- Feb 28, 2013
-
-
Nick Mathewson authored
Now the manpages no longer refer to tsocks or tsocks.conf, and we no longer have or ship a tor-tsocks.conf. The only remaining instances of "tsocks" in our repository are old ChangeLog and ReleaseNotes entries, and the torify script saying that it doesn't support tsocks. Fixes bug 8290.
-
- Feb 25, 2013
-
-
Roger Dingledine authored
-
- Feb 19, 2013
-
-
Nick Mathewson authored
Fixes bug 7876
-
- Feb 12, 2013
-
-
- Feb 05, 2013
-
-
Mike Perry authored
-
- Feb 01, 2013
-
-
Also, deprecate the torrc options for the scaling values. It's unlikely anyone but developers will ever tweak them, even if we provided a single ratio value.
-
- Jan 30, 2013
-
-
Nick Mathewson authored
Instead of hardcoding the minimum fraction of possible paths to 0.6, we take it from the user, and failing that from the consensus, and failing that we fall back to 0.6.
-
Nick Mathewson authored
-
- Jan 19, 2013
-
-
Mike Perry authored
-
- Jan 17, 2013
-
-
Nick Mathewson authored
This is ticket 7706, reported by "bugcatcher." The rationale here is that if somebody says 'ExcludeNodes {tv}', then they probably don't just want to block definitely Tuvaluan nodes: they also want to block nodes that have unknown country, since for all they know such nodes are also in Tuvalu. This behavior is controlled by a new GeoIPExcludeUnknown autobool option. With the default (auto) setting, we exclude ?? and A1 if any country is excluded. If the option is 1, we add ?? and A1 unconditionally; if the option is 0, we never add them. (Right now our geoip file doesn't actually seem to include A1: I'm including it here in case it comes back.) This feature only takes effect if you have a GeoIP file. Otherwise you'd be excluding every node.
-
- Jan 03, 2013
-
-
Nick Mathewson authored
The right way to set "MaxOnionsPending" was to adjust it until the processing delay was appropriate. So instead, let's measure how long it takes to process onionskins (sampling them once we have a big number), and then limit the queue based on its expected time to finish. This change is extra-necessary for ntor, since there is no longer a reasonable way to set MaxOnionsPending without knowing what mix of onionskins you'll get. This patch also reserves 1/3 of the onionskin spots for ntor handshakes, on the theory that TAP handshakes shouldn't be allowed to starve their speedier cousins. We can change this later if need be. Resolves 7291.
-
Nick Mathewson authored
-
- Dec 26, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 18, 2012
-
-
Nick Mathewson authored
Closes bug #7730.
-
- Dec 17, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
With an IPv6 virtual address map, we can basically hand out a new IPv6 address for _every_ address we connect to. That'll be cool, and will let us maybe get around prop205 issues. This uses some fancy logic to try to make the code paths in the ipv4 and the ipv6 case as close as possible, and moves to randomly generated addresses so we don't need to maintain those stupid counters that will collide if Tor restarts but apps don't. Also has some XXXX items to fix to make this useful. More design needed.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 10, 2012
-
-
Mike Perry authored
-
- Dec 07, 2012
-
-
Mike Perry authored
-
Nick Mathewson authored
This clears up the remaining issue stopping me from closing bug 6297.
-
- Dec 06, 2012
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This replaces the old FallbackConsensus notion, and should provide a way -- assuming we pick reasonable nodes! -- to give clients suggestions of placs to go to get their first consensus.
-
Nick Mathewson authored
-
- Nov 28, 2012
-
-
- Nov 15, 2012
-
-
Nick Mathewson authored
-
- Oct 24, 2012
-
-
Nick Mathewson authored
It seems as if our new build system broke gcov for me. I've tried to fix doc/HACKING to describe what I needed to do in order to make it work again.
-
- Oct 17, 2012
-
-
- Oct 06, 2012
-
-
Roger Dingledine authored
(for various values of K), to further reduce confusion about whether Tor counts in units of memory or fractions of units of memory. Fixes bug 7054.
-
- Sep 20, 2012
-
-
Linus Nordberg authored
Implements ticket 6786.
-
- Sep 19, 2012
-
-
Nick Mathewson authored
Also remove some trailing whitespace. Patch from maker; fixes bug 6024.
-
- Sep 14, 2012
-
-
Nick Mathewson authored
Fixes bug 6843; bugfix on 0.2.4.1-alpha.
-
Robert Ransom authored
-
- Sep 10, 2012
-
-
Roger Dingledine authored
addresses bug 6605.
-
- Sep 05, 2012
-
-
Roger Dingledine authored
The current cutoff is 30KB, but in reality a useful cutoff is probably more like 50KB or 100KB.
-
George Kadianakis authored
* Add changes/ files. * Edit the tor-fw-helper manpage. * Fix check-spaces. * Add prototype for get_list_of_ports_to_forward(). * Fix tor_parse_long() TCP port range. * Improve doc. of tor_check_port_forwarding(). * Check for overflows in tor_check_port_forwarding(). * Demote successful port forwarding to LOG_INFO. Conflicts: src/common/address.c src/or/circuitbuild.c
-