- 07 Apr, 2022 4 commits
-
-
- 04 Apr, 2022 1 commit
-
-
David Goulet authored
-
- 31 Mar, 2022 1 commit
-
-
Roger Dingledine authored
It came as a surprise that Serge, the bridge authority, omits the Running flag for all bridges in its first 30 minutes after a restart: https://bugs.torproject.org/tpo/anti-censorship/rdsys/102 The fix we're doing for now is to accept it as correct behavior in Tor, and change all the supporting tools to be able to handle bridge networkstatus docs that have no Running bridges. I'm documenting it here inside Tor too so the next person might not be so surprised.
-
- 28 Mar, 2022 4 commits
-
-
Alex Xu authored
cat will always print "cat: test_network_log: Is a directory". change it to head -n -0, which is arguably not the perfect format but is at least somewhat useful.
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
- 27 Mar, 2022 1 commit
-
-
Nick Mathewson authored
Apparently glibc-2.34 uses clone3, when previously it just used clone. Closes ticket #40590.
-
- 25 Mar, 2022 5 commits
-
-
- 24 Mar, 2022 1 commit
-
-
Nick Mathewson authored
-
- 16 Mar, 2022 9 commits
-
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
We had 3 callsites setting up the circuit congestion control and so this commit consolidates all 3 calls into 1 function. Related to #40586 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Once the cpath is finalized, e2e encryption setup, transfer the ccontrol from the rendezvous circuit to the cpath. This allows the congestion control subsystem to properly function for both upload and download side of onion services. Closes #40586 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Fixes #40587 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
-
- 15 Mar, 2022 9 commits
-
-
David Goulet authored
Related #40312 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This applies only for relays. Previous commit adds two new consensus parameters that dictate how libevent is configured with DNS resolution. And so, with a new consensus, we now look at those values in case they ever change. Without this, Exit relay would have to HUP or restart to apply any new Exit DNS consensus parameters. Related to #40312 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Introduces two new consensus parameter: exit_dns_timeout: Number of seconds before libevent should consider the DNS request a timeout. exit_dns_num_attempts: Number of attempts that libeven should retry a previously failing query before calling it a timeout. Closes #40312 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Closes #40520 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Part of #40560 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This code was heavily reused from the previous DNS timeout work done in ticket #40491 that was removed afterall from our code. Closes #40560 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Fixes #40577 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 14 Mar, 2022 4 commits
-
-
David Goulet authored
-
-
-
-
- 11 Mar, 2022 1 commit
-
-
David Goulet authored
-