Tor merge requestshttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests2020-08-18T12:51:54Zhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/121Ticket24308 035: Allower lower values for MaxMemInQueues2020-08-18T12:51:54ZNick MathewsonTicket24308 035: Allower lower values for MaxMemInQueuesThis is a MR to allow relays and clients to set lower values for MaxMemInQueues. This is of interest to mobile use-cases, especially on IOS.
I say we should merge this to 0.4.4 or or 0.4.5 for now, but keep it in reserve in case we nee...This is a MR to allow relays and clients to set lower values for MaxMemInQueues. This is of interest to mobile use-cases, especially on IOS.
I say we should merge this to 0.4.4 or or 0.4.5 for now, but keep it in reserve in case we need it in older branches.
Closes #24308.Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/106Launch early reachability tests once a minute, not once a second. (for 0.3.5)2020-08-18T13:51:24ZNick MathewsonLaunch early reachability tests once a minute, not once a second. (for 0.3.5)This fixes bug 40083, which was introduced in 9f31908a in
0.2.8.1-alpha.
Closes #40083.This fixes bug 40083, which was introduced in 9f31908a in
0.2.8.1-alpha.
Closes #40083.Tor: 0.3.5.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/124Draft: Parallelize src/test/test into chunks.2020-10-07T12:04:12ZNick MathewsonDraft: Parallelize src/test/test into chunks.First, we introduce a flag to teach src/test/test to split its work
into chunks. Then we replace our invocation of src/test/test in our
"make check" target with a set of 8 scripts that invoke the first
8th of the tests, the second 8th, ...First, we introduce a flag to teach src/test/test to split its work
into chunks. Then we replace our invocation of src/test/test in our
"make check" target with a set of 8 scripts that invoke the first
8th of the tests, the second 8th, and so on.
This change makes our "make -kj4 check" target in our hardened
gitlab build more than twice as fast, since src/test/test was taking
the longest to finish.
Closes #40098.
Github CI at https://github.com/torproject/tor/pull/2064Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/15WIP: hs-v2: Add deprecation warning for service2020-10-07T12:39:03ZDavid Gouletdgoulet@torproject.orgWIP: hs-v2: Add deprecation warning for serviceIf at least one service is configured as a version 2, a log warning is emitted
once and only once.
Closes #40003
Signed-off-by: David Goulet <dgoulet@torproject.org>If at least one service is configured as a version 2, a log warning is emitted
once and only once.
Closes #40003
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/101Reject extra commas in protover (backport)2020-10-09T18:04:01ZNick MathewsonReject extra commas in protover (backport)This is a backport MR for !94
Closes #27194This is a backport MR for !94
Closes #27194Tor: 0.4.4.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/67Fix for #27315 for 0.3.5 (seccomp sandbox AT_FDCWD problem) - maint-0.3.52021-01-28T17:22:41ZJigsaw52Fix for #27315 for 0.3.5 (seccomp sandbox AT_FDCWD problem) - maint-0.3.5Github PR: https://github.com/torproject/tor/pull/2012Github PR: https://github.com/torproject/tor/pull/2012Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/68Fix for #40020 for 0.3.5 (seccomp sandbox openat fails on some versions of gl...2021-01-28T17:53:20ZJigsaw52Fix for #40020 for 0.3.5 (seccomp sandbox openat fails on some versions of glibc) - merge after 27315 - maint-0.3.5Note that this pull request also includes my fix for #27315. This is because I use some of the refactoring I did for this fix. As such, this fix should be applied after #27315.
Github PR: https://github.com/torproject/tor/pull/2013Note that this pull request also includes my fix for #27315. This is because I use some of the refactoring I did for this fix. As such, this fix should be applied after #27315.
Github PR: https://github.com/torproject/tor/pull/2013Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/102Ticket6198: memwipe more address strings before freeing2021-01-28T17:25:19ZNick MathewsonTicket6198: memwipe more address strings before freeingThis is a small patch for #6198, to memwipe a little more. It's a defense-in-depth thing. I'm marking it for possible backport, but I'm not sure whether that's a good idea.
Github PR to master at https://github.com/torproject/tor/pull/...This is a small patch for #6198, to memwipe a little more. It's a defense-in-depth thing. I'm marking it for possible backport, but I'm not sure whether that's a good idea.
Github PR to master at https://github.com/torproject/tor/pull/2043
After merging this, we could open a new ticket about refactoring more places in our code to use `tor_str_wipe_and_free()`, but IMO such a change should be master-only.Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/107Launch early reachability tests once a minute, not once a second. (For 0.4.2 ...2021-01-28T17:26:13ZNick MathewsonLaunch early reachability tests once a minute, not once a second. (For 0.4.2 and later)This MR merges !106 forward for 0.4.2 and later. It resolves a conflict.
See #40083.This MR merges !106 forward for 0.4.2 and later. It resolves a conflict.
See #40083.Tor: 0.4.3.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/114v3 control: Persist ONION_CLIENT_AUTH_ADD client name2021-01-28T17:26:56ZNick Mathewsonv3 control: Persist ONION_CLIENT_AUTH_ADD client nameThis code is from @neel
Closes #40089
Github PR at https://github.com/torproject/tor/pull/2055This code is from @neel
Closes #40089
Github PR at https://github.com/torproject/tor/pull/2055Tor: 0.4.3.x-finalNeel Chauhanneel@neelc.orgNeel Chauhanneel@neelc.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/322configure: Handle deprecated mallinfo()2021-02-23T15:55:03ZDavid Gouletdgoulet@torproject.orgconfigure: Handle deprecated mallinfo()We still use it if available or even deprecated.
Closes #40309
Signed-off-by: David Goulet <dgoulet@torproject.org>We still use it if available or even deprecated.
Closes #40309
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.3.5.x-finalDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/323configure: Handle deprecated mallinfo()2021-02-23T15:55:06ZDavid Gouletdgoulet@torproject.orgconfigure: Handle deprecated mallinfo()We still use it if available or even deprecated.
Closes #40309
Signed-off-by: David Goulet <dgoulet@torproject.org>We still use it if available or even deprecated.
Closes #40309
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.4.4.x-finalDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/371hs: Fix memory leak in client cache2021-04-23T10:00:57ZDavid Gouletdgoulet@torproject.orghs: Fix memory leak in client cacheFixes #40356
Signed-off-by: David Goulet <dgoulet@torproject.org>Fixes #40356
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.4.5.x-post-stableDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/337Draft: Add a DormantTimeoutEnabled to disable dormant mode entirely2021-05-04T18:35:28ZNick MathewsonDraft: Add a DormantTimeoutEnabled to disable dormant mode entirely(If you need to do this in an older version you can just set
DormantClientTimeout to something huge.)
Closes #40228.(If you need to do this in an older version you can just set
DormantClientTimeout to something huge.)
Closes #40228.Tor: 0.4.5.x-post-stablehttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/398[40410] Fix compilation on OpenSUSE.2021-06-18T18:29:39ZAlexander Færøyahf@torproject.org[40410] Fix compilation on OpenSUSE.This patch fixes a build error with GCC 7.x which doesn't seem to accept
const int's as constants in macro initialization.
See: tpo/core/tor#40410This patch fixes a build error with GCC 7.x which doesn't seem to accept
const int's as constants in macro initialization.
See: tpo/core/tor#40410Tor: 0.4.7.x-freezeAlexander Færøyahf@torproject.orgAlexander Færøyahf@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/416fallbackdir: Regenerate lists2021-08-11T13:07:38ZDavid Gouletdgoulet@torproject.orgfallbackdir: Regenerate listsNew lists for all stable releases.
Closes #40447
Signed-off-by: David Goulet <dgoulet@torproject.org>New lists for all stable releases.
Closes #40447
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.3.5.x-finalDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/319relay: Reduce streaming compression ratio from HIGH to LOW2021-08-11T13:16:46ZDavid Gouletdgoulet@torproject.orgrelay: Reduce streaming compression ratio from HIGH to LOWFixes #40301
Signed-off-by: David Goulet <dgoulet@torproject.org>Fixes #40301
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.4.5.7-stableDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/273MR 249 for 0.4.52021-10-04T17:19:35ZAlexander Færøyahf@torproject.orgMR 249 for 0.4.5This is an update of tor!249 but with base-branch set to 0.4.5 and a slightly reworded changes file.
I have already reviewed it and tested it on MacOS as well as Linux. I am assigning @nickm as reviewer here because we are late at getti...This is an update of tor!249 but with base-branch set to 0.4.5 and a slightly reworded changes file.
I have already reviewed it and tested it on MacOS as well as Linux. I am assigning @nickm as reviewer here because we are late at getting this in.Alexander Færøyahf@torproject.orgAlexander Færøyahf@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/463Draft: relay: Overload state on DNS timeout is now X% over Y secs2021-10-20T13:19:19ZDavid Gouletdgoulet@torproject.orgDraft: relay: Overload state on DNS timeout is now X% over Y secsWith this commit, we will only report a general overload state if we've
seen more than X% of DNS timeout errors over Y seconds. Previous
behavior was to report when a single timeout occured which is really too
small of a threshold.
The ...With this commit, we will only report a general overload state if we've
seen more than X% of DNS timeout errors over Y seconds. Previous
behavior was to report when a single timeout occured which is really too
small of a threshold.
The value X is a consensus parameters called
"overload_dns_timeout_scale_percent" which is a scaled percentage
(factor of 1000) so we can represent decimal points for X like 0.5% for
instance. Its default is 1000 which ends up being 1%.
The value Y is a consensus parameters called
"overload_dns_timeout_period_secs" which is the time period for which
will gather DNS errors and once over, we assess if that X% has been
reached ultimately triggering a general overload signal.
Closes #40491
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.4.6.x-post-stableDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.orghttps://gitlab.torproject.org/tpo/core/tor/-/merge_requests/477Draft: relay: Don't allow DirPort on non-IPv42021-11-03T13:55:19ZDavid Gouletdgoulet@torproject.orgDraft: relay: Don't allow DirPort on non-IPv4Our code doesn't allow it and so this prevents an assert() crash if the
DirPort is for instance IPv6 only.
Fixes #40494
Signed-off-by: David Goulet <dgoulet@torproject.org>Our code doesn't allow it and so this prevents an assert() crash if the
DirPort is for instance IPv6 only.
Fixes #40494
Signed-off-by: David Goulet <dgoulet@torproject.org>Tor: 0.4.5.x-post-stableDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.org