Skip to content
Snippets Groups Projects
  1. Feb 11, 2021
    • David Goulet's avatar
      config: Set flag for implicit port address · 80b33ae1
      David Goulet authored
      
      Fun bug where we thought we were using the default "false" value when an
      implicit address was detected but if we had an explicit address before, the
      flag was set to true and then we would only use that value.
      
      And thus, for some configurations, implicit addresses would be flagged as
      explicit and then configuring ports goes bad.
      
      Related to #40289
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      80b33ae1
  2. Feb 08, 2021
  3. Feb 05, 2021
    • Alexander Hansen Færøy's avatar
      Fix Windows build. · af9107af
      Alexander Hansen Færøy authored
      While trying to resolve our CI issues, the Windows build broke with an
      unused function error:
      
         src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’
         defined but not used [-Werror=unused-function]
      
      We solve this by moving the `#if !defined(_WIN32)` test above the
      `unprivileged_port_range_start()` function defintion such that it is
      included in its body.
      
      This is an unreviewed commit.
      
      See: tor#40275
      af9107af
    • Alexander Hansen Færøy's avatar
      Only check for bindable ports if we are unsure if it will fail. · 67aefd55
      Alexander Hansen Færøy authored
      We currently assume that the only way for Tor to listen on ports in the
      privileged port range (1 to 1023), on Linux, is if we are granted the
      NET_BIND_SERVICE capability. Today on Linux, it's possible to specify
      the beginning of the unprivileged port range using a sysctl
      configuration option. Docker (and thus the CI service Tor uses) recently
      changed this sysctl value to 0, which causes our tests to fail as they
      assume that we should NOT be able to bind to a privileged port *without*
      the NET_BIND_SERVICE capability.
      
      In this patch, we read the value of the sysctl value via the /proc/sys/
      filesystem iff it's present, otherwise we assume the default
      unprivileged port range begins at port 1024.
      
      See: tor#40275
      67aefd55
  4. Feb 03, 2021
  5. Feb 01, 2021
  6. Jan 29, 2021
  7. Jan 28, 2021
  8. Jan 27, 2021
  9. Jan 22, 2021
  10. Jan 21, 2021
Loading