Skip to content
  1. Nov 09, 2019
  2. Nov 06, 2019
  3. Oct 28, 2019
  4. Oct 24, 2019
  5. Oct 22, 2019
  6. Oct 17, 2019
  7. Oct 02, 2019
  8. Sep 30, 2019
    • teor's avatar
      Travis: Add a macOS chutney job, but don't wait for it to finish · 1e0e23c1
      teor authored
      Since Travis macOS has IPv6 support (and Travis Linux does not), chutney
      will now run its IPv6 networks as part of Travis CI.
      
      But since chutney is slow, don't wait for the macOS chutney to finish.
      (Travis have fixed the duplicate notification bug in fast_finish. So we
      can use fast_finish and allow_failure to finish early. Unfortunately,
      allow_failure also means we ignore failures in macOS chutney.)
      
      Also make sure that we have:
      * a compile on each platform, with each compiler,
      * a check on each platform, and
      * a check on each compiler.
      
      Finally, sort builds: allow fail last, macOS first, slowest first.
      
      Closes ticket 30860.
      Closes ticket 31859 for 0.2.9.
      1e0e23c1
    • teor's avatar
      Travis: Remove a redundant clang Linux job · 4e429783
      teor authored
      Part of 31859.
      4e429783
  9. Sep 26, 2019
  10. Sep 23, 2019
    • Nick Mathewson's avatar
      Try using make -k in Travis configuration · 6ed3d8db
      Nick Mathewson authored
      Frequently, when a patch fails, it has failures in several files.
      Using the "-k" flag will let us learn all the compilation errors,
      not just the first one that the compiler hits.
      
      Based on a patch by rl1987.
      6ed3d8db
  11. Sep 18, 2019
  12. Sep 17, 2019
    • Nick Mathewson's avatar
      Treat an unexpected constant-sized VERSIONS cell as a PROTOCOL_WARN. · 3c97ab3c
      Nick Mathewson authored
      We previously used tor_fragile_assert() to declare that this case
      could not happen: VERSIONS cells are always supposed to be
      variable-sized, right?
      
      This is incorrect, though.  On a v1 link protocol connection, all
      cells are fixed-sized.  There aren't supposed to be any VERSIONS
      cells with this version of the protocol, but apparently, somebody
      was messing up.  (The v1 link protocol is obsolete, so probably the
      implementer responsible didn't mean to be using it.)
      
      Fixes bug 31107.  Bugfix on 0.2.4.4-alpha, when we introduced a
      tor_fragile_assert() for this case.
      3c97ab3c
  13. Sep 09, 2019
  14. Aug 15, 2019
    • David Goulet's avatar
      dirauth: Change dizum IP address · 5a1c3e44
      David Goulet authored
      New IP address from 194.109.206.212 to 45.66.33.45.
      
      Signed request from Alex de Joode, operator of dizum:
      https://trac.torproject.org/projects/tor/ticket/31406
      
      Published descriptor by dizum on August 12th, 2019:
      
      --
      r dizum fqbq1v2DCDxTj0QDi7+gd1h911U GZmZtCLaPDQNxkhIFj8UcgTRAuA 2019-08-12 15:28:40 45.66.33.45 443 80
      s Authority Fast Running Stable V2Dir Valid
      v Tor 0.4.0.5
      pr Cons=1-2 Desc=1-2 DirCache=1-2 HSDir=1-2 HSIntro=3-4 HSRend=1-2 Link=1-5 LinkAuth=1,3 Microdesc=1-2 Relay=1-2 Padding=1
      w Bandwidth=20 Unmeasured=1
      p reject 1-65535
      --
      
      Finally, confirmed by DNS:
      
        $ dig +short tor.dizum.com
        45.66.33.45
      
      Closes #31406
      
      
      
      Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
      5a1c3e44
  15. Aug 09, 2019
  16. Aug 08, 2019
  17. Aug 06, 2019
    • Nick Mathewson's avatar
      Avoid using labs() on time_t in channeltls.c · 0849d2a2
      Nick Mathewson authored
      On some windows builds, time_t is 64 bits but long is not.  This is
      causing appveyor builds to fail.
      
      Also, one of our uses of labs() on time_t was logically incorrect:
      it was telling us to accept NETINFO cells up to three minutes
      _before_ the message they were responding to, which doesn't make
      sense.
      
      This patch adds a time_abs() function that we should eventually move
      to intmath.h or something.  For now, though, it will make merges
      easier to have it file-local in channeltls.c.
      
      Fixes bug 31343; bugfix on 0.2.4.4-alpha.
      0849d2a2
  18. Jul 19, 2019
    • Nick Mathewson's avatar
      Changes file for bug 31001 · 97d73db7
      Nick Mathewson authored
      97d73db7
    • Tobias Stoeckmann's avatar
      Prevent UB on signed overflow. · 0d4a689d
      Tobias Stoeckmann authored and Nick Mathewson's avatar Nick Mathewson committed
      
      
      Overflowing a signed integer in C is an undefined behaviour.
      It is possible to trigger this undefined behaviour in tor_asprintf on
      Windows or systems lacking vasprintf.
      
      On these systems, eiter _vscprintf or vsnprintf is called to retrieve
      the required amount of bytes to hold the string. These functions can
      return INT_MAX. The easiest way to recreate this is the use of a
      specially crafted configuration file, e.g. containing the line:
      
      FirewallPorts AAAAA<in total 2147483610 As>
      
      This line triggers the needed tor_asprintf call which eventually
      leads to an INT_MAX return value from _vscprintf or vsnprintf.
      
      The needed byte for \0 is added to the result, triggering the
      overflow and therefore the undefined behaviour.
      
      Casting the value to size_t before addition fixes the behaviour.
      
      Signed-off-by: default avatarTobias Stoeckmann <tobias@stoeckmann.org>
      0d4a689d
  19. Jul 01, 2019