- Apr 23, 2024
-
-
Alexander Hansen Færøy authored
forward-port the 0.4.8.10 and .11 changelogs See merge request tpo/core/tor!814
-
- Apr 19, 2024
-
-
Roger Dingledine authored
-
- Apr 18, 2024
-
-
David Goulet authored
Typos See merge request tpo/core/tor!812
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
David Goulet authored
typo See merge request tpo/core/tor!811
-
- Apr 17, 2024
-
-
trinity-1686a authored
-
- Apr 16, 2024
-
-
David Goulet authored
also consider LD_BUG logs when counting bug reached Closes #40924 See merge request tpo/core/tor!805
-
- Apr 15, 2024
-
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
It turns out that circuit_package_relay_cell() returns 0 in order to drop a cell but there is a code path, if the circuit queue is full, that also silently closes the circuit and returns 0. This lead to Conflux thinking a cell was sent but actually the cell was not and the circuit was closed leading to the hard assert. And so this function makes sure that circuit_package_relay_cell() and append_cell_to_circuit_queue() returns a value that indicate what happened with the cell and circuit so the caller can make an informed decision with it. This change makes it that we do NOT enter the Conflux subsystem if the cell is not queued on the circuit. Fixes #40921 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Apr 14, 2024
-
-
trinity-1686a authored
-
- Apr 13, 2024
-
-
trinity-1686a authored
-
- Apr 10, 2024
-
-
David Goulet authored
-
-
David Goulet authored
-
-
David Goulet authored
-
-
-
- Apr 09, 2024
-
-
David Goulet authored
-
- Apr 08, 2024
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Mar 20, 2024
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Mar 14, 2024
-
-
David Goulet authored
hs_service: don't force high intro point rotation for TestingTorNetwork Closes #40922 See merge request tpo/core/tor!802
-
Jim Newsome authored
This was previously added to facilitate testing intro point rotation with chutney. However, the implementation is problematic since it forces excessive rotation whenever TestingTorNetwork is enabled, and can't be adjusted or disabled. Alternatives for testing intro point rotation include: * Using shadow to "fast forward" time * Overriding the consensus parameters hs_intro_min_lifetime and hs_intro_max_lifetime. Fixes #40922
-
- Mar 12, 2024
-
-
David Goulet authored
In router_is_active, don't require non-zero bandwidthcapacity Closes #13000 and #40917 See merge request tpo/core/tor!801
-
- Mar 07, 2024
-
-
Jim Newsome authored
This check was originally added in 962765a3, with the intent of preventing relays with 0 measured bandwidth from being listed in the consensus (part of fixing #13000). Currently, that decision and other relevant places effectively use `dirserv_get_credible_bandwidth_kb`, which prefers bwauth-measured bandwidth over the self-reported `bandwidthcapacity`, making this check mostly redundant. i.e. this change should only affect behavior when the relay has uploaded a descriptor with `bandwidthcapacity=0` *and* we have a non-zero measured bandwidth, in which case we'll still trust the measured bandwidth. This is what we want when bootstrapping a network (e.g. for testing), since it allows us to initialize bandwidths using a bandwidth authority file. A relay can still cause `router_is_active` to return false by setting the hibernate flag. Also see discussion in #40917. Fixes #40917.
-
- Feb 28, 2024
-
-
Alexander Hansen Færøy authored
make read_file_to_str_until_eof doc more explicit Closes #40852 See merge request tpo/core/tor!799
-
Alexander Hansen Færøy authored
-
- Feb 18, 2024
-
-
trinity-1686a authored
the sz_out param is set to what was read (i.e not including the final NULL the function adds for convenience), but could be understood to be set to what was read+1 (including the NULL terminator)
-
- Feb 08, 2024
-
-
David Goulet authored
Make two 1-bit fields unsigned Closes #40911 See merge request tpo/core/tor!796
-
- Feb 06, 2024
-
-
Sebastian Hahn authored
-
- Feb 05, 2024
-
-
Alexander Hansen Færøy authored
Tor docs update See merge request tpo/core/tor!798
-
-
- Feb 01, 2024
-
-
Sebastian Hahn authored
This should be a completely harmless warning as we only check whether the fields are true or false. Closes #40911.
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
Sebastian Hahn authored
The only way to figure out that posting a vote or signatures to another dirauth failed is by counting how many success messages there are on notice level, and noticing that it is fewer than the number of configured dirauths. Closes #40910.
-