- Nov 02, 2017
-
-
When running "make test-network-all", test that IPv6-only clients can use microdescriptors. IPv6-only microdescriptor client support was fixed in tor 0.3.0.1-alpha. Requires chutney master 61c28b9 or later. Closes ticket 24109.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
Part of #23820.
-
They are not yet implemented: they will upload descriptors, but won't be able to rendezvous, because IPv6 addresses in link specifiers are ignored. Part of #23820.
-
Diagnostics for #23820.
-
The previous version of this function had the following issues: * it didn't check if the extend_info contained an IPv6 address, * it didn't check if the ed25519 identity key was valid. But we can't add IPv6 support in a bugfix release. Instead, BUG() if the address is an IPv6 address, so we always put IPv4 addresses in link specifiers. And ignore missing ed25519 identifiers, rather than generating an all-zero link specifier. This supports v3 hidden services on IPv4, dual-stack, and IPv6, and v3 single onion services on IPv4 only. Part of 23820, bugfix on 0.3.2.1-alpha.
-
- Nov 01, 2017
-
-
A v3 service can have between 0 and 20 intro points where v2 has 0 to 10. Fixes #24115 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 31, 2017
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
When the directory information changes, callback to the HS client subsystem so it can check if any pending SOCKS connections are waiting for a descriptor. If yes, attempt a refetch for those. Fixes #23762 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Oct 30, 2017
-
-
Nick Mathewson authored
Fixes bug 24082; bugfix on 0.3.0.3-alpha. Found by Brian Carpenter.
-
Nick Mathewson authored
-
- Oct 27, 2017
-
-
Nick Mathewson authored
The new decryption function performs no decryption, skips the salt, and doesn't check the mac. This allows us to fuzz the hs_descriptor.c code using unencrypted descriptor test, and exercise more of the code. Related to 21509.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Oct 26, 2017
-
-
David Goulet authored
If the intro point supports ed25519 link authentication, make sure we don't have a zeroed key which would lead to a failure to extend to it. We already check for an empty key if the intro point does not support it so this makes the check on the key more consistent and symmetric. Fixes #24002 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Fixes #21509 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This reverts commit 5ef656e7.
-
Nick Mathewson authored
-
George Kadianakis authored
-
George Kadianakis authored
This call happens before we update our entry guards, so it needs to be removed for the fix to #23862 to work.
-
George Kadianakis authored
Update guard state even if we don't have enough dirinfo since that actually affects the future download of dirinfos. Fixes #23862 on 0.3.0.1-alpha
-
teor authored
The previous version of these functions had the following issues: * they can't supply both the IPv4 and IPv6 addresses in link specifiers, * they try to fall back to a 3-hop path when the address for a direct connection is unreachable, but this isn't supported by launch_rendezvous_point_circuit(), so it fails. But we can't fix these things in a bugfix release. Instead, always put IPv4 addresses in link specifiers. And if a v3 single onion service can't reach any intro points, fail. This supports v3 hidden services on IPv4, dual-stack, and IPv6, and v3 single onion services on IPv4 only. Part of 23820, bugfix on 0.3.2.1-alpha.
-
teor authored
The previous version of this function has the following issues: * it doesn't choose between IPv4 and IPv6 addresses correctly, and * it doesn't fall back to a 3-hop path when the address for a direct connection is unreachable. But we can't fix these things in a bugfix release. Instead, treat IPv6 addresses like any other unrecognised link specifier and ignore them. If there is no IPv4 address, return NULL. This supports v3 hidden services on IPv4, dual-stack, and IPv6, and v3 single onion services on IPv4 only. Part of 23820, bugfix on 0.3.2.1-alpha.
-
- Oct 25, 2017
-
-
David Goulet authored
Turns out that when reloading a tor configured with hidden service(s), we weren't copying all the needed information between the old service object to the new one. For instance, the desc_is_dirty timestamp wasn't which could lead to the service uploading its desriptor much later than it would need to. The replaycache wasn't also moved over and some intro point information as well. Fixes #23790 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
"ours" merge to avoid version bump
-
Nick Mathewson authored
"ours" merge to avoid version bump
-
Nick Mathewson authored
"ours" merge to avoid version bump
-
Nick Mathewson authored
"ours" merge to avoid version bump
-
Nick Mathewson authored
"ours" merge to avoid version bump
-
Nick Mathewson authored
-