Skip to content
Snippets Groups Projects
  1. Nov 14, 2018
  2. Nov 12, 2018
    • Nick Mathewson's avatar
      Fix a compiler warning in aes.c. · 1a11702a
      Nick Mathewson authored
      Apparently some freebsd compilers can't tell that 'c' will never
      be used uninitialized.
      
      Fixes bug 28413; bugfix on 0.2.9.3-alpha when we added support for
      longer AES keys to this function.
      1a11702a
    • Nick Mathewson's avatar
      seccomp2: Add "shutdown" to the list of permitted system calls. · 0e5378fe
      Nick Mathewson authored
      We don't use this syscall, but openssl apparently does.
      
      (This syscall puts a socket into a half-closed state. Don't worry:
      It doesn't shut down the system or anything.)
      
      Fixes bug 28183; bugfix on 0.2.5.1-alpha where the sandbox was
      introduced.
      0e5378fe
  3. Nov 11, 2018
  4. Nov 09, 2018
  5. Nov 08, 2018
  6. Nov 07, 2018
  7. Nov 06, 2018
  8. Nov 05, 2018
  9. Nov 02, 2018
  10. Oct 30, 2018
  11. Oct 29, 2018
  12. Oct 25, 2018
  13. Oct 24, 2018
  14. Oct 23, 2018
  15. Oct 22, 2018
    • David Goulet's avatar
      hs-v3: Create desc signing key cert before uploading · 81c466c3
      David Goulet authored
      
      Before this commit, we would create the descriptor signing key certificate
      when first building the descriptor.
      
      In some extreme cases, it lead to the expiry of the certificate which triggers
      a BUG() when encoding the descriptor before uploading.
      
      Ticket #27838 details a possible scenario in which this can happen. It is an
      edge case where tor losts internet connectivity, notices it and closes all
      circuits. When it came back up, the HS subsystem noticed that it had no
      introduction circuits, created them and tried to upload the descriptor.
      
      However, in the meantime, if tor did lack a live consensus because it is
      currently seeking to download one, we would consider that we don't need to
      rotate the descriptors leading to using the expired signing key certificate.
      
      That being said, this commit does a bit more to make this process cleaner.
      There are a series of things that we need to "refresh" before uploading a
      descriptor: signing key cert, intro points and revision counter.
      
      A refresh function is added to deal with all mutable descriptor fields. It in
      turn simplified a bit the code surrounding the creation of the plaintext data.
      
      We keep creating the cert when building the descriptor in order to accomodate
      the unit tests. However, it is replaced every single time the descriptor is
      uploaded.
      
      Fixes #27838
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      81c466c3
  16. Oct 19, 2018
  17. Oct 18, 2018
  18. Oct 17, 2018
    • Taylor Yu's avatar
      Log more info for duplicate ed25519 IDs · 93fd924b
      Taylor Yu authored
      Occasionally, key pinning doesn't catch a relay that shares an ed25519
      ID with another relay.  Log the identity fingerprints and the shared
      ed25519 ID when this happens, instead of making a BUG() warning.
      
      Fixes bug 27800; bugfix on 0.3.2.1-alpha.
      93fd924b
    • Nick Mathewson's avatar
      Bump to 0.3.5.3-alpha-dev · 389bae0e
      Nick Mathewson authored
      389bae0e
    • Roger Dingledine's avatar
      df78a273
    • David Goulet's avatar
      conn: Stop writing when our write bandwidth limist is exhausted · 2000d04c
      David Goulet authored
      Commit 488e2b00 introduced an issue, most
      likely introduced by a bad copy paste, that made us stop reading on the
      connection if our write bandwidth limit was reached.
      
      The problem is that because "read_blocked_on_bw" was never set, the connection
      was never reenabled for reading.
      
      This is most likely the cause of #27813 where bytes were accumulating in the
      kernel TCP bufers because tor was not doing reads. Only relays with
      RelayBandwidthRate would suffer from this but affecting all relays connecting
      to them. And using that tor option is recommended and best practice so many
      many relays have it enabled.
      
      Fixes #28089.
      2000d04c
Loading