- Sep 13, 2021
-
-
David Goulet authored
-
David Goulet authored
-
Alexander Hansen Færøy authored
We currently assume that the only way for Tor to listen on ports in the privileged port range (1 to 1023), on Linux, is if we are granted the NET_BIND_SERVICE capability. Today on Linux, it's possible to specify the beginning of the unprivileged port range using a sysctl configuration option. Docker (and thus the CI service Tor uses) recently changed this sysctl value to 0, which causes our tests to fail as they assume that we should NOT be able to bind to a privileged port *without* the NET_BIND_SERVICE capability. In this patch, we read the value of the sysctl value via the /proc/sys/ filesystem iff it's present, otherwise we assume the default unprivileged port range begins at port 1024. See: #40275
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
- Aug 16, 2021
-
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
This will hopefully solve an issue where our gmtime related tests are failing on 32-bit builds.
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Since we merged 40383, we don't expect these to give the same warning on every platform.
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid version bump
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid version bump
-
Nick Mathewson authored
-
- Aug 13, 2021
-
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Aug 12, 2021
-
-
David Goulet authored
-
David Goulet authored
-
Alexander Hansen Færøy authored
-
- Aug 11, 2021
-
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
Fixes bug 40078. As reported by hdevalence our batch verification logic can cause an assert crash. The assert happens because when the batch verification of ed25519-donna fails, the code in `ed25519_checksig_batch()` falls back to doing a single verification for each signature. The crash occurs because batch verification failed, but then all signatures individually verified just fine. That's because batch verification and single verification use a different equation which means that there are sigs that can pass single verification but fail batch verification. Fixing this would require modding ed25519-donna which is not in scope for this ticket, and will be soon deprecated in favor of arti and ed25519-dalek, so my branch instead removes batch verification.
-
Alexander Hansen Færøy authored
-
David Goulet authored
New list for all stable releases. Closes #40447 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Hansen Færøy authored
-
Fixes #40301 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-