Skip to content
Snippets Groups Projects
  1. Nov 28, 2012
  2. Sep 20, 2012
  3. Sep 19, 2012
  4. Sep 14, 2012
  5. Sep 10, 2012
  6. Sep 05, 2012
  7. Sep 04, 2012
    • Linus Nordberg's avatar
      Clients connect to public relays over IPv6. · e04e1a2e
      Linus Nordberg authored and Nick Mathewson's avatar Nick Mathewson committed
      Add ClientUseIPv6 and ClientPreferIPv6ORPort configuration options.
      
      Use "preferred OR port" for all entry nodes, not only for bridges.
      
      Mark bridges with "prefer IPv6 OR port" if an IPv6 address is
      configured in Bridge line and ClientPreferIPv6ORPort is set.
      
      Mark relays with "prefer IPv6 OR port" if an IPv6 address is found in
      descriptor and ClientPreferIPv6ORPort is set.
      
      Filter "preferred OR port" through the ClientUseIPv6 config option. We
      might want to move this test to where actual connection is being set
      up once we have a fall back mechanism in place.
      
      Have only non-servers pick an IPv6 address for the first hop: We
      don't want relays to connect over IPv6 yet. (IPv6 has never been used
      for second or third hops.)
      
      Implements ticket 5535.
      e04e1a2e
    • Nick Mathewson's avatar
      Rename configure.in to configure.ac · 485b4b7e
      Nick Mathewson authored
      This is the preferred filename to use with Autoconf 2.50 and later.
      485b4b7e
  8. Aug 31, 2012
  9. Aug 27, 2012
  10. Aug 23, 2012
  11. Aug 09, 2012
  12. Aug 02, 2012
  13. Jul 31, 2012
  14. Jul 20, 2012
  15. Jul 19, 2012
  16. Jul 16, 2012
  17. Jun 18, 2012
  18. Jun 15, 2012
  19. Jun 14, 2012
    • Mike Perry's avatar
      Defend against entry node path bias attacks · 8d596900
      Mike Perry authored
      The defense counts the circuit failure rate for each guard for the past N
      circuits. Failure is defined as the ability to complete a first hop, but not
      finish completing the circuit all the way to the exit.
      
      If the failure rate exceeds a certain amount, a notice is emitted.
      
      If it exceeds a greater amount, a warn is emitted and the guard is disabled.
      
      These values are governed by consensus parameters which we intend to tune as
      we perform experiments and statistical simulations.
      8d596900
    • Nick Mathewson's avatar
      75706527
  20. Jun 11, 2012
    • Nick Mathewson's avatar
      List defaults consistently in manpage · 2d127eac
      Nick Mathewson authored
      Nearly everywhere, we end options with "(Default: foo)".  But in a
      few places, we inserted an extra period after or before the close
      parenthesis, and in a few other places we said "(Defaults to foo)".
      Let's not do that.
      2d127eac
  21. Jun 07, 2012
  22. Jun 06, 2012
    • Nick Mathewson's avatar
      Change the default for DynamicDHGroups to 0 · 8a341cc4
      Nick Mathewson authored
      This feature can make Tor relays less identifiable by their use of the
      mod_ssl DH group, but at the cost of some usability (#4721) and bridge
      tracing (#6087) regressions.
      
      We should try to turn this on by default again if we find that the
      mod_ssl group is uncommon and/or we move to a different DH group size
      (see #6088).  Before we can do so, we need a fix for bugs #6087 and
      
      Resolves ticket #5598 for now.
      8a341cc4
  23. Jun 04, 2012
Loading