1. 03 Jun, 2019 1 commit
  2. 01 Jun, 2019 1 commit
  3. 30 May, 2019 6 commits
  4. 29 May, 2019 11 commits
  5. 28 May, 2019 2 commits
  6. 27 May, 2019 4 commits
    • George Kadianakis's avatar
      Merge branch 'tor-github/pr/1042' · 0a86f14a
      George Kadianakis authored
    • George Kadianakis's avatar
      Merge branch 'tor-github/pr/1043' · 130eb227
      George Kadianakis authored
    • Nick Mathewson's avatar
    • Nick Mathewson's avatar
      Make sure that we send at least some random data in RELAY_DATA cells · 0bc12414
      Nick Mathewson authored
      Proposal 289 prevents SENDME-flooding by requiring the other side to
      authenticate the data it has received.  But this data won't actually
      be random if they are downloading a known resource.  "No problem",
      we said, "let's fell the empty parts of our cells with some
      randomness!" and we did that in #26871.
      Unfortunately, if the relay data payloads are all completely full,
      there won't be any empty parts for us to randomize.
      Therefore, we now pick random "randomness windows" between
      CIRCWINDOW_INCREMENT/2 and CIRCWINDOW_INCREMENT. We remember whether we have
      sent a cell containing at least 16 bytes of randomness in that window.  If we
      haven't, then when the window is exhausted, we send one.  (This window approach
      is designed to lower the number of rng checks we have to do.  The number 16 is
      pulled out of a hat to change the attacker's guessing difficulty to
      Implements 28646.
  7. 26 May, 2019 1 commit
  8. 24 May, 2019 1 commit
  9. 23 May, 2019 10 commits
  10. 22 May, 2019 3 commits