summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* Update geoip and geoip6 to the October 1 2019 database.geoip-2019-10-01Karsten Loesing2019-10-02
|
* Merge remote-tracking branch 'tor-github/pr/1216' into maint-0.2.9Nick Mathewson2019-09-17
|\
| * Hardcode the image into tor-exit-notice.htmlrl19872019-08-08
| |
* | build: The <sys/sysctl.h> is now deprecated on LinuxDavid Goulet2019-09-09
| | | | | | | | Closes #31673
* | dirauth: Change dizum IP addressDavid Goulet2019-08-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | New IP address from 194.109.206.212 to 45.66.33.45. Signed request from Alex de Joode, operator of dizum: https://trac.torproject.org/projects/tor/ticket/31406 Published descriptor by dizum on August 12th, 2019: -- r dizum fqbq1v2DCDxTj0QDi7+gd1h911U GZmZtCLaPDQNxkhIFj8UcgTRAuA 2019-08-12 15:28:40 45.66.33.45 443 80 s Authority Fast Running Stable V2Dir Valid v Tor 0.4.0.5 pr Cons=1-2 Desc=1-2 DirCache=1-2 HSDir=1-2 HSIntro=3-4 HSRend=1-2 Link=1-5 LinkAuth=1,3 Microdesc=1-2 Relay=1-2 Padding=1 w Bandwidth=20 Unmeasured=1 p reject 1-65535 -- Finally, confirmed by DNS: $ dig +short tor.dizum.com 45.66.33.45 Closes #31406 Signed-off-by: David Goulet <dgoulet@torproject.org>
* | Merge remote-tracking branch 'tor-github/pr/1078' into maint-0.2.9teor2019-08-10
|\ \
| * | dirparse: Stop crashing when parsing unknown descriptor purpose annotationsteor2019-06-06
| | | | | | | | | | | | | | | | | | We think this bug can only be triggered by modifying a local file. Fixes bug 30781; bugfix on 0.2.0.8-alpha.
* | | Merge remote-tracking branch 'tor-github/pr/1052' into maint-0.2.9teor2019-08-10
|\ \ \
| * | | Tweak comments in tor_vasprintf(), and add a changes file for 30651Nick Mathewson2019-05-29
| | | |
| * | | Fixed tor_vasprintf on systems without vasprintf.Tobias Stoeckmann2019-05-29
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If tor is compiled on a system with neither vasprintf nor _vscprintf, the fallback implementation exposes a logic flaw which prevents proper usage of strings longer than 127 characters: * tor_vsnprintf returns -1 if supplied buffer is not large enough, but tor_vasprintf uses this function to retrieve required length * the result of tor_vsnprintf is not properly checked for negative return values Both aspects together could in theory lead to exposure of uninitialized stack memory in the resulting string. This requires an invalid format string or data that exceeds integer limitations. Fortunately tor is not even able to run with this implementation because it runs into asserts early on during startup. Also the unit tests fail during a "make check" run. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org> [backported to 0.2.9 by nickm]
* | | Merge remote-tracking branch 'tor-github/pr/1229' into maint-0.2.9teor2019-08-10
|\ \ \
| * | | Modify "Protect buffers against INT_MAX datalen overflows." for 0.2.9Nick Mathewson2019-08-10
| | | |
| * | | Changes file for bug30041Nick Mathewson2019-04-09
| | | |
| * | | Check return value of buf_move_to_buf for error.Tobias Stoeckmann2019-04-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If the concatenation of connection buffer and the buffer of linked connection exceeds INT_MAX bytes, then buf_move_to_buf returns -1 as an error value. This value is currently casted to size_t (variable n_read) and will erroneously lead to an increasement of variable "max_to_read". This in turn can be used to call connection_buf_read_from_socket to store more data inside the buffer than expected and clogging the connection buffer. If the linked connection buffer was able to overflow INT_MAX, the call of buf_move_to_buf would have previously internally triggered an integer overflow, corrupting the state of the connection buffer. Signed-off-by: Tobias Stoeckmann <tobias@stoeckmann.org>
| * | | Protect buffers against INT_MAX datalen overflows.Tobias Stoeckmann2019-04-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Many buffer functions have a hard limit of INT_MAX for datalen, but this limitation is not enforced in all functions: - buf_move_all may exceed that limit with too many chunks - buf_move_to_buf exceeds that limit with invalid buf_flushlen argument - buf_new_with_data may exceed that limit (unit tests only) This patch adds some annotations in some buf_pos_t functions to guarantee that no out of boundary access could occur even if another function lacks safe guards against datalen overflows. [This is a backport of the submitted patch to 0.2.9, where the buf_move_to_buf and buf_new_with_data functions did not exist.]
* | | | Fix #28525 changes file that is breaking CI.George Kadianakis2019-08-09
| | | |
* | | | Merge remote-tracking branch 'tor-github/pr/762' into maint-0.2.9teor2019-08-09
|\ \ \ \
| * | | | Make tor_addr_is_internal_() RFC6598 (Carrier Grade NAT) awareNeel Chauhan2019-03-08
| | | | | | | | | | | | | | | | | | | | Fixes 28525.
* | | | | Merge remote-tracking branch 'tor-github/pr/957' into maint-0.2.9teor2019-08-09
|\ \ \ \ \
| * | | | | test/relay: add a missing typedefteor2019-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In 0.3.4 and later, these functions are declared in rephist.h: STATIC uint64_t find_largest_max(bw_array_t *b); STATIC void commit_max(bw_array_t *b); STATIC void advance_obs(bw_array_t *b); But in 0.2.9, they are declared in rephist.c and test_relay.c. So compilers fail with a "must use 'struct' tag" error. We add the missing struct typedef in test_relay.c, to match the declarations in rephist.c. (Merge commit 813019cc57 moves these functions into rephist.h instead.) Fixes bug 30184; not in any released version of Tor.
| * | | | | rephist: fix an undeclared type compilation errorteor2019-04-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | In 0.3.4 and later, we declare write_array as: extern struct bw_array_t *write_array; ... typedef struct bw_array_t bw_array_t; But in 0.2.9, we declare write_array as: typedef struct bw_array_t bw_array_t; extern bw_array_t *write_array; And then again in rephist.c: typedef struct bw_array_t bw_array_t; So some compilers fail with a duplicate declaration error. We backport 684b396ce5, which removes the duplicate declaration. And this commit deals with the undeclared type error. Backports a single line from merge commit 813019cc57. Fixes bug 30184; not in any released version of Tor.
| * | | | | Remove another needless typedefNick Mathewson2019-04-16
| | |/ / / | |/| | |
* | | | | Merge remote-tracking branch 'tor-github/pr/1221' into combined31343_31374_029teor2019-08-09
|\ \ \ \ \
| * | | | | Fix a warning about casting the results of GetProcAddress.Nick Mathewson2019-08-08
| | |_|_|/ | |/| | | | | | | | | | | | | Fixes bug 31374; bugfix on 0.2.9.1-alpha.
* | | | | Merge remote-tracking branch 'tor-github/pr/1209' into combined31343_31374_029teor2019-08-09
|\ \ \ \ \ | |/ / / / |/| | | |
| * | | | Fix another time_t/long warning for 31343.Nick Mathewson2019-08-08
| | | | |
| * | | | Restore proper behavior of netinfo skew checkNick Mathewson2019-08-08
| | | | | | | | | | | | | | | | | | | | | | | | | My previous fix removed a comparison, which would have caused us to warn about every skew instead of skews of over an hour.
| * | | | Avoid using labs() on time_t in channeltls.cNick Mathewson2019-08-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | On some windows builds, time_t is 64 bits but long is not. This is causing appveyor builds to fail. Also, one of our uses of labs() on time_t was logically incorrect: it was telling us to accept NETINFO cells up to three minutes _before_ the message they were responding to, which doesn't make sense. This patch adds a time_abs() function that we should eventually move to intmath.h or something. For now, though, it will make merges easier to have it file-local in channeltls.c. Fixes bug 31343; bugfix on 0.2.4.4-alpha.
* | | | | Merge remote-tracking branch 'tor-github/pr/1155' into maint-0.2.9teor2019-08-08
|\ \ \ \ \
| * | | | | Travis: remove a redundant os: linux lineteor2019-07-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Linux is the first item in the os matrix, so we don't need to specify it under matrix: include: . Part of 29280.
| * | | | | Travis: show the chutney commit and python versionteor2019-07-01
| | | | | | | | | | | | | | | | | | | | | | | | Part of 29280.
| * | | | | Travis: show chutney logs on chutney job failureteor2019-07-01
| | | | | | | | | | | | | | | | | | | | | | | | Part of 29280.
| * | | | | Add a chutney mode to travis.yml.Nick Mathewson2019-06-12
| | | | | |
| * | | | | Travis: control "make check" with its own flagNick Mathewson2019-06-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously we had "make check" launched whenever DISTCHECK was false. Now we'd like to turn it off in a few other circumstances, like running chutney. Maybe stem too?
* | | | | | Merge remote-tracking branch 'tor-github/pr/991' into maint-0.2.9teor2019-08-08
|\ \ \ \ \ \ | |_|/ / / / |/| | | | |
| * | | | | Add changes filerl19872019-04-30
| | | | | |
| * | | | | Travis: remove sudo configurationrl19872019-04-30
| | | | | | | | | | | | | | | | | | | | | | | | See: https://blog.travis-ci.com/2018-11-19-required-linux-infrastructure-migration
* | | | | | changes: file for 28795teor2019-06-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Replace the 157 fallbacks originally introduced in Tor 0.3.5.6-rc in December 2018 (of which ~122 were still functional), with a list of 148 fallbacks (70 new, 78 existing, 79 removed) generated in June 2019. Closes ticket 28795. Note that we created extra lists from DE and US, but they didn't add any more fallbacks when we tried to merge them.
* | | | | | fallback: apply the second fallback list from 2019teor2019-06-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update the fallback directory mirrors by merging the current list with: fallback_dirs_2019-06-28-08-58-39_AU_f0437a39ddbc8459.inc Part of 28795, see that ticket for logs.
* | | | | | fallback: apply the first fallback list from 2019teor2019-06-28
| |/ / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update the fallback directory mirrors by replacing the old list with: fallback_dirs_2019-06-25-11-49-10_AU_a37adb956fbb5cd2.inc Part of 28795, see that ticket for logs.
* | | | | Update geoip and geoip6 to the June 10 2019 database.geoip-2019-06-10Karsten Loesing2019-06-11
| |_|_|/ |/| | |
* | | | Update geoip and geoip6 to the May 13 2019 database.geoip-2019-05-13Karsten Loesing2019-05-17
|/ / /
* | | Merge remote-tracking branch 'tor-github/pr/792' into maint-0.2.9teor2019-04-19
|\ \ \
| * | | relays shouldn't close idle rend circuitsRoger Dingledine2019-03-14
| | |/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Allow connections to single onion services to remain idle without being disconnected. Relays acting as rendezvous points for single onion services were mistakenly closing idle established rendezvous circuits after 60 seconds, thinking that they are unused directory-fetching circuits that had served their purpose. Fixes bug 29665; bugfix on 0.2.1.26.
* | | Merge remote-tracking branch 'tor-github/pr/772' into maint-0.2.9teor2019-04-19
|\ \ \ | |_|/ |/| |
| * | hs-v2: Copy needed information between service on prunningDavid Goulet2019-03-08
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Turns out that when reloading a tor configured with hidden service(s), we weren't copying all the needed information between the old service object to the new one. For instance, the desc_is_dirty timestamp wasn't which could lead to the service uploading its descriptor much later than it would need to. The replaycache wasn't also moved over and some intro point information as well. Fixes #23790 Signed-off-by: David Goulet <dgoulet@torproject.org>
* | Merge remote-tracking branch 'tor-github/pr/902' into maint-0.2.9teor2019-04-06
|\ \
| * | Do not cache bogus results from classifying client ciphersNick Mathewson2019-04-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When classifying a client's selection of TLS ciphers, if the client ciphers are not yet available, do not cache the result. Previously, we had cached the unavailability of the cipher list and never looked again, which in turn led us to assume that the client only supported the ancient V1 link protocol. This, in turn, was causing Stem integration tests to stall in some cases. Fixes bug 30021; bugfix on 0.2.4.8-alpha.
* | | Merge remote-tracking branch 'tor-github/pr/877' into maint-0.2.9teor2019-04-06
|\ \ \ | |/ / |/| |
| * | Makefile: actually, don't delete the gcno filesteor2019-04-05
| | | | | | | | | | | | We need to keep the gcno files, because they are created at compile time.