- Nov 05, 2021
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This also moves the warnings and add some theatrical effect around the code so anyone modifying those list should notice the warnings signs and read the comment accordingly. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
Doing this in the wrong way has potential to cause serious havoc on the network, so let's make it harder for future programmers to mess it up.
-
Alexander Hansen Færøy authored
-
- Nov 03, 2021
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Hansen Færøy authored
See: tpo/core/tor#40505
-
- Oct 29, 2021
-
-
Alexander Hansen Færøy authored
While trying to resolve our CI issues, the Windows build broke with an unused function error: src/test/test_switch_id.c:37:1: error: ‘unprivileged_port_range_start’ defined but not used [-Werror=unused-function] We solve this by moving the `#if !defined(_WIN32)` test above the `unprivileged_port_range_start()` function defintion such that it is included in its body. This is an unreviewed commit. See: tor#40275
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 28, 2021
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Closes #26299 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 26, 2021
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 21, 2021
-
-
David Goulet authored
Closes #40493 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Oct 20, 2021
-
-
Alexander Hansen Færøy authored
This patch makes Tor announce the relay specific bridge status page URL when Tor is starting up before bootstrap occours. See: tor#30477
-
Alexander Hansen Færøy authored
This patch unbreaks the current build after tor!369 landed. See: https://bugs.torproject.org/tpo/core/tor/40371
-
Alexander Hansen Færøy authored
-
- Oct 19, 2021
-
-
David Goulet authored
Now that we don't have version 2, it gives us: [warn] HiddenServiceVersion must be between 3 and 3, not 2. This commit changes it to: [warn] HiddenServiceVersion must be 3, not 2. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Closes #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Some tests were removed because they were testing something not usable anymore. Some tests remains to make sure that things are indeed disabled. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Sep 30, 2021
-
-
David Goulet authored
Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Relay do not accept both stores and lookups of version 2 descriptor. This effectively disable version 2 HSDir supports for relays. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Upon receiving a v2 introduction request, the relay will close the circuit and send back a tor protocol error. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The minimum service version is raised from 2 to 3 which effectively disable loading or creating an onion service v2. As for ADD_ONION, for version 2, a 551 error is returned: "551 Failed to add Onion Service" Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This effectively turns off the ability of tor to use HSv2 as a client by invalidating the v2 onion hostname passed through a SOCKS request. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Sep 13, 2021
-
-
Alexander Hansen Færøy authored
We currently assume that the only way for Tor to listen on ports in the privileged port range (1 to 1023), on Linux, is if we are granted the NET_BIND_SERVICE capability. Today on Linux, it's possible to specify the beginning of the unprivileged port range using a sysctl configuration option. Docker (and thus the CI service Tor uses) recently changed this sysctl value to 0, which causes our tests to fail as they assume that we should NOT be able to bind to a privileged port *without* the NET_BIND_SERVICE capability. In this patch, we read the value of the sysctl value via the /proc/sys/ filesystem iff it's present, otherwise we assume the default unprivileged port range begins at port 1024. See: tor#40275
-
Alexander Hansen Færøy authored
-
Alexander Hansen Færøy authored
-
- Aug 16, 2021
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Hansen Færøy authored
-
Nick Mathewson authored
-
- Aug 13, 2021
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Aug 12, 2021
-
-
Alexander Hansen Færøy authored
-
- Aug 11, 2021
-
-
Alexander Hansen Færøy authored
-
Fixes bug 40078. As reported by hdevalence our batch verification logic can cause an assert crash. The assert happens because when the batch verification of ed25519-donna fails, the code in `ed25519_checksig_batch()` falls back to doing a single verification for each signature. The crash occurs because batch verification failed, but then all signatures individually verified just fine. That's because batch verification and single verification use a different equation which means that there are sigs that can pass single verification but fail batch verification. Fixing this would require modding ed25519-donna which is not in scope for this ticket, and will be soon deprecated in favor of arti and ed25519-dalek, so my branch instead removes batch verification.
-
David Goulet authored
New list for all stable releases. Closes #40447 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Fixes #40301 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Jun 14, 2021
-
-
Nick Mathewson authored
-