1. 27 Oct, 2020 8 commits
  2. 23 Oct, 2020 1 commit
    • Nick Mathewson's avatar
      Update required/recommended protocol lists more systematically · fd58e74d
      Nick Mathewson authored
      First I began with a set of candidates:
      
        The client's _required_ list starts with all the protocols
        supported by every release in 0.2.9-stable through current
        master.
      
        The client's _required_ list starts with all the protocols
        supported by every release in 0.3.5-stable through current
        master.
      
        Everybody's _recommended_ list starts with all the protocols
        supported by every release in 0.3.5-stable through current master.
      
      Then I removed the protocol versions that we do not actually want to
      require or recommend:
      
        DirCache=1 (deprecated)
        HSDir=1, HSIntro=1-3, HSRend=1 (deprecated)
        (All HS* protocol requirements for clients)
        Link=1-3 (deprecated)
        LinkAuth=1 (obsolete)
        Relay=1 (obsolete)
      fd58e74d
  3. 22 Oct, 2020 1 commit
    • Roger Dingledine's avatar
      Turn ConsensusParams into a Linelist · 00118355
      Roger Dingledine authored
      Make it possible to specify multiple ConsensusParams torrc
      lines.
      
      Now directory authority operators can for example put the
      main ConsensusParams config in one torrc file and then add to it
      from a different torrc file.
      
      Closes ticket 40164.
      00118355
  4. 21 Oct, 2020 2 commits
  5. 20 Oct, 2020 2 commits
    • Guinness's avatar
      Set is_padding_timer_scheduled to 0 · 0668437b
      Guinness authored
      When calling `circpad_send_padding_cell_for_callback()`, the flag
      `is_padding_timer_scheduled` was not resetted to 0 which caused an issue
      in the circpad simulator.
      This commit fixes this problem.
      
      Fixes #32671.
      0668437b
    • Guinness's avatar
      Consider 301 as an error like 404 · 5248d08e
      Guinness authored and Nick Mathewson's avatar Nick Mathewson committed
      Tor does not follow redirects when bootstraping so we encountered an
      error.
      
      Fixes #40053
      5248d08e
  6. 19 Oct, 2020 2 commits
  7. 18 Oct, 2020 2 commits
    • Nick Mathewson's avatar
      Update required/recommended protocol versions. · d872c692
      Nick Mathewson authored
        Cons=1 is the old format of consensuses, without ed25519 keys. It
        is no longer required or recommended.
      
        Cons=2 is the new format of consensuses, with ed25519 keys. It
        is now required.
      
        (Similarly for Desc=1,2 and Microdesc=1,2)
      
      No supported client or relay versions should be affected by this
      change, since these versions are supported by clients and relays
      running 0.2.9 and later.  It will only take effect once enough
      authorities vote for it.
      
      Closes ticket 40162.
      d872c692
    • Nick Mathewson's avatar
      Split required/recommended protocol lists into multiple lines · 4298d877
      Nick Mathewson authored
      This should make diffs easier to read.
      4298d877
  8. 15 Oct, 2020 3 commits
  9. 13 Oct, 2020 3 commits
  10. 08 Oct, 2020 1 commit
  11. 07 Oct, 2020 4 commits
  12. 06 Oct, 2020 5 commits
    • Alexander Færøy's avatar
      Expose TOR_PT_OUTBOUND_BIND_ADDRESS_{V4,V6} to Pluggable Transports. · 5f61e19d
      Alexander Færøy authored and David Goulet's avatar David Goulet committed
      This patch adds support for exposing the environment variables
      `TOR_PT_OUTBOUND_BIND_ADDRESS_V4` and `TOR_PT_OUTBOUND_BIND_ADDRESS_V6` to
      Pluggable Transport proccesses. These two values will contain the IPv4
      and IPv6 address that the user have specified in torrc that they wish
      the PT to use for all outgoing IP packets.
      
      It is important to note here that it is up to the indvidual Pluggable
      Transport if they are willing to honor these values or ignore them
      completely.
      
      One can test this feature using the following dummy PT written in POSIX
      shell script:
      
          #!/bin/sh
      
          echo "LOG SEVERITY=warning MESSAGE=\"Value for IPv4: ${TOR_PT_OUTBOUND_BIND_ADDRESS_V4}\""
          echo "LOG SEVERITY=warning MESSAGE=\"Value for IPv6: ${TOR_PT_OUTBOUND_BIND_ADDRESS_V6}\""
      
          while true ; do
              sleep 1
          done
      
      with the following entries in your torrc:
      
          OutboundBindAddressPT 203.0.113.4
          OutboundBindAddress 203.0.113.5
          OutboundBindAddressPT 2001:db8::4
          OutboundBindAddress 2001:db8::5
      
      See: https://bugs.torproject.org/5304
      5f61e19d
    • Alexander Færøy's avatar
      Move parse logic for outbound addresses to before we handle PT's. · 69c1a4eb
      Alexander Færøy authored and David Goulet's avatar David Goulet committed
      This patch moves the logic for handling outbound addresses in torrc to
      before we handle pluggable transports. Since we need access to the
      values in OutboundBindAddress and friends for #5304 we have to parse
      these values before we spawn any PT's.
      
      This commit is code movement only.
      
      See: https://bugs.torproject.org/5304
      69c1a4eb
    • Alexander Færøy's avatar
      Rename `OUTBOUND_ADDR_EXIT_AND_OR` to `OUTBOUND_ADDR_ANY`. · ad087432
      Alexander Færøy authored and David Goulet's avatar David Goulet committed
      This patch renames the enumeration value in `outbound_addr_t` from
      `OUTBOUND_ADDR_EXIT_AND_OR` to `OUTBOUND_ADDR_ANY` since with the
      arrival of `OUTBOUND_ADDR_PT` it no longer makes sense to call the
      fallback value for "Exit and OR". Instead we rename it to "any".
      
      See: https://bugs.torproject.org/5304
      ad087432
    • Alexander Færøy's avatar
      Add `OutboundBindAddressPT` to torrc. · db0aaf42
      Alexander Færøy authored and David Goulet's avatar David Goulet committed
      This patch adds a new option to torrc: `OutboundBindAddressPT`. This
      option works in the same way as `OutboundBindAddressOR` and
      `OutboundBindAddressExit` in that it allows the user to specify which
      outbound IP address the user wants the PT to make its connections from.
      
      There is one difference though in that OutboundBindAddressPT will only
      be a suggestion for the PT to use since Tor cannot enforce whether or
      not the PT actually uses this option for anything.
      
      See: https://bugs.torproject.org/5304
      db0aaf42
    • Alexander Færøy's avatar
      Document enumeration values for `outbound_addr_t`. · 25bffccd
      Alexander Færøy authored and David Goulet's avatar David Goulet committed
      This patch adds doxygen documentation strings for each of the values in
      `outbound_addr_t`.
      
      See: https://bugs.torproject.org/5304
      25bffccd
  13. 03 Oct, 2020 1 commit
  14. 01 Oct, 2020 1 commit
  15. 28 Sep, 2020 1 commit
  16. 23 Sep, 2020 3 commits