- Jan 02, 2010
-
-
Roger Dingledine authored
-
- Dec 30, 2009
-
-
Roger Dingledine authored
somebody should add man page entries.
-
Roger Dingledine authored
-
- Dec 25, 2009
-
-
Sebastian Hahn authored
Mark them this way in add_trusted_dir_server
-
Sebastian Hahn authored
-
Sebastian Hahn authored
They weren't in sync with reality nor manpage, and only useful to a human who could simply have checked the manpage.
-
Sebastian Hahn authored
-
- Dec 23, 2009
-
-
Roger Dingledine authored
...to let us rate-limit client connections as they enter the network. It's controlled in the consensus so we can turn it on and off for experiments. It's starting out off. Based on proposal 163.
-
- Dec 21, 2009
-
-
Roger Dingledine authored
it's wrong, but that's our problem not its problem
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
Specifically, there are two cases: a) are we willing to start a new circuit at a node not in your ExitNodes config option, and b) are we willing to make use of a circuit that's already established but has an unsuitable exit. Now we discard all your circuits when you set ExitNodes, so the only way you could end up with an exit circuit that ends at an unsuitable place is if we explicitly ran out of exit nodes, StrictNodes was 0, and we built this circuit to solve a stream that needs solving. Fixes bug in dc322931, which would ignore the just-built circuit because it has an unsuitable exit.
-
Roger Dingledine authored
If ExcludeNodes or ExcludeExitNodes changes on a config reload, mark and discard all our origin circuits.
-
Roger Dingledine authored
-
Roger Dingledine authored
Before it would prepend your requested entrynodes to your list of guard nodes, but feel free to use others after that. Now it chooses only from your EntryNodes if any of those are available, and only falls back to others if a) they're all down and b) StrictNodes is not set. Also, now we refresh your entry guards from EntryNode at each consensus fetch (rather than just at startup and then they slowly rot as the network changes). The goal here is to make users less likely to set StrictNodes, since it's doing closer to what they expect it should be doing.
-
Roger Dingledine authored
This is step one of handling ExcludedNodes better. This first step is just to make EntryNodes and ExitNodes do what they did before.
-
- Dec 19, 2009
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 18, 2009
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Dec 17, 2009
-
-
Nick Mathewson authored
We do this in too many places throughout the code; it's time to start clamping down. Also, refactor Karsten's patch to use strchr-then-strndup, rather than malloc-then-strlcpy-then-strchr-then-clear.
-
Karsten Loesing authored
-
Karsten Loesing authored
Fix statistics on client numbers by country as seen by bridges that were broken in 0.2.2.1-alpha. Also switch to reporting full 24-hour intervals instead of variable 12-to-48-hour intervals.
-
Karsten Loesing authored
-
Karsten Loesing authored
The HSAuthorityRecordStats option was used to track statistics of overall hidden service usage on the version 0 hidden service authorities. With the version 2 hidden service directories being deployed and version 0 descriptors being phased out, these statistics are not as useful anymore. Goodbye, you fine piece of software; my first major code contribution to Tor.
-
Nick Mathewson authored
Conflicts: ChangeLog
-
- Dec 15, 2009
-
-
Nick Mathewson authored
Conflicts: ChangeLog
-
Nick Mathewson authored
The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log".
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-