- Sep 23, 2019
-
-
Nick Mathewson authored
Frequently, when a patch fails, it has failures in several files. Using the "-k" flag will let us learn all the compilation errors, not just the first one that the compiler hits. Based on a patch by rl1987.
-
- Sep 09, 2019
-
-
David Goulet authored
Closes #31673
-
- Aug 15, 2019
-
-
David Goulet authored
New IP address from 194.109.206.212 to 45.66.33.45. Signed request from Alex de Joode, operator of dizum: https://trac.torproject.org/projects/tor/ticket/31406 Published descriptor by dizum on August 12th, 2019: -- r dizum fqbq1v2DCDxTj0QDi7+gd1h911U GZmZtCLaPDQNxkhIFj8UcgTRAuA 2019-08-12 15:28:40 45.66.33.45 443 80 s Authority Fast Running Stable V2Dir Valid v Tor 0.4.0.5 pr Cons=1-2 Desc=1-2 DirCache=1-2 HSDir=1-2 HSIntro=3-4 HSRend=1-2 Link=1-5 LinkAuth=1,3 Microdesc=1-2 Relay=1-2 Padding=1 w Bandwidth=20 Unmeasured=1 p reject 1-65535 -- Finally, confirmed by DNS: $ dig +short tor.dizum.com 45.66.33.45 Closes #31406 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Aug 09, 2019
-
-
- Aug 08, 2019
-
-
Nick Mathewson authored
Fixes bug 31374; bugfix on 0.2.9.1-alpha.
-
-
- Aug 06, 2019
-
-
Nick Mathewson authored
On some windows builds, time_t is 64 bits but long is not. This is causing appveyor builds to fail. Also, one of our uses of labs() on time_t was logically incorrect: it was telling us to accept NETINFO cells up to three minutes _before_ the message they were responding to, which doesn't make sense. This patch adds a time_abs() function that we should eventually move to intmath.h or something. For now, though, it will make merges easier to have it file-local in channeltls.c. Fixes bug 31343; bugfix on 0.2.4.4-alpha.
-
- Jun 28, 2019
-
-
teor authored
Replace the 157 fallbacks originally introduced in Tor 0.3.5.6-rc in December 2018 (of which ~122 were still functional), with a list of 148 fallbacks (70 new, 78 existing, 79 removed) generated in June 2019. Closes ticket 28795. Note that we created extra lists from DE and US, but they didn't add any more fallbacks when we tried to merge them.
-
- Jun 12, 2019
-
-
Nick Mathewson authored
-
- Jun 11, 2019
-
-
Karsten Loesing authored
-
- Jun 05, 2019
-
-
teor authored
We think this bug can only be triggered by modifying a local file. Fixes bug 30781; bugfix on 0.2.0.8-alpha.
-
- May 29, 2019
-
-
Nick Mathewson authored
-
- May 17, 2019
-
-
Karsten Loesing authored
-
- Apr 30, 2019
-
-
rl1987 authored
-
- Apr 09, 2019
-
-
Nick Mathewson authored
-
- Apr 04, 2019
-
-
Nick Mathewson authored
When classifying a client's selection of TLS ciphers, if the client ciphers are not yet available, do not cache the result. Previously, we had cached the unavailability of the cipher list and never looked again, which in turn led us to assume that the client only supported the ancient V1 link protocol. This, in turn, was causing Stem integration tests to stall in some cases. Fixes bug 30021; bugfix on 0.2.4.8-alpha.
-
- Apr 03, 2019
-
-
Karsten Loesing authored
-
- Apr 01, 2019
-
-
teor authored
Otherwise, "make check-changes" will complain when we backport the change.
-
- Mar 22, 2019
-
-
teor authored
We need a recent test-network.sh to use new chutney features in CI. Fixes bug 29703; bugfix on 0.2.9.1-alpha.
-
- Mar 20, 2019
-
-
Alexander Hansen Færøy authored
This should ensure that GCDA files are never entering the cache of Travis CI. See: https://bugs.torproject.org/29036
-
- Mar 14, 2019
-
-
Roger Dingledine authored
Allow connections to single onion services to remain idle without being disconnected. Relays acting as rendezvous points for single onion services were mistakenly closing idle established rendezvous circuits after 60 seconds, thinking that they are unused directory-fetching circuits that had served their purpose. Fixes bug 29665; bugfix on 0.2.1.26.
-
- Mar 09, 2019
-
-
teor authored
Stop leaking parts of the shared random state in the shared-random unit tests. The previous fix in 29599 was incomplete. Fixes bug 29706; bugfix on 0.2.9.1-alpha.
-
- Mar 08, 2019
-
-
David Goulet authored
Turns out that when reloading a tor configured with hidden service(s), we weren't copying all the needed information between the old service object to the new one. For instance, the desc_is_dirty timestamp wasn't which could lead to the service uploading its descriptor much later than it would need to. The replaycache wasn't also moved over and some intro point information as well. Fixes #23790 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Fixes 28525.
-
- Mar 06, 2019
-
-
Karsten Loesing authored
-
- Mar 01, 2019
-
-
Prior to #23100, we were not counting HS circuit build times in our calculation of the timeout. This could lead to a condition where our timeout was set too low, based on non HS circuit build times, and then we would abandon all HS circuits, storing no valid timeouts in the histogram. This commit avoids the assert.
-
- Feb 27, 2019
-
-
teor authored
Stop leaking parts of the shared random state in the shared-random unit tests. Fixes bug 29599; bugfix on 0.2.9.1-alpha.
-
- Feb 19, 2019
-
-
malloc_options needs to be declared extern (and declaring it extern means we need to initialize it separately) Fixes bug 29145; bugfix on 0.2.9.3-alpha Signed-off-by:
Kris Katterjohn <katterjohn@gmail.com>
-
- Feb 12, 2019
-
-
Karsten Loesing authored
-
- Jan 23, 2019
-
-
Nick Mathewson authored
Many of these files cause check-changes to fail, which will be a long-term problem as we continue to support 0.2.9.
-
- Jan 09, 2019
-
-
teor authored
Stop logging "Tried to establish rendezvous on non-OR circuit..." as a warning. Instead, log it as a protocol warning, because there is nothing that relay operators can do to fix it. Fixes bug 29029; bugfix on 0.2.5.7-rc.
-
- Jan 07, 2019
-
-
Karsten Loesing authored
-
- Dec 11, 2018
-
-
Nick Mathewson authored
-
- Dec 10, 2018
-
-
teor authored
Merge Phoul's two lists into teor's list. Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in January 2018 (of which ~115 were still functional), with a list of 157 fallbacks (92 new, 65 existing, 85 removed) generated in December 2018. Closes ticket 24803.
-
- Dec 07, 2018
-
-
teor authored
Replace the 150 fallbacks originally introduced in Tor 0.3.3.1-alpha in January 2018 (of which ~115 were still functional), with a list of 148 fallbacks (89 new, 59 existing, 91 removed) generated in December 2018. Closes ticket 24803.
-
- Dec 05, 2018
-
-
Karsten Loesing authored
-
- Nov 15, 2018
-
-
teor authored
Correctly identify Windows 8.1, Windows 10, and Windows Server 2008 and later from their NT versions. On recent Windows versions, the GetVersionEx() function may report an earlier Windows version than the running OS. To avoid user confusion, add "[or later]" to Tor's version string on affected versions of Windows. Remove Windows versions that were never supported by the GetVersionEx() function. Stop duplicating the latest Windows version in get_uname(). Fixes bug 28096; bugfix on 0.2.2.34; reported by Keifer Bly.
-
- Nov 12, 2018
-
-
Nick Mathewson authored
Apparently some freebsd compilers can't tell that 'c' will never be used uninitialized. Fixes bug 28413; bugfix on 0.2.9.3-alpha when we added support for longer AES keys to this function.
-
- Nov 11, 2018
-
-
Karsten Loesing authored
-
- Nov 09, 2018
-
-
Nick Mathewson authored
Failing to do on clients was causing TLS 1.3 negotiation to fail. Fixes bug 28245; bugfix on 0.2.9.15, when we added TLS 1.3 support.
-