- 16 Dec, 2021 15 commits
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
David Goulet authored
-
-
-
-
David Goulet authored
-
-
- 15 Dec, 2021 4 commits
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-
- 14 Dec, 2021 4 commits
-
-
skaluzka authored
Signed-off-by:
skaluzka <skaluzka@protonmail.com>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
- 13 Dec, 2021 4 commits
-
-
David Goulet authored
Change it from "timeout" to "tor_timeout" in order to indicate that the DNS timeout is one from tor's DNS threshold and not the DNS server itself. Fixes #40527 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Tor has configure libevent to attempt up to 3 times a DNS query for a maximum of 5 seconds each. Once that 5 seconds has elapsed, it consider the query "Timed Out" but tor only gets a timeout if all 3 attempts have failed. For example, using Unbound, it has a much higher threshold of timeout. It is well defined in https://www.nlnetlabs.nl/documentation/unbound/info-timeout/ and has some complexity to it. But the gist is that if it times out, it will be much more than 5 seconds. And so the Tor DNS timeouts are more of a "UX issue" rather than a "network issue". For this reason, we are removing this metric from the overload general signal. See tpo/network-health/team#139 for more information. Fixes #40527 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
- 06 Dec, 2021 1 commit
-
-
Nick Mathewson authored
This avoids performing and then freeing a lot of small mallocs() if the hash line has too many elements. Fixes one case of bug 40472; resolves OSS-Fuzz 38363. Bugfix on 0.3.1.1-alpha when the consdiff parsing code was introduced.
-
- 23 Nov, 2021 2 commits
-
-
Nick Mathewson authored
-
Cecylia Bocovich authored
-
- 19 Nov, 2021 1 commit
-
-
Cecylia Bocovich authored
Some PT applications support more than one transport. For example, obfs4proxy supports obfs4, obfs3, and meek. If one or more transports specified in the torrc file are supported, we shouldn't kill the managed proxy on a {C,S}METHOD-ERROR. Instead, we should log a warning. We were already logging warnings on method errors. This change just makes sure that the managed proxy isn't killed, and then if no transports are configured for the managed proxy, bumps the log level up from a notice to a warning. Closes #7362
-
- 15 Nov, 2021 1 commit
-
-
Nick Mathewson authored
As a side effect, this fixes a "Bug" warning. Closes #40515. Bugfix on 0.2.4.10-alpha.
-
- 08 Nov, 2021 8 commits
-
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
-