- Apr 11, 2021
-
-
n0toose authored
Signed-off-by: Panagiotis Vasilopoulos <hello@alwayslivid.com>
-
- Apr 08, 2021
-
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
- Apr 05, 2021
-
-
George Kadianakis authored
-
- Apr 02, 2021
-
-
Nick Mathewson authored
-
- Mar 29, 2021
-
-
George Kadianakis authored
- Also fix the vector producing script to work with python3.
-
- Mar 28, 2021
-
-
Jigsaw52 authored
-
- Mar 26, 2021
-
-
Jigsaw52 authored
On Linux systems, glob automatically ignores the errors ENOENT and ENOTDIR because they are expected during glob expansion. But BSD systems do not ignore these, resulting in glob failing when globs expand to invalid paths. This is fixed by adding a custom error handler that ignores only these two errors and removing the GLOB_ERR flag as it makes glob fail even if the error handler ignores the error and is unnecessary as the error handler will make glob fail on all other errors anyway.
-
- Mar 24, 2021
-
-
Jigsaw52 authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Closes #40348.
-
George Kadianakis authored
-
- Mar 23, 2021
-
-
David Goulet authored
-
(If you need to do this in an older version you can just set DormantClientTimeout to something huge.) Closes #40228.
-
David Goulet authored
Fortunately, our tor_free() is setting the variable to NULL after so we were in a situation where NULL was always used instead of the transport name. This first appeared in 894ff2dc and results in basically no bridge with a transport being able to use DoS defenses. Fixes #40345 Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Closes #40346 Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
- Mar 22, 2021
-
-
Nick Mathewson authored
patch from cypherpunks; closes #40323
-
George Kadianakis authored
Fixes bug #40296 .
-
- Mar 19, 2021
-
-
Nick Mathewson authored
Closes #40322.
-
Nick Mathewson authored
Patch from 'cypherpunks'. Closes #40331.
-
Nick Mathewson authored
This incorporates a suggestion from cypherpunks on #40321 Closes #40321.
-
- Mar 18, 2021
-
-
Nick Mathewson authored
-
Nick Mathewson authored
We use it in router.c, where chunks are joined with "", not with NL... so leaving off the terminating NL will lead to an unparseable extrainfo. Found by toralf. Bug not in any released Tor.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Mar 17, 2021
-
-
George Kadianakis authored
``` src/feature/stats/rephist.c: In function ‘overload_happened_recently’: src/feature/stats/rephist.c:215:21: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare] if (overload_time > approx_time() - 3600 * n_hours) { ``` from tpo/core/tor#40341 (comment 2729364)
-
Clients now check whether their streams are attempting to re-enter the Tor network (i.e. to send Tor traffic over Tor), and they close them preemptively if they think exit relays will refuse them. See bug 2667 for details. Resolves ticket 40271.
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
This uses a heuristic that came up after a discussion with David. I'm leaving this as a separate commit so that it can be discussed further if needed.
-
George Kadianakis authored
- OOM metric - onionskin overload metric - DNS timeout metric
-
George Kadianakis authored
- Implement overload statistics structure. - Implement function that keeps track of overload statistics. - Implement function that writes overload statistics to descriptor. - Unittest for the whole logic.
-
David Goulet authored
-