Browse Source

Remove all comment references to obsolete tor versions

teor 5 years ago
parent
commit
74e87ead49

+ 0 - 4
README

@@ -105,10 +105,6 @@ Connection Tests:
   # Run 5 sequential verification rounds
   CHUTNEY_ROUNDS=5 ./tools/test-network.sh --flavour basic
 
-Note: If you create 7 or more connections to a hidden service from a single
-Tor 0.2.7 client, you'll likely get a verification failure due to #15937.
-This is fixed in 0.2.8.
-
 HS Connection Tests:
   ./chutney configure networks/hs-025
   ./chutney start networks/hs-025

+ 2 - 7
lib/chutney/TorNet.py

@@ -291,8 +291,6 @@ class LocalNodeBuilder(NodeBuilder):
         tor = self._env['tor']
         # find the options the current tor binary supports, and cache them
         if tor not in _TORRC_OPTIONS:
-            # Note: some versions of tor (e.g. 0.2.4.23) require
-            # --list-torrc-options to be the first argument
             cmdline = [
                 tor,
                 "--list-torrc-options",
@@ -315,9 +313,7 @@ class LocalNodeBuilder(NodeBuilder):
         else:
             torrc_opts = _TORRC_OPTIONS[tor]
         # check if each option is supported before writing it
-        # TODO: what about unsupported values?
-        # e.g. tor 0.2.4.23 doesn't support TestingV3AuthInitialVoteDelay 2
-        # but later version do. I say throw this one to the user.
+        # Unsupported option values may need special handling.
         with open(fn_out, 'w') as f:
             # we need to do case-insensitive option comparison
             # even if this is a static whitelist,
@@ -728,8 +724,7 @@ DEFAULTS = {
     'tor-gencert': os.environ.get('CHUTNEY_TOR_GENCERT', None),
     'auth_cert_lifetime': 12,
     'ip': os.environ.get('CHUTNEY_LISTEN_ADDRESS', '127.0.0.1'),
-    # Pre-0.2.8 clients will fail to parse ipv6 auth lines,
-    # so we default to ipv6_addr None
+    # we default to ipv6_addr None to support IPv4-only systems
     'ipv6_addr': os.environ.get('CHUTNEY_LISTEN_ADDRESS_V6', None),
     'dirserver_flags': 'no-v2',
     'chutney_dir': get_absolute_chutney_path(),

+ 0 - 2
networks/basic

@@ -3,8 +3,6 @@ Authority = Node(tag="a", authority=1, relay=1, torrc="authority.tmpl")
 ExitRelay = Node(tag="r", relay=1, exit=1, torrc="relay.tmpl")
 Client = Node(tag="c", client=1, torrc="client.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(3) + ExitRelay.getN(5) + Client.getN(2)
 
 ConfigureNodes(NODES)

+ 0 - 2
networks/bridges

@@ -8,8 +8,6 @@ BridgeAuthority = Node(tag="ba", authority=1, bridgeauthority=1,
 Bridge = Node(tag="br", bridge=1, relay=1, torrc="bridge.tmpl")
 BridgeClient = Node(tag="bc", client=1, bridgeclient=1, torrc="bridgeclient.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(3) + BridgeAuthority.getN(1) + ExitRelay.getN(4) + \
     Bridge.getN(1) + Client.getN(1) + BridgeClient.getN(1)
 

+ 0 - 2
networks/bridges+hs

@@ -9,8 +9,6 @@ Bridge = Node(tag="br", bridge=1, relay=1, torrc="bridge.tmpl")
 BridgeClient = Node(tag="bc", client=1, bridgeclient=1, torrc="bridgeclient.tmpl")
 HS = Node(tag="h", hs=1, torrc="hs.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 NODES = Authority.getN(3) + BridgeAuthority.getN(1) + \
     ExitRelay.getN(4) + \

+ 0 - 2
networks/bridges+hs-v23

@@ -10,8 +10,6 @@ BridgeClient = Node(tag="bc", client=1, bridgeclient=1, torrc="bridgeclient.tmpl
 HSv2 = Node(tag="h", hs=1, torrc="hs.tmpl")
 HSv3 = Node(tag="h", hs=1, torrc="hs-.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 NODES = Authority.getN(3) + BridgeAuthority.getN(1) + \
     ExitRelay.getN(4) + \

+ 0 - 2
networks/bridges+ipv6

@@ -9,8 +9,6 @@ Bridge = Node(tag="br", bridge=1, relay=1, torrc="bridge.tmpl")
 BridgeIPv6 = Node(tag="br", bridge=1, relay=1, ipv6_addr="[::1]", torrc="bridge-v6.tmpl")
 BridgeClient = Node(tag="bc", client=1, bridgeclient=1, torrc="bridgeclient.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We put the IPv6 bridge first to ensure that clients try IPv6 before IPv4
 # Unfortunately, this does not prevent clients falling back to IPv4
 # bridges+ipv6-min only has IPv6 bridges

+ 0 - 2
networks/bridges+ipv6+hs

@@ -10,8 +10,6 @@ BridgeIPv6 = Node(tag="br", bridge=1, relay=1, ipv6_addr="[::1]", torrc="bridge-
 BridgeClient = Node(tag="bc", client=1, bridgeclient=1, torrc="bridgeclient.tmpl")
 HS = Node(tag="h", hs=1, torrc="hs.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 # We put the IPv6 bridge first to ensure that clients try IPv6 before IPv4
 # Unfortunately, this does not prevent clients falling back to IPv4

+ 0 - 2
networks/bridges+ipv6+hs-v23

@@ -11,8 +11,6 @@ BridgeClient = Node(tag="bc", client=1, bridgeclient=1, torrc="bridgeclient.tmpl
 HSv2 = Node(tag="h", hs=1, torrc="hs.tmpl")
 HSv3 = Node(tag="h", hs=1, torrc="hs-v3.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 # We put the IPv6 bridge first to ensure that clients try IPv6 before IPv4
 # Unfortunately, this does not prevent clients falling back to IPv4

+ 0 - 2
networks/hs

@@ -4,8 +4,6 @@ ExitRelay = Node(tag="r", relay=1, exit=1, torrc="relay.tmpl")
 Client = Node(tag="c", client=1, torrc="client.tmpl")
 HS = Node(tag="h", hs=1, torrc="hs.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 NODES = Authority.getN(3) + ExitRelay.getN(5) + \
         Client.getN(1) + HS.getN(1)

+ 0 - 2
networks/hs-exit-min

@@ -4,8 +4,6 @@ ExitRelay = Node(tag="r", relay=1, exit=1, torrc="relay.tmpl")
 Client = Node(tag="c", client=1, torrc="client.tmpl")
 HS = Node(tag="h", hs=1, torrc="hs.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 NODES = Authority.getN(2) + ExitRelay.getN(3) + \
         Client.getN(1) + HS.getN(1)

+ 0 - 2
networks/hs-v3

@@ -6,8 +6,6 @@ ExitRelay = Node(tag="r", relay=1, exit=1, torrc="relay.tmpl")
 Client = Node(tag="c", client=1, torrc="client.tmpl")
 HS = Node(tag="h", hs=1, torrc="hs-v3.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 # We need 5 authorities/relays/exits to ensure we can build HS connections
 NODES = Authority.getN(3) + ExitRelay.getN(5) + \
         Client.getN(1) + HS.getN(1)

+ 0 - 2
networks/middle

@@ -4,8 +4,6 @@ NonExitRelay = Node(tag="m", relay=1, torrc="relay-non-exit.tmpl")
 ExitRelay = Node(tag="r", relay=1, exit=1, torrc="relay.tmpl")
 Client = Node(tag="c", client=1, torrc="client.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(3) + \
       NonExitRelay.getN(2) + ExitRelay.getN(3) + \
       Client.getN(2)

+ 0 - 2
networks/mixed

@@ -9,8 +9,6 @@ OldRelay = Node(tag="rOLD", relay=1, exit=1, torrc="relay.tmpl",
 Client = Node(tag="c", client=1, torrc="client.tmpl")
 OldClient = Node(tag="cOLD", client=1, torrc="client.tmpl", tor=OLD_TOR)
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(2) + OldAuthority.getN(2) + \
         Relay.getN(2) + OldRelay.getN(2) + \
         Client.getN(2) + OldClient.getN(2)

+ 0 - 2
networks/mixed+hs-v2

@@ -11,8 +11,6 @@ OldClient = Node(tag="cOLD", client=1, torrc="client.tmpl", tor=OLD_TOR)
 HSv2 = Node(tag="h", hs=1, torrc="hs.tmpl")
 OldHSv2 = Node(tag="hOLD", hs=1, torrc="hs.tmpl", tor=OLD_TOR)
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(2) + OldAuthority.getN(2) + \
         Relay.getN(2) + OldRelay.getN(2) + \
         Client.getN(1) + OldClient.getN(1) + \

+ 0 - 2
networks/mixed+hs-v23

@@ -15,8 +15,6 @@ OldHSv2 = Node(tag="hOLD", hs=1, torrc="hs.tmpl", tor=OLD_TOR)
 # See 23498
 #HSv3 = Node(tag="h", hs=1, torrc="hs-v3.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(2) + OldAuthority.getN(2) + \
         Relay.getN(2) + OldRelay.getN(2) + \
         Client.getN(1) + OldClient.getN(1) + \

+ 0 - 2
networks/mixed+hs-v3

@@ -11,8 +11,6 @@ OldClient = Node(tag="cOLD", client=1, torrc="client.tmpl", tor=OLD_TOR)
 # Old tor versions don't have HSv3 support yet
 HSv3 = Node(tag="h", hs=1, torrc="hs-v3.tmpl")
 
-# We need 8 authorities/relays/exits to ensure at least 2 get the guard flag
-# in 0.2.6
 NODES = Authority.getN(2) + OldAuthority.getN(2) + \
         Relay.getN(2) + OldRelay.getN(2) + \
         Client.getN(1) + OldClient.getN(1) + \

+ 1 - 1
tools/ignore.warnings

@@ -24,7 +24,7 @@ Couldn't set up any working nameservers. Network not up yet
 Currently, sandboxing is only implemented on Linux
 # We ignore consensus failure warnings
 Error publishing .* consensus
-# Tor 23078, fixed in 0.3.0.11 and 0.3.1.6-rc
+# Tor 23078, fixed in 0.3.2 and later
 Established prop224 intro point on circuit
 Every hidden service on this tor instance is NON-ANONYMOUS
 # We ignore consensus failure warnings

+ 0 - 3
tools/test-network.sh

@@ -86,9 +86,6 @@ do
       shift
     ;;
     # Make this many simultaneous connections per client (1)
-    # Note: If you create 7 or more connections to a hidden service from
-    # a single Tor 0.2.7 client, you'll likely get a verification failure due
-    # to #15937. This is fixed in 0.2.8.
     --connections|--connection|--connection-count|--count)
       export CHUTNEY_CONNECTIONS="$2"
       shift

+ 0 - 11
torrc_templates/authority.i

@@ -19,14 +19,3 @@ TestingV3AuthInitialDistDelay 2
 V3AuthDistDelay 2
 # This is autoconfigured by chutney, so you probably don't want to use it
 #TestingV3AuthVotingStartOffset 0
-
-# Work around situations where the Exit, Guard and HSDir flags aren't being set
-# These flags are all set eventually, but it takes Guard up to ~30 minutes
-# We could be more precise here, but it's easiest just to vote everything
-# Clients are sensible enough to filter out Exits without any exit ports,
-# and Guards and HSDirs without ORPorts
-# If your tor doesn't recognise TestingDirAuthVoteExit/HSDir,
-# either update your chutney to a 2015 version,
-# or update your tor to a later version, most likely 0.2.6.2-final
-
-# See common.i in the Comprehensive/Rapid sections for the relevant options