- May 19, 2016
-
-
Previosuly, during bootstrap, we would continue to download consensuses if we had a consensus, but didn't have the certificates to validate it.
-
- May 10, 2016
-
-
Roger Dingledine authored
-
- May 09, 2016
-
-
Roger Dingledine authored
suggested during code review by dgoulet
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
we should avoid launching a consensus fetch if we don't want one, but if we do end up with an extra one, we should let the other checks take care of it.
-
Roger Dingledine authored
We'll back off from the request in connection_ap_handshake_attach_circuit, or cancel it in connection_dir_close_consensus_fetches, and those are the only places we need to check.
-
Roger Dingledine authored
not once per second, and only do it when a consensus arrives
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- May 05, 2016
-
-
No behavioural change This makes the use of the node explicit in the function, rather than hiding the node lookup in fascist_firewall_allows_rs.
-
-
Variable rename only
-
Nick Mathewson authored
-
-
This makes sure clients will only select relays which support begindir over ORPort.
-
This improves client anonymity and avoids directory header tampering. The extra load on the authorities should be offset by the fallback directories feature. This also simplifies the fixes to #18809.
-
teor (Tim Wilson-Brown) authored
Delete an unnecessary check for non-preferred IP versions. Allows clients which can't reach any directories of their preferred IP address version to get directory documents. Patch on #17840 in 0.2.8.1-alpha.
-
- May 04, 2016
-
-
Nick Mathewson authored
-
After #17840 in 0.2.8.1-alpha, we incorrectly chose an IPv4 address for all DIRIND_ONEHOP directory connections, even if the routerstatus didn't have an IPv4 address. This likely affected bridge clients with IPv6 bridges. Resolves #18921.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Also, document the actual behavior and return values of tor_terminate_process. Fixes bug18686; bugfix on 0.2.3.9-alpha.
-
Nick Mathewson authored
-
The problem is that "q" is always set on the first iteration even if the question is not a supported question. This set of "q" is not necessary, and will be handled after exiting the loop if there if a supported q->type was found. [Changes file by nickm] lease enter the commit message for your changes. Lines starting
-
- May 03, 2016
-
-
* SHA-3/SHAKE use little endian for certain things, so byteswap as needed. * The code was written under the assumption that unaligned access to quadwords is allowed, which isn't true particularly on non-Intel.
-
- May 02, 2016
-
-
- Apr 27, 2016
-
-
Nick Mathewson authored
-
- Apr 26, 2016
-
-
-
As well as the existing reports of IPv6 address additions or removals, the script now warns when keys change but IPv4:ORPort or IPv6:IPv6ORPort remain the same. Existing checks for other whitelist detail changes have also been re-worded and upgraded to warnings. This makes it easier for changes to be identified so operators can be contacted to confirm whether the change is stable.
-
-
-
Also add misbehaving relays to updateFallbackDirs.py blacklist, but leave them commented out in case it's a transient issue, or it's been resolved by the download check fixes. (These relays hang stem's downloader. It's unlikely they'll ever help clients.)
-
- Apr 15, 2016
-
-
teor (Tim Wilson-Brown) authored
Use IP address, effective family, and contact info to discover and limit fallbacks to one per operator. Also analyse netblock, ports, IP version, and Exit flag, and print the results. Don't exclude any fallbacks from the list because of netblocks, ports, IP version, or Exit flag.
-
teor (Tim Wilson-Brown) authored
When creating the list of fallbacks for a release: * don't output fallback name and contact * sort fallbacks by fingerprint
-
teor (Tim Wilson-Brown) authored
But as advertised bandwidth is controlled by relays, use consensus weight and median weight to bandwidth ratio to approximate measured bandwidth. Includes minor comment changes and parameter reordering.
-
teor (Tim Wilson-Brown) authored
Previously, we would cut the list down to 100 fallbacks, then check if they could serve a consensus, and comment them out if they couldn't. This would leave us with fewer than 100 active fallbacks. Now, we stop when there are 100 active fallbacks. Also count fallbacks with identical contact info. Also fix minor logging issues.
-
teor (Tim Wilson-Brown) authored
Give each fallback a set weight of 10.0 for client selection. Fallbacks must have at least 3000 consensus weight. This is (nominally) 100 times the expected extra load of 20 kilobytes per second (50 GB per month). Fixes issue #17905.
-