- Jan 22, 2021
-
-
Nick Mathewson authored
-
- Jan 21, 2021
-
-
George Kadianakis authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
otherwise src/core is ignored.
-
George Kadianakis authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Generates the compile_commands.json file using the "bear" application so the ccls server can be more efficient with our code base. Closes #40227 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
Give more visibility to directory authority operators during the consensus voting process. Closes ticket 40245.
-
This step happens after we make each consensus flavor, and before we worry about sigs or anything. That way if Tor crashes, or if we fail to get enough sigs, we still have a chance to know what consensus we wanted to make.
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
In addition to simplifying callsites a little, this function gives correct behavior for bridges without a configured transport.
-
Nick Mathewson authored
-
David Goulet authored
-
- Jan 20, 2021
-
-
David Goulet authored
This validation was only done if DisableNetwork was off because we would use the global list of transports/bridges and DisableNetwork would not populate it. This was a problem for any user using DisableNetwork which includes Tor Browser and thus leading to the Bug() warning. Without a more in depth refactoring, we can't do this validation without the global list. The previous commit makes it that any connection to a bridge without a transport won't happen thus we keep the security feature of not connecting to a bridge without its corresponding transport. Related to #40106 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Don't pick the bridge as the guard or launch descriptor fetch if no transport is found. Fixes #40106 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Hansen Færøy authored
This patch limits the number of items in the consensus diff cache to 64 on the Windows platform. Hopefully, this will allow us to investigate a smarter fix while avoiding the situation reported in tor#24857 where Windows relay operators report Tor using 100% CPU. See: tor#24857
-
- Jan 19, 2021
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
When selecting the first advertised port, we always prefer the one with an explicit address. Closes #40246 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We used to actually discard ORPorts that were the same port and same family but they could have different address. Instead, we need to keep all different ORPorts so we can bind a listener on each of them. We will publish only one of these in our descriptor though. Related to #40246 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Alexander Hansen Færøy authored
This patch removes a call to `tor_assert_nonfatal()` if `extend_info_from_node()` returns NULL. This is unnecessary as we already handle the case where `info` is NULL in the next `if (!info) { ... }` block in the code. See: tor#32666.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jan 15, 2021
-
-
David Goulet authored
This reverts commit d07f17f6. We don't want to consider an entire routable IPv6 network as sybil if more than 2 relays happen to be on it. For path selection it is very important but not for selecting relays in the consensus. Fixes #40243
-