Skip to content
Snippets Groups Projects
  1. Oct 22, 2019
  2. Oct 17, 2019
  3. Oct 02, 2019
  4. Sep 30, 2019
    • teor's avatar
      Travis: Add a macOS chutney job, but don't wait for it to finish · 1e0e23c1
      teor authored
      Since Travis macOS has IPv6 support (and Travis Linux does not), chutney
      will now run its IPv6 networks as part of Travis CI.
      
      But since chutney is slow, don't wait for the macOS chutney to finish.
      (Travis have fixed the duplicate notification bug in fast_finish. So we
      can use fast_finish and allow_failure to finish early. Unfortunately,
      allow_failure also means we ignore failures in macOS chutney.)
      
      Also make sure that we have:
      * a compile on each platform, with each compiler,
      * a check on each platform, and
      * a check on each compiler.
      
      Finally, sort builds: allow fail last, macOS first, slowest first.
      
      Closes ticket 30860.
      Closes ticket 31859 for 0.2.9.
      Unverified
      1e0e23c1
    • teor's avatar
      Travis: Remove a redundant clang Linux job · 4e429783
      teor authored
      Part of 31859.
      Unverified
      4e429783
  5. Sep 26, 2019
  6. Sep 18, 2019
  7. Sep 09, 2019
  8. Aug 15, 2019
    • David Goulet's avatar
      dirauth: Change dizum IP address · 5a1c3e44
      David Goulet authored
      New IP address from 194.109.206.212 to 45.66.33.45.
      
      Signed request from Alex de Joode, operator of dizum:
      https://trac.torproject.org/projects/tor/ticket/31406
      
      
      
      Published descriptor by dizum on August 12th, 2019:
      
      --
      r dizum fqbq1v2DCDxTj0QDi7+gd1h911U GZmZtCLaPDQNxkhIFj8UcgTRAuA 2019-08-12 15:28:40 45.66.33.45 443 80
      s Authority Fast Running Stable V2Dir Valid
      v Tor 0.4.0.5
      pr Cons=1-2 Desc=1-2 DirCache=1-2 HSDir=1-2 HSIntro=3-4 HSRend=1-2 Link=1-5 LinkAuth=1,3 Microdesc=1-2 Relay=1-2 Padding=1
      w Bandwidth=20 Unmeasured=1
      p reject 1-65535
      --
      
      Finally, confirmed by DNS:
      
        $ dig +short tor.dizum.com
        45.66.33.45
      
      Closes #31406
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      5a1c3e44
  9. Aug 09, 2019
  10. Aug 08, 2019
  11. Aug 06, 2019
    • Nick Mathewson's avatar
      Avoid using labs() on time_t in channeltls.c · 0849d2a2
      Nick Mathewson authored
      On some windows builds, time_t is 64 bits but long is not.  This is
      causing appveyor builds to fail.
      
      Also, one of our uses of labs() on time_t was logically incorrect:
      it was telling us to accept NETINFO cells up to three minutes
      _before_ the message they were responding to, which doesn't make
      sense.
      
      This patch adds a time_abs() function that we should eventually move
      to intmath.h or something.  For now, though, it will make merges
      easier to have it file-local in channeltls.c.
      
      Fixes bug 31343; bugfix on 0.2.4.4-alpha.
      0849d2a2
  12. Jul 01, 2019
  13. Jun 28, 2019
    • teor's avatar
      changes: file for 28795 · fb977f8c
      teor authored
      Replace the 157 fallbacks originally introduced in Tor 0.3.5.6-rc
      in December 2018 (of which ~122 were still functional), with a
      list of 148 fallbacks (70 new, 78 existing, 79 removed) generated
      in June 2019.
      
      Closes ticket 28795.
      
      Note that we created extra lists from DE and US, but they didn't add
      any more fallbacks when we tried to merge them.
      Unverified
      fb977f8c
    • teor's avatar
      fallback: apply the second fallback list from 2019 · f3b2a81c
      teor authored
      Update the fallback directory mirrors by merging the current list with:
      fallback_dirs_2019-06-28-08-58-39_AU_f0437a39ddbc8459.inc
      
      Part of 28795, see that ticket for logs.
      Unverified
      f3b2a81c
    • teor's avatar
      fallback: apply the first fallback list from 2019 · 37c2808a
      teor authored
      Update the fallback directory mirrors by replacing the old list with:
      fallback_dirs_2019-06-25-11-49-10_AU_a37adb956fbb5cd2.inc
      
      Part of 28795, see that ticket for logs.
      Unverified
      37c2808a
  14. Jun 12, 2019
  15. Jun 11, 2019
  16. Jun 05, 2019
  17. May 29, 2019
    • Nick Mathewson's avatar
    • Tobias Stoeckmann's avatar
      Fixed tor_vasprintf on systems without vasprintf. · 0d5a0b4f
      Tobias Stoeckmann authored and Nick Mathewson's avatar Nick Mathewson committed
      
      If tor is compiled on a system with neither vasprintf nor _vscprintf,
      the fallback implementation exposes a logic flaw which prevents
      proper usage of strings longer than 127 characters:
      
      * tor_vsnprintf returns -1 if supplied buffer is not large enough,
        but tor_vasprintf uses this function to retrieve required length
      * the result of tor_vsnprintf is not properly checked for negative
        return values
      
      Both aspects together could in theory lead to exposure of uninitialized
      stack memory in the resulting string. This requires an invalid format
      string or data that exceeds integer limitations.
      
      Fortunately tor is not even able to run with this implementation because
      it runs into asserts early on during startup. Also the unit tests fail
      during a "make check" run.
      
      Signed-off-by: default avatarTobias Stoeckmann <tobias@stoeckmann.org>
      
        [backported to 0.2.9 by nickm]
      0d5a0b4f
  18. May 17, 2019
  19. Apr 30, 2019
Loading