1. 22 Dec, 2020 1 commit
  2. 17 Dec, 2020 1 commit
  3. 08 Dec, 2020 1 commit
  4. 07 Dec, 2020 1 commit
  5. 02 Dec, 2020 1 commit
    • Mike Perry's avatar
      Prop 324: Clarifications and improvements · 53e257ec
      Mike Perry authored
        - Clarify that complete algorithms are canonical
        - Break off backwards ecn idea into ideas directory.
        - Define RTT_min
        - cite prop 325
        - Count INTRODUCE1 towards SENDME, don't count SENDME.
        - note optimization for circwindow_inc variability
        - consider limiting the rate of change of circwindow_inc
        - Mention hs-ntor allows extra data fields
        - Mention if we calculate recieve window, it can become negative.
        - Track outstanding sent cells for better BDP estimates.
        - Use min of backoff multiplier vs BDP, not max.
        - We can safely set our initial congestion window much higher than TCP.
      53e257ec
  6. 17 Nov, 2020 1 commit
  7. 16 Nov, 2020 1 commit
  8. 09 Nov, 2020 2 commits
  9. 30 Oct, 2020 1 commit
  10. 28 Oct, 2020 3 commits
  11. 27 Oct, 2020 2 commits
  12. 19 Oct, 2020 1 commit
  13. 17 Oct, 2020 1 commit
  14. 16 Oct, 2020 1 commit
  15. 14 Oct, 2020 2 commits
  16. 13 Oct, 2020 2 commits
  17. 10 Oct, 2020 1 commit
  18. 09 Oct, 2020 1 commit
  19. 06 Oct, 2020 4 commits
  20. 28 Sep, 2020 7 commits
  21. 22 Sep, 2020 4 commits
  22. 18 Sep, 2020 1 commit
    • Nick Mathewson's avatar
      Better description for when a consensus must is "too early" · 42d0a841
      Nick Mathewson authored
      Since the authorities can produce a signed consensus as soon as
      `ValidAfter` minus `DistSeconds`, and since they serve a signed
      consensus as soon as it has enough signatures, it's possible that a
      client or relay that's starting late in the hour can get an "early"
      consensus.  Back in tor#25756, we fixed this issue in Tor, but we
      didn't document the behavior in the spec.
      42d0a841