- Nov 12, 2020
-
-
Typos found with codespell. Please keep in mind that this should have impact on actual code and must be carefully evaluated: src/core/or/lttng_circuit.inc - ctf_enum_value("CONTROLER", CIRCUIT_PURPOSE_CONTROLLER) + ctf_enum_value("CONTROLLER", CIRCUIT_PURPOSE_CONTROLLER)
-
- Oct 28, 2020
-
-
Nick Mathewson authored
It was deprecated 0.3.1.1-alpha. According to #22473, nothing uses it. Closes #22473.
-
Nick Mathewson authored
The loop in the earlier patch would invoke undefined behavior in two ways: First, it would check whether it was looking at a space before it checked whether the pointer was in-range. Second, it would let a pointer reach a position _before_ the start of a string, which is not allowed. I've removed the assertion about empty messages: empty messages can be their own warning IMO. I've also added tests for this formatting code, to make sure it actually works.
-
-
- Oct 27, 2020
-
-
Neel Chauhan authored
-
David Goulet authored
Closes #40063 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Tracks the total number of established introduction circuit. Related to #40063 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The total number of rendezvous circuit created and the number of established ones which is a gauge that decreases to keep an updated counter. Related to #40063 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Related to #40063 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
At this commit, a new service registers to the module and a store is created. It also remove itself from the metrics module if it goes away. In order to hook into the metrics subsystem, this commit attaches the HS subsystem into the subsystem global list so its get_metrics() call can be accessible. HS initialization is still _not_ done through the subsys module as it is likely require much more testing. Related to #40063 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
If MetricsPort is defined, listen on it and handle the incoming request. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Related to #40063 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 23, 2020
-
-
Nick Mathewson authored
First I began with a set of candidates: The client's _required_ list starts with all the protocols supported by every release in 0.2.9-stable through current master. The client's _required_ list starts with all the protocols supported by every release in 0.3.5-stable through current master. Everybody's _recommended_ list starts with all the protocols supported by every release in 0.3.5-stable through current master. Then I removed the protocol versions that we do not actually want to require or recommend: DirCache=1 (deprecated) HSDir=1, HSIntro=1-3, HSRend=1 (deprecated) (All HS* protocol requirements for clients) Link=1-3 (deprecated) LinkAuth=1 (obsolete) Relay=1 (obsolete)
-
- Oct 22, 2020
-
-
Roger Dingledine authored
Make it possible to specify multiple ConsensusParams torrc lines. Now directory authority operators can for example put the main ConsensusParams config in one torrc file and then add to it from a different torrc file. Closes ticket 40164.
-
- Oct 21, 2020
-
-
Jigsaw52 authored
Affected entries are: EntryNodes, ExcludeNodes, ExcludeExitNodes, ExitNodes, MiddleNodes, HSLayer2Nodes and HSLayer3Nodes.
-
- Oct 20, 2020
-
-
Tor does not follow redirects when bootstraping so we encountered an error. Fixes #40053
-
- Oct 19, 2020
-
-
Nick Mathewson authored
Also, explain why it's relevant for bootstrapping. This is a comments-only patch.
-
Nick Mathewson authored
-
- Oct 18, 2020
-
-
Nick Mathewson authored
Cons=1 is the old format of consensuses, without ed25519 keys. It is no longer required or recommended. Cons=2 is the new format of consensuses, with ed25519 keys. It is now required. (Similarly for Desc=1,2 and Microdesc=1,2) No supported client or relay versions should be affected by this change, since these versions are supported by clients and relays running 0.2.9 and later. It will only take effect once enough authorities vote for it. Closes ticket 40162.
-
Nick Mathewson authored
This should make diffs easier to read.
-
- Oct 16, 2020
-
-
Nick Mathewson authored
These tests used a hardcoded vote with a hardcoded digest. That vote didn't have any pr lines, and so it is now invalid. I've adjusted the testing code so that it mocks the signature-checking, so that we can more easily change the contents of the vote.
-
- Oct 15, 2020
-
-
Nick Mathewson authored
This change breaks some unit tests; it's time to fix those in subsequent commits.
-
Nick Mathewson authored
(Or at least, to all those relay descriptions that derive from format_node_description()). Closes #22668.
-
Nick Mathewson authored
-
- Oct 08, 2020
-
-
Alex Xu authored
-
- Oct 07, 2020
-
-
If at least one service is configured as a version 2, a log warning is emitted once and only once. Closes #40003 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
- Oct 06, 2020
-
-
This patch adds support for exposing the environment variables `TOR_PT_OUTBOUND_BIND_ADDRESS_V4` and `TOR_PT_OUTBOUND_BIND_ADDRESS_V6` to Pluggable Transport proccesses. These two values will contain the IPv4 and IPv6 address that the user have specified in torrc that they wish the PT to use for all outgoing IP packets. It is important to note here that it is up to the indvidual Pluggable Transport if they are willing to honor these values or ignore them completely. One can test this feature using the following dummy PT written in POSIX shell script: #!/bin/sh echo "LOG SEVERITY=warning MESSAGE=\"Value for IPv4: ${TOR_PT_OUTBOUND_BIND_ADDRESS_V4}\"" echo "LOG SEVERITY=warning MESSAGE=\"Value for IPv6: ${TOR_PT_OUTBOUND_BIND_ADDRESS_V6}\"" while true ; do sleep 1 done with the following entries in your torrc: OutboundBindAddressPT 203.0.113.4 OutboundBindAddress 203.0.113.5 OutboundBindAddressPT 2001:db8::4 OutboundBindAddress 2001:db8::5 See: https://bugs.torproject.org/5304
-
- Oct 01, 2020
-
-
Roger Dingledine authored
no actual changes
-
- Sep 28, 2020
-
-
Nick Mathewson authored
-
- Sep 23, 2020
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
[This is a squashed patch for ticket 7193, based on taking a "git diff" for the original branch, then applying it with "git apply -3". I earlier attempted to squash the branch with "git rebase", but there were too many conflicts. --nickm]
-