- Feb 25, 2022
- Feb 23, 2022
-
-
David Goulet authored
-
David Goulet authored
Fixes #40575 Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
Roger Dingledine authored
-
Roger Dingledine authored
we were missing the 0.4.6.10 changes in ReleaseNotes, and the 0.4.0.5 releasenotes mistakenly included some 0.4.0.x bugfixes.
-
Roger Dingledine authored
-
Mike Perry authored
-
Mike Perry authored
-
- Feb 22, 2022
-
-
Mike Perry authored
-
Mike Perry authored
-
Mike Perry authored
This ensures compatibility with old tor.
-
Mike Perry authored
-
Mike Perry authored
This allows us to cap the queue use during steady state. In shadow, this reduced instances of long circuit queues at relays.
-
Mike Perry authored
This improves performance and fairness.
-
Mike Perry authored
-
Mike Perry authored
-
Mike Perry authored
This proved better in Shadow sims than just a multiple of CWND.
-
Mike Perry authored
Changes in these will not affect in-progress transfers.
-
Mike Perry authored
This can only happen in Shadow, but it will cause issues there.
-
Mike Perry authored
In Shadow, we saw RTT jumps as high as 1000 naturally. So let's set this to 5000, to give us some breathing room.
-
Mike Perry authored
-
Mike Perry authored
Without this conversion, there is an implict 1000-recv_cells, which causes the mod to fail if it is not a factor of 1000.
-
Mike Perry authored
These parameters will vary depending on path length, especially for onions.
-
Mike Perry authored
Defaults determined from Shadow experimentation. More parameter functionality changes to follow.
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Republishing is necessary to ensure that clients connect using the correct sendme_inc upon any change. Additionally, introduction points must be re-chosen, so that cached descriptors with old values are not usable. We do not expect to change sendme_inc, unless cell size or TLS record size changes, so this should be rare. Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This puts the flow control version (unparsed) in the descriptor. The client doesn't use it yet. Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This simply adds the "flow-control" line, as detailed in prop324, to the descriptor. No decoding is done at this commit. Part of #40506
-
David Goulet authored
This is needed for client validation of server descriptor value, before launching a rend/intro.
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Move it to extension.trunnel instead so that extension ABI construction can be used in other parts of tor than just HS cells. Specifically, we'll use it in the ntorv3 data payload and make a congestion control parameter extension using that binary structure. Only rename. No code behavior changes. Signed-off-by: David Goulet <dgoulet@torproject.org>
-