[tor-commits] [translation/bridgedb] Update translations for bridgedb

2018-08-11 Thread translation
commit ba7e37e336e93ac98a09e28b89fc08aed0cbd411
Author: Translation commit bot 
Date:   Sun Aug 12 05:45:10 2018 +

Update translations for bridgedb
---
 tr/LC_MESSAGES/bridgedb.po | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/tr/LC_MESSAGES/bridgedb.po b/tr/LC_MESSAGES/bridgedb.po
index 0341671cf..072cfc7f2 100644
--- a/tr/LC_MESSAGES/bridgedb.po
+++ b/tr/LC_MESSAGES/bridgedb.po
@@ -27,7 +27,7 @@ msgstr ""
 "Project-Id-Version: The Tor Project\n"
 "Report-Msgid-Bugs-To: 
'https://trac.torproject.org/projects/tor/newticket?component=BridgeDB=bridgedb-reported,msgid=isis,sysrqb=isis'\n"
 "POT-Creation-Date: 2015-07-25 03:40+\n"
-"PO-Revision-Date: 2018-06-22 05:22+\n"
+"PO-Revision-Date: 2018-08-12 05:26+\n"
 "Last-Translator: Kaya Zeren \n"
 "Language-Team: Turkish 
(http://www.transifex.com/otf/torproject/language/tr/)\n"
 "MIME-Version: 1.0\n"
@@ -264,7 +264,7 @@ msgid ""
 "Pluggable Transports %s which maybe doesn't sound as cool, but they can 
still\n"
 "help to circumvent internet censorship in many cases.\n"
 "\n"
-msgstr "Ek olarak BridgeDB %s hiçbir Takılabilir Aktarımı kullanmayan %s 
birçok eski, sıradan\nve özelliksiz köprüye sahiptir. Kulağa iyi 
gelmeyebilir ancak bu köprüler hala pek çok\ndurumda İnternet 
kısıtlamalarını aşmaya yardım edebilirler.\n\n"
+msgstr "Ayrıca BridgeDB %s üzerinde herhangi bir Takılabilir Aktarımı 
kullanmayan %s birçok eski, sıradan\nve özelliksiz vanilla köprüsü 
bulunur. Kulağa pek iyi gelmeyebilir ancak bu köprüler hala pek 
çok\ndurumda İnternet engellemelerini aşmaya yardım edebilir.\n\n"
 
 #: bridgedb/strings.py:101
 msgid "What are bridges?"

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [translation/bridgedb_completed] Update translations for bridgedb_completed

2018-08-11 Thread translation
commit 92638a79b4019c3adc072d74d248b3f6a7305c36
Author: Translation commit bot 
Date:   Sun Aug 12 05:45:16 2018 +

Update translations for bridgedb_completed
---
 tr/LC_MESSAGES/bridgedb.po | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/tr/LC_MESSAGES/bridgedb.po b/tr/LC_MESSAGES/bridgedb.po
index 0341671cf..072cfc7f2 100644
--- a/tr/LC_MESSAGES/bridgedb.po
+++ b/tr/LC_MESSAGES/bridgedb.po
@@ -27,7 +27,7 @@ msgstr ""
 "Project-Id-Version: The Tor Project\n"
 "Report-Msgid-Bugs-To: 
'https://trac.torproject.org/projects/tor/newticket?component=BridgeDB=bridgedb-reported,msgid=isis,sysrqb=isis'\n"
 "POT-Creation-Date: 2015-07-25 03:40+\n"
-"PO-Revision-Date: 2018-06-22 05:22+\n"
+"PO-Revision-Date: 2018-08-12 05:26+\n"
 "Last-Translator: Kaya Zeren \n"
 "Language-Team: Turkish 
(http://www.transifex.com/otf/torproject/language/tr/)\n"
 "MIME-Version: 1.0\n"
@@ -264,7 +264,7 @@ msgid ""
 "Pluggable Transports %s which maybe doesn't sound as cool, but they can 
still\n"
 "help to circumvent internet censorship in many cases.\n"
 "\n"
-msgstr "Ek olarak BridgeDB %s hiçbir Takılabilir Aktarımı kullanmayan %s 
birçok eski, sıradan\nve özelliksiz köprüye sahiptir. Kulağa iyi 
gelmeyebilir ancak bu köprüler hala pek çok\ndurumda İnternet 
kısıtlamalarını aşmaya yardım edebilirler.\n\n"
+msgstr "Ayrıca BridgeDB %s üzerinde herhangi bir Takılabilir Aktarımı 
kullanmayan %s birçok eski, sıradan\nve özelliksiz vanilla köprüsü 
bulunur. Kulağa pek iyi gelmeyebilir ancak bu köprüler hala pek 
çok\ndurumda İnternet engellemelerini aşmaya yardım edebilir.\n\n"
 
 #: bridgedb/strings.py:101
 msgid "What are bridges?"

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [stem/master] Listener exceptions and malformed events broke event loop

2018-08-11 Thread atagar
commit ed6460df4a6fa8446a1e2923bddde652f5d91ed7
Author: Damian Johnson 
Date:   Fri Aug 10 03:30:47 2018 -0700

Listener exceptions and malformed events broke event loop

When a listener raised an uncaught exception or tor provides a malformed 
event
we terminated our event loop, preventing any further events from being 
handled.
I haven't seen this nail us in practice but definitely both oversights.

  https://trac.torproject.org/projects/tor/ticket/27053
---
 docs/change_log.rst |  2 ++
 stem/control.py | 25 +
 test/unit/control/controller.py | 18 +-
 3 files changed, 32 insertions(+), 13 deletions(-)

diff --git a/docs/change_log.rst b/docs/change_log.rst
index 362e4e10..75a25847 100644
--- a/docs/change_log.rst
+++ b/docs/change_log.rst
@@ -47,6 +47,8 @@ The following are only available within Stem's `git repository
  * **Controller**
 
   * Documented v3 hidden service support (:trac:`25124`, :spec:`6bd0a69`)
+  * Listener exceptions and malformed events no longer break further event 
processing (:trac:`27053`)
+  * Added the stem.control.MALFORMED_EVENTS event listener constant
   * Added support for limiting the maximum number of streams to 
:func:`~stem.control.Controller.create_ephemeral_hidden_service` 
(:spec:`2fcb1c2`)
   * Added a timeout argument to :class:`~stem.control.Controller` methods that 
could await a response (:trac:`26056`)
   * Stacktrace if :func:`stem.connection.connect` had a string port argument
diff --git a/stem/control.py b/stem/control.py
index 7e1d1286..05cf44ce 100644
--- a/stem/control.py
+++ b/stem/control.py
@@ -286,6 +286,8 @@ from stem.util import log
 
 EVENTS_LISTENING_TIMEOUT = 0.1
 
+MALFORMED_EVENTS = 'MALFORMED_EVENTS'
+
 # state changes a control socket can have
 
 State = stem.util.enum.Enum('INIT', 'RESET', 'CLOSED')
@@ -3057,6 +3059,13 @@ class Controller(BaseController):
 If a new control connection is initialized then this listener will be
 reattached.
 
+If tor emits a malformed event it can be received by listening for the
+stem.control.MALFORMED_EVENTS constant.
+
+.. versionchanged:: 1.7.0
+   Listener exceptions and malformed events no longer break further event
+   processing. Added the **MALFORMED_EVENTS** constant.
+
 :param functor listener: function to be called when an event is received
 :param stem.control.EventType events: event types to be listened for
 
@@ -3874,13 +3883,21 @@ class Controller(BaseController):
 log.warn('We were unable assert ownership of tor through 
TAKEOWNERSHIP, despite being configured to be the owning process through 
__OwningControllerProcess. (%s)' % response)
 
   def _handle_event(self, event_message):
-stem.response.convert('EVENT', event_message, arrived_at = time.time())
+try:
+  stem.response.convert('EVENT', event_message, arrived_at = time.time())
+  event_type = event_message.type
+except stem.ProtocolError as exc:
+  log.error('Tor sent a malformed event (%s): %s' % (exc, event_message))
+  event_type = MALFORMED_EVENTS
 
 with self._event_listeners_lock:
-  for event_type, event_listeners in list(self._event_listeners.items()):
-if event_type == event_message.type:
+  for listener_type, event_listeners in 
list(self._event_listeners.items()):
+if listener_type == event_type:
   for listener in event_listeners:
-listener(event_message)
+try:
+  listener(event_message)
+except Exception as exc:
+  log.warn('Event listener raised an uncaught exception (%s): %s' 
% (exc, event_message))
 
   def _attach_listeners(self):
 """
diff --git a/test/unit/control/controller.py b/test/unit/control/controller.py
index fa934f34..c5809192 100644
--- a/test/unit/control/controller.py
+++ b/test/unit/control/controller.py
@@ -15,7 +15,7 @@ import stem.util.system
 import stem.version
 
 from stem import ControllerError, DescriptorUnavailable, InvalidArguments, 
InvalidRequest, ProtocolError, UnsatisfiableRequest
-from stem.control import _parse_circ_path, Listener, Controller, EventType
+from stem.control import MALFORMED_EVENTS, _parse_circ_path, Listener, 
Controller, EventType
 from stem.response import ControlMessage
 from stem.exit_policy import ExitPolicy
 
@@ -49,6 +49,9 @@ class TestControl(unittest.TestCase):
   self.bw_listener = Mock()
   self.controller.add_event_listener(self.bw_listener, EventType.BW)
 
+  self.malformed_listener = Mock()
+  self.controller.add_event_listener(self.malformed_listener, 
MALFORMED_EVENTS)
+
   def test_event_description(self):
 self.assertEqual("Logging at the debug runlevel. This is low level, high 
volume information about tor's internals that generally isn't useful to 
users.", stem.control.event_description('DEBUG'))
 self.assertEqual('Event emitted every second with the bytes sent and 

[tor-commits] [torspec/master] Merge remote-tracking branch 'teor/ticket26827'

2018-08-11 Thread nickm
commit 2d33e5f2e95f068d783673865c08cf6d33c36614
Merge: 1dbb6d6 b155c2e
Author: Nick Mathewson 
Date:   Sat Aug 11 10:20:24 2018 -0400

Merge remote-tracking branch 'teor/ticket26827'

 dir-spec.txt | 4 
 1 file changed, 4 insertions(+)

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [torspec/master] dir-spec: Authorities should only read V3BandwidthsFile once per vote

2018-08-11 Thread nickm
commit b155c2e13d96c204121503df9e5aa22d30f3f9da
Author: teor 
Date:   Wed Jul 18 11:15:42 2018 +1000

dir-spec: Authorities should only read V3BandwidthsFile once per vote

Closes 26827.
---
 dir-spec.txt | 4 
 1 file changed, 4 insertions(+)

diff --git a/dir-spec.txt b/dir-spec.txt
index 7da4c9a..8da28c4 100644
--- a/dir-spec.txt
+++ b/dir-spec.txt
@@ -2631,6 +2631,10 @@
 
  http:///tor/status-vote/next/authority.z
 
+   To avoid inconsistent reads, authorities SHOULD only read the bandwidth
+   file once per voting period. Further processing and serving SHOULD use a
+   cached copy.
+
The bandwidth list format is described in bandwidth-file-spec.txt.
 
The standard URLs for bandwidth list files first-appeared in Tor 0.3.5.



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Merge remote-tracking branch 'tor-github/pr/206'

2018-08-11 Thread nickm
commit 57d0b8c3cd7213f03b0a37c8c74c003b1c820438
Merge: c775689e9 5028a52b5
Author: Nick Mathewson 
Date:   Sat Aug 11 10:14:29 2018 -0400

Merge remote-tracking branch 'tor-github/pr/206'

 INSTALL  | 34 --
 changes/doc26588 |  3 +++
 2 files changed, 3 insertions(+), 34 deletions(-)

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Remove old instructions from INSTALL

2018-08-11 Thread nickm
commit 5028a52b54a7123e9dccc3271c8801c7dbde05d6
Author: rl1987 
Date:   Tue Jul 3 16:33:07 2018 +0300

Remove old instructions from INSTALL
---
 INSTALL  | 34 --
 changes/doc26588 |  3 +++
 2 files changed, 3 insertions(+), 34 deletions(-)

diff --git a/INSTALL b/INSTALL
index ddb790b0b..f493f4ed3 100644
--- a/INSTALL
+++ b/INSTALL
@@ -16,37 +16,3 @@ If it doesn't build for you:
 ./configure --with-libevent-dir=/usr/local
   rather than simply ./configure.
 
-  If you have mysterious autoconf failures while linking openssl,
-  consider setting your LD_LIBRARY_PATH to the openssl lib directory.
-  For example, "setenv LD_LIBRARY_PATH /usr/athena/lib".
-
-  Lastly, check out
-  https://www.torproject.org/docs/faq#DoesntWork
-
-How to do static builds of tor:
-
-Tor supports linking each of the libraries it needs statically. Use the
---enable-static-X ./configure option in conjunction with the --with-X-dir
-option for libevent, zlib, and openssl. For this to work sanely, libevent
-should be built with --disable-shared --enable-static --with-pic, and
-OpenSSL should be built with no-shared no-dso.
-
-If you need to build tor so that system libraries are also statically linked,
-use the --enable-static-tor ./configure option. This won't work on OS X
-unless you build the required crt0.o yourself. It is also incompatible with
-the --enable-gcc-hardening option.
-
-An example of how to build a mostly static tor:
-./configure --enable-static-libevent \
---enable-static-openssl  \
---enable-static-zlib \
---with-libevent-dir=/tmp/static-tor/libevent-1.4.14b-stable \
---with-openssl-dir=/tmp/static-tor/openssl-0.9.8r/ \
---with-zlib-dir=/tmp/static-tor/zlib-1.2.5
-
-An example of how to build an entirely static tor:
-./configure --enable-static-tor \
---with-libevent-dir=/tmp/static-tor/libevent-1.4.14b-stable \
---with-openssl-dir=/tmp/static-tor/openssl-0.9.8r/ \
---with-zlib-dir=/tmp/static-tor/zlib-1.2.5
-
diff --git a/changes/doc26588 b/changes/doc26588
new file mode 100644
index 0..4b67bdb03
--- /dev/null
+++ b/changes/doc26588
@@ -0,0 +1,3 @@
+  o Documentation:
+- Remove old instructions from INSTALL document. Closes
+  ticket 26588.



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Add changes file

2018-08-11 Thread nickm
commit dddc9a1715a2101690adb4026be81c2cc1aad671
Author: rl1987 
Date:   Fri Jul 20 21:42:45 2018 +0300

Add changes file
---
 changes/bug26882 | 5 +
 1 file changed, 5 insertions(+)

diff --git a/changes/bug26882 b/changes/bug26882
new file mode 100644
index 0..adfe0e2f3
--- /dev/null
+++ b/changes/bug26882
@@ -0,0 +1,5 @@
+  o Minor bugfixes (logging, documentation):
+- When SafeLogging is enabled, scrub IP address in
+  channel_tls_process_netinfo_cell(). Also, add a note
+  to manpage that scrubbing is not guaranteed on loglevels
+  below Notice. Fixes bug 26882; bugfix on 0.2.4.10-alpha.



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Scrub IP in channel_tls_process_netinfo_cell() if SafeLogging is on

2018-08-11 Thread nickm
commit 9c34f95b89e8c1c86c8564a40fcd1090180dd686
Author: rl1987 
Date:   Fri Jul 20 21:13:38 2018 +0300

Scrub IP in channel_tls_process_netinfo_cell() if SafeLogging is on
---
 src/core/or/channeltls.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/src/core/or/channeltls.c b/src/core/or/channeltls.c
index 87f5a02b7..96898993c 100644
--- a/src/core/or/channeltls.c
+++ b/src/core/or/channeltls.c
@@ -1837,7 +1837,8 @@ channel_tls_process_netinfo_cell(cell_t *cell, 
channel_tls_t *chan)
  (int)(chan->conn->link_proto),
  hex_str(identity_digest, DIGEST_LEN),
  tor_addr_is_null(_apparent_addr) ?
- "" : fmt_and_decorate_addr(_apparent_addr));
+   "" :
+   safe_str_client(fmt_and_decorate_addr(_apparent_addr)));
   }
   assert_connection_ok(TO_CONN(chan->conn),time(NULL));
 }



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Add a sentence to manpage that we may not scrub logs at loglevels below Notice

2018-08-11 Thread nickm
commit a17e9d33781ae56107cfe4b1ece17c1273f8acec
Author: rl1987 
Date:   Fri Jul 20 21:35:13 2018 +0300

Add a sentence to manpage that we may not scrub logs at loglevels below 
Notice
---
 doc/tor.1.txt | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/doc/tor.1.txt b/doc/tor.1.txt
index 1db8cabf8..0c010d94f 100644
--- a/doc/tor.1.txt
+++ b/doc/tor.1.txt
@@ -754,7 +754,9 @@ GENERAL OPTIONS
 If this option is set to 0, Tor will not perform any scrubbing, if it is
 set to 1, all potentially sensitive strings are replaced. If it is set to
 relay, all log messages generated when acting as a relay are sanitized, but
-all messages generated when acting as a client are not. (Default: 1)
+all messages generated when acting as a client are not.
+Note: Tor may not heed this option when logging at log levels below Notice.
+(Default: 1)
 
 [[User]] **User** __Username__::
 On startup, setuid to this user and setgid to their primary group.



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Merge remote-tracking branch 'tor-github/pr/244'

2018-08-11 Thread nickm
commit c775689e96be101d2818722aa92393190ca3fc6d
Merge: 61d5bcc1a dddc9a171
Author: Nick Mathewson 
Date:   Sat Aug 11 10:05:15 2018 -0400

Merge remote-tracking branch 'tor-github/pr/244'

 changes/bug26882 | 5 +
 doc/tor.1.txt| 4 +++-
 src/core/or/channeltls.c | 3 ++-
 3 files changed, 10 insertions(+), 2 deletions(-)

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Print stacktrace when crypto_pk_get_digest() fails in router_build_fresh_descriptor()

2018-08-11 Thread nickm
commit 7a1007861f978abe0703a8fe062ed3c983bccd49
Author: rl1987 
Date:   Wed Aug 8 18:56:27 2018 +0300

Print stacktrace when crypto_pk_get_digest() fails in 
router_build_fresh_descriptor()
---
 src/feature/relay/router.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/feature/relay/router.c b/src/feature/relay/router.c
index 40839f260..e4ec01af2 100644
--- a/src/feature/relay/router.c
+++ b/src/feature/relay/router.c
@@ -2350,8 +2350,8 @@ router_build_fresh_descriptor(routerinfo_t **r, 
extrainfo_t **e)
   }
 
   ri->identity_pkey = crypto_pk_dup_key(get_server_identity_key());
-  if (crypto_pk_get_digest(ri->identity_pkey,
-   ri->cache_info.identity_digest)<0) {
+  if (BUG(crypto_pk_get_digest(ri->identity_pkey,
+   ri->cache_info.identity_digest) < 0)) {
 routerinfo_free(ri);
 return TOR_ROUTERINFO_ERROR_DIGEST_FAILED;
   }



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Merge remote-tracking branch 'tor-github/pr/268'

2018-08-11 Thread nickm
commit 61d5bcc1a251002d726e66461ec576d9b71cebd1
Merge: b7ed61167 5f2e00241
Author: Nick Mathewson 
Date:   Sat Aug 11 10:04:04 2018 -0400

Merge remote-tracking branch 'tor-github/pr/268'

 changes/bug27034   |  6 ++
 src/feature/relay/router.c | 26 --
 src/test/test_policy.c |  2 +-
 3 files changed, 15 insertions(+), 19 deletions(-)

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Consider all routerinfo errors other than "not a server" transient

2018-08-11 Thread nickm
commit 9c242e950b45ac67b2b741bc4e0c920a9a57cb43
Author: rl1987 
Date:   Wed Aug 8 18:47:43 2018 +0300

Consider all routerinfo errors other than "not a server" transient
---
 src/feature/relay/router.c | 22 ++
 src/test/test_policy.c |  2 +-
 2 files changed, 7 insertions(+), 17 deletions(-)

diff --git a/src/feature/relay/router.c b/src/feature/relay/router.c
index 0cc488723..40839f260 100644
--- a/src/feature/relay/router.c
+++ b/src/feature/relay/router.c
@@ -164,22 +164,12 @@ routerinfo_err_to_string(int err)
 int
 routerinfo_err_is_transient(int err)
 {
-  switch (err) {
-case TOR_ROUTERINFO_ERROR_NO_EXT_ADDR:
-  return 1;
-case TOR_ROUTERINFO_ERROR_CANNOT_PARSE:
-  return 1;
-case TOR_ROUTERINFO_ERROR_NOT_A_SERVER:
-  return 0;
-case TOR_ROUTERINFO_ERROR_DIGEST_FAILED:
-  return 0; // XXX: bug?
-case TOR_ROUTERINFO_ERROR_CANNOT_GENERATE:
-  return 1;
-case TOR_ROUTERINFO_ERROR_DESC_REBUILDING:
-  return 1;
-  }
-
-  return 0;
+  /**
+   * For simplicity, we consider all errors other than
+   * "not a server" transient - see discussion on
+   * https://trac.torproject.org/projects/tor/ticket/27034
+   */
+  return err != TOR_ROUTERINFO_ERROR_NOT_A_SERVER;
 }
 
 /** Replace the current onion key with k.  Does not affect
diff --git a/src/test/test_policy.c b/src/test/test_policy.c
index 4b1adc91f..6a07e5b1f 100644
--- a/src/test/test_policy.c
+++ b/src/test/test_policy.c
@@ -1706,7 +1706,7 @@ test_policies_getinfo_helper_policies(void *arg)
   rv = getinfo_helper_policies(NULL, "exit-policy/full", ,
);
 
-  tt_int_op(rv, OP_EQ, 0);
+  tt_int_op(rv, OP_EQ, -1);
   tt_ptr_op(answer, OP_EQ, NULL);
   tt_ptr_op(errmsg, OP_NE, NULL);
   tt_str_op(errmsg, OP_EQ, "Key digest failed");



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [tor/master] Add changes file

2018-08-11 Thread nickm
commit 5f2e00241a35f7658bde4f9afb0a758588217e40
Author: rl1987 
Date:   Wed Aug 8 19:07:50 2018 +0300

Add changes file
---
 changes/bug27034 | 6 ++
 1 file changed, 6 insertions(+)

diff --git a/changes/bug27034 b/changes/bug27034
new file mode 100644
index 0..bdb7d29c1
--- /dev/null
+++ b/changes/bug27034
@@ -0,0 +1,6 @@
+  o Minor bugfixes (controller):
+- Consider all routerinfo errors other than "not a server"
+  to be transient for the purpose of "GETINFO exit-policy/*"
+  controller request. Print stacktrace in the unlikely case
+  of failing to recompute routerinfo digest. Fixes bug 27034;
+  bugfix on 0.3.4.1-alpha.



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [torspec/master] Merge remote-tracking branch 'tor-github/pr/32'

2018-08-11 Thread nickm
commit 1dbb6d6fbbae3dd939f54166971282fa7d6063b3
Merge: 3379222 b12d0a0
Author: Nick Mathewson 
Date:   Sat Aug 11 10:02:36 2018 -0400

Merge remote-tracking branch 'tor-github/pr/32'

 control-spec.txt | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [torspec/master] Simplify explanation of GETINFO exit-policy/*

2018-08-11 Thread nickm
commit b12d0a01ad3ad882b6dda7bbf8fc44205886f966
Author: rl1987 
Date:   Sun Aug 5 18:19:48 2018 +0300

Simplify explanation of GETINFO exit-policy/*

Do not mention "non-transient internal error" as it is extremely
unlikely to happen.
---
 control-spec.txt | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/control-spec.txt b/control-spec.txt
index e7a5b79..5bca036 100644
--- a/control-spec.txt
+++ b/control-spec.txt
@@ -564,8 +564,7 @@
   ExitPolicyRejectLocalInterfaces. These lines are based on the public
   addresses configured in the torrc and present on the relay's
   interfaces. Will send 552 error if the server is not running as
-  onion router or if there's non-transient internal error. Will send
-  551 on transient internal error.
+  onion router. Will send 551 on internal error which may be transient.
 
 "exit-policy/ipv4"
 "exit-policy/ipv6"



___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits


[tor-commits] [webwml/master] Fix typo in bridges docs

2018-08-11 Thread hiro
commit 848d5f2c5df2aabc4fb3e1eda41a6fe2d78dc441
Author: hiro 
Date:   Sat Aug 11 09:59:40 2018 +0200

Fix typo in bridges docs
---
 docs/en/bridges.wml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/docs/en/bridges.wml b/docs/en/bridges.wml
index 4eff6f45..33c0ad6c 100644
--- a/docs/en/bridges.wml
+++ b/docs/en/bridges.wml
@@ -96,7 +96,7 @@
 
 Sadly, pluggable transports are not immune to detection, if a censor
 is given enough time. In the past, we promoted obfs and obfs2 as safe
-transports. These are now deprecated and were replaced by obfs4,
+transports. These are now deprecated and were replaced by obfs3,
 scramblesuit, fte, and obfs4.
 
 Bridges which support pluggable transports can be used with Tor Browser

___
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits