Commit Graph

  • 801334347d tor 0.4.4.6 * Check channels+circuits on relays more thoroughly (TROVE-2020-005) Bernhard Wiedemann 2020-11-12 17:05:35 +00:00
  • 1d5a501d09 Accepting request 836122 from network Dominique Leuenberger 2020-09-23 16:41:49 +00:00
  • 9626d7df58 Accepting request 836122 from network Dominique Leuenberger 2020-09-23 16:41:49 +00:00
  • 84b9ca65ce tor 0.4.4.5 * Improve guard selection * IPv6 improvements Bernhard Wiedemann 2020-09-15 14:56:46 +00:00
  • 828ff0d9f8 tor 0.4.4.5 * Improve guard selection * IPv6 improvements Bernhard Wiedemann 2020-09-15 14:56:46 +00:00
  • f53be98511 Accepting request 828027 from network Dominique Leuenberger 2020-08-20 20:31:01 +00:00
  • b317ff845f Accepting request 828027 from network Dominique Leuenberger 2020-08-20 20:31:01 +00:00
  • 6ff5703724 Accepting request 827818 from home:dimstar:Factory Bernhard Wiedemann 2020-08-20 07:50:47 +00:00
  • 8b01b50317 Accepting request 827818 from home:dimstar:Factory Bernhard Wiedemann 2020-08-20 07:50:47 +00:00
  • a12b5f8323 Accepting request 819777 from network Dominique Leuenberger 2020-07-10 13:30:24 +00:00
  • 928c8f6cdc Accepting request 819777 from network Dominique Leuenberger 2020-07-10 13:30:24 +00:00
  • af47b5e9b1 - tor 0.4.3.6 * Fix a crash due to an out-of-bound memory access (CVE-2020-15572) * Some minor fixes Bernhard Wiedemann 2020-07-09 17:29:09 +00:00
  • 0e6fa9802b - tor 0.4.3.6 * Fix a crash due to an out-of-bound memory access (CVE-2020-15572) * Some minor fixes Bernhard Wiedemann 2020-07-09 17:29:09 +00:00
  • 1979bbcaf9 Accepting request 818991 from network Dominique Leuenberger 2020-07-06 14:34:27 +00:00
  • ea22bab8b9 Accepting request 818991 from network Dominique Leuenberger 2020-07-06 14:34:27 +00:00
  • 3989c40b95 nicer version Bernhard Wiedemann 2020-07-06 12:02:20 +00:00
  • 97f701b1e3 nicer version Bernhard Wiedemann 2020-07-06 12:02:20 +00:00
  • 46eb8909e9 Fix logrotate to not fail when tor is stopped (boo#1164275) Bernhard Wiedemann 2020-06-29 09:00:23 +00:00
  • e65bb44ac0 Fix logrotate to not fail when tor is stopped (boo#1164275) Bernhard Wiedemann 2020-06-29 09:00:23 +00:00
  • 6547a1dcae Accepting request 808310 from network Dominique Leuenberger 2020-06-23 19:04:26 +00:00
  • 29f1896600 Accepting request 808310 from network Dominique Leuenberger 2020-06-23 19:04:26 +00:00
  • 2dac72e7c0 Accepting request 805924 from home:AndreasStieger:branches:network Bernhard Wiedemann 2020-05-17 01:49:50 +00:00
  • dcda8d9b1c Accepting request 805924 from home:AndreasStieger:branches:network Bernhard Wiedemann 2020-05-17 01:49:50 +00:00
  • f6912aafff Accepting request 786716 from network Dominique Leuenberger 2020-03-20 22:58:18 +00:00
  • 34cd25cc57 Accepting request 786716 from network Dominique Leuenberger 2020-03-20 22:58:18 +00:00
  • 6499a83920 Accepting request 786602 from home:AndreasStieger:branches:network Tomáš Chvátal 2020-03-20 07:20:53 +00:00
  • b09db52dae Accepting request 786602 from home:AndreasStieger:branches:network Tomáš Chvátal 2020-03-20 07:20:53 +00:00
  • db00166d17 tor 0.4.2.7 * Fix two denial-of-service issues Bernhard Wiedemann 2020-03-18 21:03:18 +00:00
  • 3004fe40aa tor 0.4.2.7 * Fix two denial-of-service issues Bernhard Wiedemann 2020-03-18 21:03:18 +00:00
  • 57f691e52b Accepting request 769011 from network Dominique Leuenberger 2020-01-31 22:57:35 +00:00
  • b3bb4840aa Accepting request 769011 from network Dominique Leuenberger 2020-01-31 22:57:35 +00:00
  • 3d596f8092 - tor 0.4.2.6 * Correct how we use libseccomp * Fix crash when reloading logging configuration while the experimental sandbox is enabled * Avoid a possible crash when logging an assertion about mismatched magic numbers Bernhard Wiedemann 2020-01-31 08:49:43 +00:00
  • dc3cdb8ad1 - tor 0.4.2.6 * Correct how we use libseccomp * Fix crash when reloading logging configuration while the experimental sandbox is enabled * Avoid a possible crash when logging an assertion about mismatched magic numbers Bernhard Wiedemann 2020-01-31 08:49:43 +00:00
  • ca45973a42 Accepting request 761967 from network Dominique Leuenberger 2020-01-09 21:50:58 +00:00
  • f68d4f23c9 Accepting request 761967 from network Dominique Leuenberger 2020-01-09 21:50:58 +00:00
  • 1a183fecbf cleanup Bernhard Wiedemann 2020-01-08 20:12:58 +00:00
  • 5d1d4d6f7a cleanup Bernhard Wiedemann 2020-01-08 20:12:58 +00:00
  • 88d795cfbd Add tor-master.service to allow handling multiple tor daemons Bernhard Wiedemann 2020-01-08 08:53:23 +00:00
  • b8cad9e355 Add tor-master.service to allow handling multiple tor daemons Bernhard Wiedemann 2020-01-08 08:53:23 +00:00
  • f98ca7130d Update tor.service and add defaults-torrc to work without dropped torctl (boo#1072274) Bernhard Wiedemann 2020-01-07 11:42:41 +00:00
  • 275852b53b Update tor.service and add defaults-torrc to work without dropped torctl (boo#1072274) Bernhard Wiedemann 2020-01-07 11:42:41 +00:00
  • d0dbdc2fe2 Accepting request 757095 from home:AndreasStieger:branches:network Tomáš Chvátal 2019-12-14 21:37:19 +00:00
  • c75f621f31 Accepting request 757095 from home:AndreasStieger:branches:network Tomáš Chvátal 2019-12-14 21:37:19 +00:00
  • 30056767ae Accepting request 755515 from network Dominique Leuenberger 2019-12-10 21:43:55 +00:00
  • 8e03174321 Accepting request 755515 from network Dominique Leuenberger 2019-12-10 21:43:55 +00:00
  • 07ec88196a Accepting request 755466 from home:AndreasStieger:branches:network Tomáš Chvátal 2019-12-10 10:45:31 +00:00
  • 96e12d7357 Accepting request 755466 from home:AndreasStieger:branches:network Tomáš Chvátal 2019-12-10 10:45:31 +00:00
  • 5e72b0a93e Accepting request 736066 from network Dominique Leuenberger 2019-10-08 17:59:43 +00:00
  • c015098725 Accepting request 736066 from network Dominique Leuenberger 2019-10-08 17:59:43 +00:00
  • 59531a9224 Accepting request 735865 from home:pluskalm:branches:network Bernhard Wiedemann 2019-10-07 13:44:24 +00:00
  • 0347c15052 Accepting request 735865 from home:pluskalm:branches:network Bernhard Wiedemann 2019-10-07 13:44:24 +00:00
  • cfff7e3b63 Accepting request 733468 from network Dominique Leuenberger 2019-09-26 18:46:49 +00:00
  • ac8c105b11 Accepting request 733468 from network Dominique Leuenberger 2019-09-26 18:46:49 +00:00
  • 160ccb960e update to 0.4.1.6 * Tolerate systems (including some Linux installations) where madvise MADV_DONTFORK / MADV_DONTDUMP are available at build-time, but not at run time. * Do not include the deprecated <sys/sysctl.h> on Linux * Fix the MAPADDRESS controller command to accept one or more arguments * Always retry v2+v3 single onion service intro and rendezvous circuits with a 3-hop path * Use RFC 2397 data URL scheme to embed an image into tor-exit-notice.html Bernhard Wiedemann 2019-09-19 13:07:11 +00:00
  • 367a13562c update to 0.4.1.6 * Tolerate systems (including some Linux installations) where madvise MADV_DONTFORK / MADV_DONTDUMP are available at build-time, but not at run time. * Do not include the deprecated <sys/sysctl.h> on Linux * Fix the MAPADDRESS controller command to accept one or more arguments * Always retry v2+v3 single onion service intro and rendezvous circuits with a 3-hop path * Use RFC 2397 data URL scheme to embed an image into tor-exit-notice.html Bernhard Wiedemann 2019-09-19 13:07:11 +00:00
  • cac29e897e Accepting request 725000 from network Dominique Leuenberger 2019-08-22 08:54:02 +00:00
  • 1b6601d762 Accepting request 725000 from network Dominique Leuenberger 2019-08-22 08:54:02 +00:00
  • a36e03f995 Add fix-test.patch to workaround a LTO-induced test-failure Bernhard Wiedemann 2019-08-21 09:37:55 +00:00
  • d900b43a74 Add fix-test.patch to workaround a LTO-induced test-failure Bernhard Wiedemann 2019-08-21 09:37:55 +00:00
  • 66457c518d Compile without -Werror to build with LTO (boo#1146548) Bernhard Wiedemann 2019-08-21 08:27:35 +00:00
  • d6bcdf4a49 Compile without -Werror to build with LTO (boo#1146548) Bernhard Wiedemann 2019-08-21 08:27:35 +00:00
  • e768c2ad23 - update to 0.4.1.5 * Onion service clients now add padding cells at the start of their INTRODUCE and RENDEZVOUS circuits to make it look like Exit traffic * Add a generic publish-subscribe message-passing subsystem * Controller commands are now parsed using a generalized parsing subsystem * Implement authenticated SENDMEs as detailed in proposal 289 * Our node selection algorithm now excludes nodes in linear time * Construct a fast secure pseudorandom number generator for each thread, to use when performance is critical * Consider our directory information to have changed when our list of bridges changes * Do not count previously configured working bridges towards our total of working bridges * When considering upgrading circuits from "waiting for guard" to "open", always ignore circuits that are marked for close * Properly clean up the introduction point map when circuits change purpose * Fix an unreachable bug in which an introduction point could try to send an INTRODUCE_ACK * Clients can now handle unknown status codes from INTRODUCE_ACK cells - Remove upstreamed tor-0.3.5.8-no-ssl-version-warning.patch Bernhard Wiedemann 2019-08-20 15:55:51 +00:00
  • c824d63972 - update to 0.4.1.5 * Onion service clients now add padding cells at the start of their INTRODUCE and RENDEZVOUS circuits to make it look like Exit traffic * Add a generic publish-subscribe message-passing subsystem * Controller commands are now parsed using a generalized parsing subsystem * Implement authenticated SENDMEs as detailed in proposal 289 * Our node selection algorithm now excludes nodes in linear time * Construct a fast secure pseudorandom number generator for each thread, to use when performance is critical * Consider our directory information to have changed when our list of bridges changes * Do not count previously configured working bridges towards our total of working bridges * When considering upgrading circuits from "waiting for guard" to "open", always ignore circuits that are marked for close * Properly clean up the introduction point map when circuits change purpose * Fix an unreachable bug in which an introduction point could try to send an INTRODUCE_ACK * Clients can now handle unknown status codes from INTRODUCE_ACK cells - Remove upstreamed tor-0.3.5.8-no-ssl-version-warning.patch Bernhard Wiedemann 2019-08-20 15:55:51 +00:00
  • 7d214eab59 Accepting request 718874 from home:mgerstner:branches:network Tomáš Chvátal 2019-07-29 13:13:35 +00:00
  • ed40f1470a Accepting request 718874 from home:mgerstner:branches:network Tomáš Chvátal 2019-07-29 13:13:35 +00:00
  • 861933af11 Accepting request 704260 from network Dominique Leuenberger 2019-05-21 08:40:22 +00:00
  • c8356c7464 Accepting request 704260 from network Dominique Leuenberger 2019-05-21 08:40:22 +00:00
  • e75f3e5460 Accepting request 704249 from home:cgiboudeaux:branches:network Tomáš Chvátal 2019-05-20 13:27:07 +00:00
  • a360c98833 Accepting request 704249 from home:cgiboudeaux:branches:network Tomáš Chvátal 2019-05-20 13:27:07 +00:00
  • dfc3e5a065 Accepting request 702484 from network Dominique Leuenberger 2019-05-13 12:51:57 +00:00
  • a299a7a395 Accepting request 702484 from network Dominique Leuenberger 2019-05-13 12:51:57 +00:00
  • 9b5ff7bb33 Accepting request 701964 from home:AndreasStieger:branches:network Lars Vogdt 2019-05-12 12:55:32 +00:00
  • 02e1c58e87 Accepting request 701964 from home:AndreasStieger:branches:network Lars Vogdt 2019-05-12 12:55:32 +00:00
  • 64209d1ee0 update ssl-version-warning patch Bernhard Wiedemann 2019-04-16 19:39:40 +00:00
  • 6c8ec89975 update ssl-version-warning patch Bernhard Wiedemann 2019-04-16 19:39:40 +00:00
  • 4a09736311 - Add tor-0.3.5.8-no-ssl-version-warning.patch (boo#1129411) - Update tor.tmpfiles to use /run instead of /var/run Bernhard Wiedemann 2019-04-15 13:04:44 +00:00
  • 5903dbc659 - Add tor-0.3.5.8-no-ssl-version-warning.patch (boo#1129411) - Update tor.tmpfiles to use /run instead of /var/run Bernhard Wiedemann 2019-04-15 13:04:44 +00:00
  • af3258b8c2 Accepting request 678960 from network Dominique Leuenberger 2019-02-26 21:20:08 +00:00
  • 756de75255 Accepting request 678960 from network Dominique Leuenberger 2019-02-26 21:20:08 +00:00
  • 90f03c7b41 Add tor-0.3.5.8-nonetwork.patch to fix test failures without network Bernhard Wiedemann 2019-02-25 15:56:30 +00:00
  • 10b0057cef Add tor-0.3.5.8-nonetwork.patch to fix test failures without network Bernhard Wiedemann 2019-02-25 15:56:30 +00:00
  • 09c7de71ed - tor 0.3.5.8: * CVE-2019-8955 prevent attackers from making tor run out of memory and crash * Allow SOCKS5 with empty username+password * Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database * Select guards even if the consensus has expired, as long as the consensus is still reasonably live Bernhard Wiedemann 2019-02-22 15:11:14 +00:00
  • 8675fbe268 - tor 0.3.5.8: * CVE-2019-8955 prevent attackers from making tor run out of memory and crash * Allow SOCKS5 with empty username+password * Update geoip and geoip6 to the February 5 2019 Maxmind GeoLite2 Country database * Select guards even if the consensus has expired, as long as the consensus is still reasonably live Bernhard Wiedemann 2019-02-22 15:11:14 +00:00
  • b292986deb Accepting request 663471 from network Dominique Leuenberger 2019-01-10 14:20:49 +00:00
  • ac2661c341 Accepting request 663471 from network Dominique Leuenberger 2019-01-10 14:20:49 +00:00
  • f263ca0a0c tor 0.3.4.10 Andreas Stieger 2019-01-07 23:26:14 +00:00
  • 91e272e4a6 tor 0.3.4.10 Andreas Stieger 2019-01-07 23:26:14 +00:00
  • d67032f3df tor 0.3.4.10 Andreas Stieger 2019-01-07 23:05:09 +00:00
  • b929cec176 tor 0.3.4.10 Andreas Stieger 2019-01-07 23:05:09 +00:00
  • a79210e9a6 Accepting request 646176 from network Dominique Leuenberger 2018-11-06 13:33:57 +00:00
  • cd858350a0 Accepting request 646176 from network Dominique Leuenberger 2018-11-06 13:33:57 +00:00
  • 7a1f571b20 Accepting request 646175 from home:AndreasStieger:branches:network Andreas Stieger 2018-11-03 08:51:41 +00:00
  • 77c99f5741 Accepting request 646175 from home:AndreasStieger:branches:network Andreas Stieger 2018-11-03 08:51:41 +00:00
  • dec468df3f Accepting request 634782 from network Yuchen Lin 2018-09-15 13:37:26 +00:00
  • 2744fa2bd4 Accepting request 634782 from network Yuchen Lin 2018-09-15 13:37:26 +00:00
  • 748409109f - tor 0.3.4.8 (boo#1107847): * improvements for running in low-power and embedded environments * preliminary changes for new bandwidth measurement system * refine anti-denial-of-service code Andreas Stieger 2018-09-10 15:54:01 +00:00
  • 4406b974b8 - tor 0.3.4.8 (boo#1107847): * improvements for running in low-power and embedded environments * preliminary changes for new bandwidth measurement system * refine anti-denial-of-service code Andreas Stieger 2018-09-10 15:54:01 +00:00
  • 035e2fa035 tor 0.3.3.10 Andreas Stieger 2018-09-10 14:00:04 +00:00
  • f6bc8b3474 tor 0.3.3.10 Andreas Stieger 2018-09-10 14:00:04 +00:00
  • df98ead8d2 Accepting request 622849 from network Dominique Leuenberger 2018-07-17 07:41:22 +00:00