Trac issueshttps://gitlab.torproject.org/legacy/trac/-/issues2012-10-05T20:12:59Zhttps://gitlab.torproject.org/legacy/trac/-/issues/6968Bridget's data-dir option doesn't handle relative paths2012-10-05T20:12:59ZIsis LovecruftBridget's data-dir option doesn't handle relative pathsIf you do:
$ ./ooniprobe.py bridget -d assets/tor-data-dir -b assets/bridge.list
The generated torrc object has:
[...]
DataDirectory assets/tor-data-dirIf you do:
$ ./ooniprobe.py bridget -d assets/tor-data-dir -b assets/bridge.list
The generated torrc object has:
[...]
DataDirectory assets/tor-data-dirDeliverable-Nov2011Isis LovecruftIsis Lovecrufthttps://gitlab.torproject.org/legacy/trac/-/issues/6867Bridge Testing: ICMP82012-11-09T15:02:59ZIsis LovecruftBridge Testing: ICMP8The bridge scanner will need to have a basic module which handles the sending and receiving ICMP8 packets.The bridge scanner will need to have a basic module which handles the sending and receiving ICMP8 packets.Deliverable-Nov2011Isis LovecruftIsis Lovecrufthttps://gitlab.torproject.org/legacy/trac/-/issues/4200Write a patch that tracks (bridge) server descriptor downloads (total request...2020-06-13T14:13:41ZSebastian HahnWrite a patch that tracks (bridge) server descriptor downloads (total requests per day, unique requests)as on https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorF/November2011 .as on https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorF/November2011 .Deliverable-Nov2011https://gitlab.torproject.org/legacy/trac/-/issues/4125Implement proposal 176 (renegotiation-free handshake)2020-06-13T14:13:30ZNick MathewsonImplement proposal 176 (renegotiation-free handshake)To avoid distinguishability, and to make our protocol easier to implement longterm, we've got proposal 176 pending, which moves our link protocol to v3 and lets us handshake without renegotiation (and indeed without any weird-looking cer...To avoid distinguishability, and to make our protocol easier to implement longterm, we've got proposal 176 pending, which moves our link protocol to v3 and lets us handshake without renegotiation (and indeed without any weird-looking certs at all).
I have an implementation in a branch "prop176-hacking" in my public repository. I still need to clean it up and test it more before it's ready for review, though. When I'm going to stop rebasing it, I will change its name to prop176 or something.
Then again, why not have a look now?Deliverable-Nov2011Nick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/1976Implement PID control feedback for bw auths2020-06-13T16:18:20ZMike PerryImplement PID control feedback for bw authsWe should be able to get better feedback measurements from bw authorites if we make them smarter about tracking when they last measured a relay. They should only apply their ALPHA feedback loop if they have a new measurement in this roun...We should be able to get better feedback measurements from bw authorites if we make them smarter about tracking when they last measured a relay. They should only apply their ALPHA feedback loop if they have a new measurement in this round of voting.
This should fix the feedback problems we saw when we turned this feature on before.Deliverable-Nov2011Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/1778Regroup bw auth pairs and add a 5th one2020-06-13T16:18:18ZLinus Nordberglinus@torproject.orgRegroup bw auth pairs and add a 5th oneThe connections between bw auths and dir auths look something like this atm:
arma -> arma
ln5 -> mike
mike -> ioerror (?)
phobos -> ?
This should be rewired. Please update the list above, those of you who know.The connections between bw auths and dir auths look something like this atm:
arma -> arma
ln5 -> mike
mike -> ioerror (?)
phobos -> ?
This should be rewired. Please update the list above, those of you who know.Deliverable-Nov2011Mike PerryMike Perry