 2021 8 commits
-
-
David Goulet authored
-
David Goulet authored
The comment of that specific unit test wanted 4 ORPorts but for some reasons we tested for 3 which before the previous commit related to #40289, test would pass but it was in fact wrong. Now the code is correct and 4 was in fact correct expected number of ports. Related to #40289 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We were just looking at the family which is not correct because it is possible to have two explicit ORPort for the same family but different addresses. One example is: ORPort 127.0.0.1:9001 NoAdvertise ORPort 1.2.3.4:9001 NoListen Thus, this patch now ignores ports that have different addresses iff they are both explicits. That is, if we have this example, also two different addresses: ORPort 9001 ORPort 127.0.0.1:9001 NoAdvertise The first one is implicit and second one is explicit and thus we have to consider them for removal which in this case would remove the "ORPort 9001" in favor of the second port. Fixes #40289 Signe-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
Alexander Færøy authored
-
George Kadianakis authored
-
George Kadianakis authored
-
- 11 Feb, 2021 1 commit
-
-
David Goulet authored
Fun bug where we thought we were using the default "false" value when an implicit address was detected but if we had an explicit address before, the flag was set to true and then we would only use that value. And thus, for some configurations, implicit addresses would be flagged as explicit and then configuring ports goes bad. Related to #40289 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 10 Feb, 2021 2 commits
-
-
David Goulet authored
In other words, if PublishServerDescriptor is set to 0 and AssumeReachable to 1, then allow a relay to hold a RFC1918 address. Reasons for this are documented in #40208 Fixes #40208 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
That comes from 685c4866 which added that check correctly except for when we build a descriptor. We already omit the IPv6 address, if we need to, when we encode the descriptor but we need to keep the actual discovered address in the descriptor so we can notice future IP changes and be able to assess that we are not publishable as long as we don't specifically set the omit flag. This lead to also having tor noticing that our IP changed from <nothing> (no IPv6 in the descriptor) to a discovered one which would trigger every minute. Fixes #40279, #40288 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 08 Feb, 2021 6 commits
-
-
Nick Mathewson authored
-
Handle the EOF situation for a metrics connection. Furthermore, if we failed to fetch the data from the inbuf properly, mark the socket as closed because the caller, connection_process_inbuf(), assumes that we did so on error. Fixes #40257 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
Previously we would warn in this case... but there's really no justification for doing so, and it can only cause confusion. Fixes bug #40281; bugfix on 0.4.0.1-alpha.
-
David Goulet authored
In two instances we must look at this flag: 1. When we build the descriptor so the IPv6 is NOT added to the descriptor in case we judge that we need to omit the address but still publish. 2. When we are deciding if the descriptor is publishable. This flags tells us that the IPv6 was not found reachable but we should still publish. Fixes #40279 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
Closes #40221
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 05 Feb, 2021 10 commits
-
-
Alexander Færøy authored
-
Alexander Færøy authored
Unreviewed build fix. Discussed the cnage on IRC with Nick.
-
Alexander Færøy authored
-
Alexander Færøy authored
This was a bad copy and paste error from the previous commit which generated a duplicated entry error from practracker. Unreviewed build fix. See: tor#40275.
-
Alexander Færøy authored
-
Alexander Færøy authored
We solve this error by allowing the connection_exit_connect() function to be 130 lines long. Unreviewed build fix commit. See: tor#40275.
-
Alexander Færøy authored
While trying to resolve our CI issues, the Windows build broke with an unused function error: src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’ defined but not used [-Werror=unused-function] We solve this by moving the `#if !defined(_WIN32)` test above the `unprivileged_port_range_start()` function defintion such that it is included in its body. This is an unreviewed commit. See: tor#40275
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
We currently assume that the only way for Tor to listen on ports in the privileged port range (1 to 1023), on Linux, is if we are granted the NET_BIND_SERVICE capability. Today on Linux, it's possible to specify the beginning of the unprivileged port range using a sysctl configuration option. Docker (and thus the CI service Tor uses) recently changed this sysctl value to 0, which causes our tests to fail as they assume that we should NOT be able to bind to a privileged port *without* the NET_BIND_SERVICE capability. In this patch, we read the value of the sysctl value via the /proc/sys/ filesystem iff it's present, otherwise we assume the default unprivileged port range begins at port 1024. See: tor#40275
-
- 03 Feb, 2021 11 commits
-
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-