- Feb 26, 2022
-
-
Peter Palfrader authored
* debian-ci: Try to handle new upstream signing scheme in gitlab-ci
-
Peter Palfrader authored
-
Peter Palfrader authored
* debian-merge: New upstream version: 0.4.7.4-alpha version: Bump version to 0.4.7.4-alpha release: ChangeLog and ReleaseNotes for 0.4.7.4-alpha fallbackdir: Update list generated on February 25, 2022 Update geoip files to match ipfire location db, 2022/02/25. cc: Fix memleak when building extension response and fix those typos in the releasenotes too fix typos, remove wrong stanzas, update 0.4.6.10 fix a typo in a comment Reject intro2 cells that request unadvertized congestion control. Properly initialize the cc_enabled field in hs intro data. Add test for sendme_inc validation. Add test for sendme_cell_is_next with sendme_inc of 31 Add test for circuit_sendme_cell_is_next() when sendme_inc is 100. Add changes file Add a delta parameter to Vegas. Exit slow start at the gamma threshold Increment by at least 2 sendme_incs in slow start Only apply more frequent cwnd updates after slow start. Make N_EWMA a percentage of CWND update rate, capped by a max value. Relocate two parameters from circuit scope to global scope. Guard against 0 time delta in BDP calc. Increase RTT ratio used to detect monotime jumps/stalls. Fix NULL pointer deref in logs Properly compute the number or recv cells from deliver_window Use path type hint for Vegas queue parameters. Set new defaults for congestion control parameters. cc: Change edge_get_ccontrol() to look at both cpath and on_circuit hs: Fix tests for congestion control hs: Setup congestion control on service rends using intro data hs: Decode and cache the INTRODUCE cell congestion control extension hs: Build INTRODUCE extension in the encrypted section hs: Setup congestion control on client rends hs: Republish onion descriptor on sendme_inc change hs: Decode flow-control line hs: Encode flow control value in the descriptor cc: Export sendme_inc validation into public function cc: Use trunnel extension for ntorv3 circ parameters trunnel: Make hs/cell_common.trunnel generic protover: Add function to get the value of a single type Add test for congestion control negotiation logic. Add test for TAP vs ntor2+ntor3 onion queue ordering Add hidden torrc option to always try CC negotiation. Handle other places that use onion handshake type values Extend info argument updates for non-ntorv3 cases Congestion control usage of negotiated params Protover flag handling for congestion control negotiation Hook up client usage of congestion control negotiation Implement congestion control parameter negotiation Add circuit param payload definitions to trunnel Convert TODO into TODO-324 for better visibility. Add stub argument for constructing congestion_control_t Negotiated circuit parameters must pass from worker. Use protover to signal support for ntor3 + congestion control. Implement core of ntor3 negotiation. Add an exported struct to onion handshakes for circuits params Add a size argument for the buffer on onion handshake functions dirauth: Reject EOL 0.3.5.x relays dns: Do not trigger overload general on DNS timeout kist: Don't try to flush empty outbuf nss: Don't write empty payload on the wire Add a changes file for exit notice redesign (40529) makefile: New README.md file name readme: Update and modernize with markdown Use more stable Web Archive links Remove unmaintained versions from CI and scripts changelog: Forward port 0.4.5 and 0.4.6 ChangeLogs version: Bump version to 0.4.6.10-dev version: Bump version to 0.4.5.12-dev version: Bump version to 0.4.6.10 version: Bump version to 0.4.5.12 fallbackdir: Update list generated on February 04, 2022 Update geoip files to match ipfire location db, 2022/02/04. Update geoip files to match ipfire location db, 2021/12/15. fallbackdir: Update list generated on December 15, 2021 Update unstable links to use Web Archive changes: Remove uneeded file due to empty merge forward hs: Double quote the metrics label value Redesign tor-exit-notice doc: More clarification of the release process steps Try to clarify maint vs release issues on ReleasingTor.md version: Bump version to 0.3.5.18 fallbackdir: Update list generated on January 24, 2022 geoip: Update to match ipfire location db, 2022/01/24. conn: add ClientHello Padding TLS extension Use an alternative solution to the warning in trace_probes_cc.c Resolve typedef conflict from congestion_control_t relay: Fix memory leak on BUG() code path test: Remove HSv2 protover specific test Update new relay blogpost URL main: Update a dead URL in a log notice relay: Don't advertise HSv2 protocol version Improve formatting of scripts/ci/ci-driver.sh Add missing "Tor Project, Inc." to man files configure: Remove typo created by CI patch configure: Remove typo created by CI patch doc: One more poings in ReleasingTor.md changelog: Forward port ChangeLogs and ReleaseNotes doc: Update ReleasingTor.md with missing steps version: Bump version to 0.4.6.9-dev version: Bump version to 0.4.7.3-alpha-dev changelog: Fix ReleaseNotes leftover from CI doc: Improve a bit the ReleasingTor.md fix syntax errors listed by cppcheck Fix compiler warnings from ubuntu/jammy fix an already-existing bug in the unit tests don't cache connect failures from our own circuits
-
Peter Palfrader authored
-
Peter Palfrader authored
Tor 0.4.7.4-alpha # gpg: Signature made Fri Feb 25 16:52:17 2022 CET # gpg: using RSA key B74417EDDF22AC9F9E90F49142E86A2A11F48D36 # gpg: please do a --check-trustdb # gpg: Good signature from "David Goulet <dgoulet@ev0ke.net>" [full] # gpg: aka "David Goulet <dgoulet@riseup.net>" [full] # gpg: aka "David Goulet <dgoulet@torproject.org>" [full] * tag 'tor-0.4.7.4-alpha': version: Bump version to 0.4.7.4-alpha release: ChangeLog and ReleaseNotes for 0.4.7.4-alpha fallbackdir: Update list generated on February 25, 2022 Update geoip files to match ipfire location db, 2022/02/25. cc: Fix memleak when building extension response and fix those typos in the releasenotes too fix typos, remove wrong stanzas, update 0.4.6.10 fix a typo in a comment Reject intro2 cells that request unadvertized congestion control. Properly initialize the cc_enabled field in hs intro data. Add test for sendme_inc validation. Add test for sendme_cell_is_next with sendme_inc of 31 Add test for circuit_sendme_cell_is_next() when sendme_inc is 100. Add changes file Add a delta parameter to Vegas. Exit slow start at the gamma threshold Increment by at least 2 sendme_incs in slow start Only apply more frequent cwnd updates after slow start. Make N_EWMA a percentage of CWND update rate, capped by a max value. Relocate two parameters from circuit scope to global scope. Guard against 0 time delta in BDP calc. Increase RTT ratio used to detect monotime jumps/stalls. Fix NULL pointer deref in logs Properly compute the number or recv cells from deliver_window Use path type hint for Vegas queue parameters. Set new defaults for congestion control parameters. cc: Change edge_get_ccontrol() to look at both cpath and on_circuit hs: Fix tests for congestion control hs: Setup congestion control on service rends using intro data hs: Decode and cache the INTRODUCE cell congestion control extension hs: Build INTRODUCE extension in the encrypted section hs: Setup congestion control on client rends hs: Republish onion descriptor on sendme_inc change hs: Decode flow-control line hs: Encode flow control value in the descriptor cc: Export sendme_inc validation into public function cc: Use trunnel extension for ntorv3 circ parameters trunnel: Make hs/cell_common.trunnel generic protover: Add function to get the value of a single type Add test for congestion control negotiation logic. Add test for TAP vs ntor2+ntor3 onion queue ordering Add hidden torrc option to always try CC negotiation. Handle other places that use onion handshake type values Extend info argument updates for non-ntorv3 cases Congestion control usage of negotiated params Protover flag handling for congestion control negotiation Hook up client usage of congestion control negotiation Implement congestion control parameter negotiation Add circuit param payload definitions to trunnel Convert TODO into TODO-324 for better visibility. Add stub argument for constructing congestion_control_t Negotiated circuit parameters must pass from worker. Use protover to signal support for ntor3 + congestion control. Implement core of ntor3 negotiation. Add an exported struct to onion handshakes for circuits params Add a size argument for the buffer on onion handshake functions dirauth: Reject EOL 0.3.5.x relays dns: Do not trigger overload general on DNS timeout kist: Don't try to flush empty outbuf nss: Don't write empty payload on the wire Add a changes file for exit notice redesign (40529) makefile: New README.md file name readme: Update and modernize with markdown Use more stable Web Archive links Remove unmaintained versions from CI and scripts changelog: Forward port 0.4.5 and 0.4.6 ChangeLogs version: Bump version to 0.4.6.10-dev version: Bump version to 0.4.5.12-dev version: Bump version to 0.4.6.10 version: Bump version to 0.4.5.12 fallbackdir: Update list generated on February 04, 2022 Update geoip files to match ipfire location db, 2022/02/04. Update geoip files to match ipfire location db, 2021/12/15. fallbackdir: Update list generated on December 15, 2021 Update unstable links to use Web Archive changes: Remove uneeded file due to empty merge forward hs: Double quote the metrics label value Redesign tor-exit-notice doc: More clarification of the release process steps Try to clarify maint vs release issues on ReleasingTor.md version: Bump version to 0.3.5.18 fallbackdir: Update list generated on January 24, 2022 geoip: Update to match ipfire location db, 2022/01/24. conn: add ClientHello Padding TLS extension Use an alternative solution to the warning in trace_probes_cc.c Resolve typedef conflict from congestion_control_t relay: Fix memory leak on BUG() code path test: Remove HSv2 protover specific test Update new relay blogpost URL main: Update a dead URL in a log notice relay: Don't advertise HSv2 protocol version Improve formatting of scripts/ci/ci-driver.sh Add missing "Tor Project, Inc." to man files configure: Remove typo created by CI patch configure: Remove typo created by CI patch doc: One more poings in ReleasingTor.md changelog: Forward port ChangeLogs and ReleaseNotes doc: Update ReleasingTor.md with missing steps version: Bump version to 0.4.6.9-dev version: Bump version to 0.4.7.3-alpha-dev changelog: Fix ReleaseNotes leftover from CI doc: Improve a bit the ReleasingTor.md fix syntax errors listed by cppcheck Fix compiler warnings from ubuntu/jammy fix an already-existing bug in the unit tests don't cache connect failures from our own circuits
-
Peter Palfrader authored
-
- Feb 25, 2022
- Feb 23, 2022
-
-
David Goulet authored
-
David Goulet authored
Fixes #40575 Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
Roger Dingledine authored
-
Roger Dingledine authored
we were missing the 0.4.6.10 changes in ReleaseNotes, and the 0.4.0.5 releasenotes mistakenly included some 0.4.0.x bugfixes.
-
Roger Dingledine authored
-
Mike Perry authored
-
Mike Perry authored
-
- Feb 22, 2022
-
-
Mike Perry authored
-
Mike Perry authored
-
Mike Perry authored
This ensures compatibility with old tor.
-
Mike Perry authored
-
Mike Perry authored
This allows us to cap the queue use during steady state. In shadow, this reduced instances of long circuit queues at relays.
-
Mike Perry authored
This improves performance and fairness.
-
Mike Perry authored
-
Mike Perry authored
-
Mike Perry authored
This proved better in Shadow sims than just a multiple of CWND.
-
Mike Perry authored
Changes in these will not affect in-progress transfers.
-
Mike Perry authored
This can only happen in Shadow, but it will cause issues there.
-
Mike Perry authored
In Shadow, we saw RTT jumps as high as 1000 naturally. So let's set this to 5000, to give us some breathing room.
-
Mike Perry authored
-
Mike Perry authored
Without this conversion, there is an implict 1000-recv_cells, which causes the mod to fail if it is not a factor of 1000.
-
Mike Perry authored
These parameters will vary depending on path length, especially for onions.
-
Mike Perry authored
Defaults determined from Shadow experimentation. More parameter functionality changes to follow.
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by: David Goulet <dgoulet@torproject.org>
-