- Jan 27, 2021
-
-
Now that relay_find_addr_to_publish() checks if we actually have an ORPort, we can simplify the descriptor building phase for IPv6. This also avoid triggering an IPv6 discovery if the IPv4 can't be found in the first place. Related to #40254 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
In other words, if we don't have an ORPort configured for a specific family (IPv4/v6), we don't bother doing address discovery. Related to #40254 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Jan 22, 2021
-
-
Nick Mathewson authored
-
- Jan 21, 2021
-
-
George Kadianakis authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
otherwise src/core is ignored.
-
George Kadianakis authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Generates the compile_commands.json file using the "bear" application so the ccls server can be more efficient with our code base. Closes #40227 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
Give more visibility to directory authority operators during the consensus voting process. Closes ticket 40245.
-
This step happens after we make each consensus flavor, and before we worry about sigs or anything. That way if Tor crashes, or if we fail to get enough sigs, we still have a chance to know what consensus we wanted to make.
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
In addition to simplifying callsites a little, this function gives correct behavior for bridges without a configured transport.
-
Nick Mathewson authored
-
David Goulet authored
-
- Jan 20, 2021
-
-
David Goulet authored
This validation was only done if DisableNetwork was off because we would use the global list of transports/bridges and DisableNetwork would not populate it. This was a problem for any user using DisableNetwork which includes Tor Browser and thus leading to the Bug() warning. Without a more in depth refactoring, we can't do this validation without the global list. The previous commit makes it that any connection to a bridge without a transport won't happen thus we keep the security feature of not connecting to a bridge without its corresponding transport. Related to #40106 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Don't pick the bridge as the guard or launch descriptor fetch if no transport is found. Fixes #40106 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Hansen Færøy authored
This patch limits the number of items in the consensus diff cache to 64 on the Windows platform. Hopefully, this will allow us to investigate a smarter fix while avoiding the situation reported in tor#24857 where Windows relay operators report Tor using 100% CPU. See: tor#24857
-
- Jan 19, 2021
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
When selecting the first advertised port, we always prefer the one with an explicit address. Closes #40246 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We used to actually discard ORPorts that were the same port and same family but they could have different address. Instead, we need to keep all different ORPorts so we can bind a listener on each of them. We will publish only one of these in our descriptor though. Related to #40246 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Alexander Hansen Færøy authored
This patch removes a call to `tor_assert_nonfatal()` if `extend_info_from_node()` returns NULL. This is unnecessary as we already handle the case where `info` is NULL in the next `if (!info) { ... }` block in the code. See: tor#32666.
-
Nick Mathewson authored
-