- 26 Oct, 2021 13 commits
-
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 25 Oct, 2021 2 commits
-
-
Alexander Færøy authored
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 21 Oct, 2021 5 commits
-
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Closes #40493 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Alexander Færøy authored
-
Alexander Færøy authored
-
- 20 Oct, 2021 10 commits
-
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
This patch makes Tor announce the relay specific bridge status page URL when Tor is starting up before bootstrap occours. See: tor#30477
-
Alexander Færøy authored
-
Alexander Færøy authored
-
Alexander Færøy authored
This patch unbreaks the current build after tor!369 landed. See: https://bugs.torproject.org/tpo/core/tor/40371
-
Alexander Færøy authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
With this commit, we will only report a general overload state if we've seen more than X% of DNS timeout errors over Y seconds. Previous behavior was to report when a single timeout occured which is really too small of a threshold. The value X is a consensus parameters called "overload_dns_timeout_scale_percent" which is a scaled percentage (factor of 1000) so we can represent decimal points for X like 0.5% for instance. Its default is 1000 which ends up being 1%. The value Y is a consensus parameters called "overload_dns_timeout_period_secs" which is the time period for which will gather DNS errors and once over, we assess if that X% has been reached ultimately triggering a general overload signal. Closes #40491 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 19 Oct, 2021 10 commits
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
-
David Goulet authored
Now that we don't have version 2, it gives us: [warn] HiddenServiceVersion must be between 3 and 3, not 2. This commit changes it to: [warn] HiddenServiceVersion must be 3, not 2. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Closes #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Some tests were removed because they were testing something not usable anymore. Some tests remains to make sure that things are indeed disabled. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Now that we don't have version 2, it gives us: [warn] HiddenServiceVersion must be between 3 and 3, not 2. This commit changes it to: [warn] HiddenServiceVersion must be 3, not 2. Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Closes #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Part of #40476 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-