[tor-talk] Fixing Orchid (again), need help!

2018-11-08 Thread Masayuki Hatta
Hi!

As I wrote here some time ago, I fixed Orchid the Java Tor, and it
worked for a while.

https://lists.torproject.org/pipermail/tor-talk/2018-April/044133.html

Recently (I think it was around July-Aug), Orchid became unworkable
again.  I'm trying to but can't figure out the cause, so I appreciate
your help.

Orchid's repo is here: https://github.com/mhatta/Orchid

As far as I could see, now Orchid hangs because it can't receive
VERSIONS cells so the first handshake with Directory Authorities can't
be finished.  Some change at Dir Auths (updating new version of Tor, I
guess)  might cause this, but I can't figure out which changes affect
this.  Do you have any idea?

Best regards,
MH

--
Masayuki Hatta
Associate Professor, Faculty of Economics and Management, Surugadai
University, Japan

http://about.me/mhatta

mha...@gnu.org  / mha...@debian.org / mha...@opensource.jp /
hatta.masay...@surugadai.ac.jp
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor 0.3.5.4-alpha is released.

2018-11-08 Thread Nick Mathewson
Hi, all!

There's a new alpha Tor release! Because it's an alpha, you should
only run it if you're ready to find more bugs than usual, and report
them on trac.torproject.org.

The source code is available from the Download page on
www.torproject.org; if you build Tor from source, why not give it a
try? And if you don't build Tor from source, packages should be ready
over the coming days, with a Tor Browser alpha release likely by
mid-December.

Here's what's new:

Changes in version 0.3.5.4-alpha - 2018-11-08
  Tor 0.3.5.4-alpha includes numerous bugfixes on earlier versions and
  improves our continuous integration support. It continues our attempts
  to stabilize this alpha branch and build it into a foundation for an
  acceptable long-term-support release.

  o Major bugfixes (compilation, rust):
- Rust tests can now build and run successfully with the
  --enable-fragile-hardening option enabled. Doing this currently
  requires the rust beta channel; it will be possible with stable
  rust once Rust version 1.31 is released. Patch from Alex Crichton.
  Fixes bugs 27272, 27273, and 27274. Bugfix on 0.3.1.1-alpha.

  o Major bugfixes (embedding, main loop):
- When DisableNetwork becomes set, actually disable periodic events
  that are already enabled. (Previously, we would refrain from
  enabling new ones, but we would leave the old ones turned on.)
  Fixes bug 28348; bugfix on 0.3.4.1-alpha.

  o Minor features (continuous integration):
- Add a Travis CI build for --enable-nss on Linux gcc. Closes
  ticket 27751.
- Add new CI job to Travis configuration to run stem-based
  integration tests. Closes ticket 27913.

  o Minor features (Windows, continuous integration):
- Build tor on Windows Server 2012 R2 and Windows Server 2016 using
  Appveyor's CI. Closes ticket 28318.

  o Minor bugfixes (C correctness, also in 0.3.4.9):
- Avoid undefined behavior in an end-of-string check when parsing
  the BEGIN line in a directory object. Fixes bug 28202; bugfix
  on 0.2.0.3-alpha.

  o Minor bugfixes (compilation):
- Fix a pair of missing headers on OpenBSD. Fixes bug 28303; bugfix
  on 0.3.5.1-alpha. Patch from Kris Katterjohn.

  o Minor bugfixes (compilation, OpenSolaris):
- Fix compilation on OpenSolaris and its descendants by adding a
  missing include to compat_pthreads.c. Fixes bug 27963; bugfix
  on 0.3.5.1-alpha.

  o Minor bugfixes (configuration):
- Refuse to start with relative file paths and RunAsDaemon set
  (regression from the fix for bug 22731). Fixes bug 28298; bugfix
  on 0.3.3.1-alpha.

  o Minor bugfixes (directory authority, also in 0.3.4.9):
- Log additional info when we get a relay that shares an ed25519 ID
  with a different relay, instead of a BUG() warning with a
  backtrace. Fixes bug 27800; bugfix on 0.3.2.1-alpha.

  o Minor bugfixes (onion service v3):
- Build the service descriptor's signing key certificate before
  uploading, so we always have a fresh one: leaving no chances for
  it to expire service side. Fixes bug 27838; bugfix
  on 0.3.2.1-alpha.

  o Minor bugfixes (onion service v3, client authorization):
- Fix an assert() when adding a client authorization for the first
  time and then sending a HUP signal to the service. Before that,
  Tor would stop abruptly. Fixes bug 27995; bugfix on 0.3.5.1-alpha.

  o Minor bugfixes (onion services):
- Unless we have explicitly set HiddenServiceVersion, detect the
  onion service version and then look for invalid options.
  Previously, we did the reverse, but that broke existing configs
  which were pointed to a v2 service and had options like
  HiddenServiceAuthorizeClient set. Fixes bug 28127; bugfix on
  0.3.5.1-alpha. Patch by Neel Chauhan.

  o Minor bugfixes (portability):
- Make the OPE code (which is used for v3 onion services) run
  correctly on big-endian platforms. Fixes bug 28115; bugfix
  on 0.3.5.1-alpha.

  o Minor bugfixes (protover, rust):
- Reject extra commas in version strings. Fixes bug 27197; bugfix
  on 0.3.3.3-alpha.

  o Minor bugfixes (relay shutdown, systemd):
- Notify systemd of ShutdownWaitLength so it can be set to longer
  than systemd's TimeoutStopSec. In Tor's systemd service file, set
  TimeoutSec to 60 seconds to allow Tor some time to shut down.
  Fixes bug 28113; bugfix on 0.2.6.2-alpha.

  o Minor bugfixes (rust, also in 0.3.4.9):
- Fix a potential null dereference in protover_all_supported(). Add
  a test for it. Fixes bug 27804; bugfix on 0.3.3.1-alpha.
- Return a string that can be safely freed by C code, not one
  created by the rust allocator, in protover_all_supported(). Fixes
  bug 27740; bugfix on 0.3.3.1-alpha.

  o Minor bugfixes (rust, directory authority, also in 0.3.4.9):
- Fix an API mismatch in the rust implementation of
  protover_compute_vote(). This bug c

Re: [tor-talk] Fixing Orchid (again), need help!

2018-11-08 Thread Nick Mathewson
On Thu, Nov 8, 2018 at 6:12 AM Masayuki Hatta  wrote:
>
> Hi!
>
> As I wrote here some time ago, I fixed Orchid the Java Tor, and it
> worked for a while.
>
> https://lists.torproject.org/pipermail/tor-talk/2018-April/044133.html
>
> Recently (I think it was around July-Aug), Orchid became unworkable
> again.  I'm trying to but can't figure out the cause, so I appreciate
> your help.
>
> Orchid's repo is here: https://github.com/mhatta/Orchid
>
> As far as I could see, now Orchid hangs because it can't receive
> VERSIONS cells so the first handshake with Directory Authorities can't
> be finished.  Some change at Dir Auths (updating new version of Tor, I
> guess)  might cause this, but I can't figure out which changes affect
> this.  Do you have any idea?
>
> Best regards,
What versions does Orchid send in its VERSIONS cell?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk