- Dec 21, 2009
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
Specifically, there are two cases: a) are we willing to start a new circuit at a node not in your ExitNodes config option, and b) are we willing to make use of a circuit that's already established but has an unsuitable exit. Now we discard all your circuits when you set ExitNodes, so the only way you could end up with an exit circuit that ends at an unsuitable place is if we explicitly ran out of exit nodes, StrictNodes was 0, and we built this circuit to solve a stream that needs solving. Fixes bug in dc322931, which would ignore the just-built circuit because it has an unsuitable exit.
-
Roger Dingledine authored
If ExcludeNodes or ExcludeExitNodes changes on a config reload, mark and discard all our origin circuits.
-
Roger Dingledine authored
-
Roger Dingledine authored
Before it would prepend your requested entrynodes to your list of guard nodes, but feel free to use others after that. Now it chooses only from your EntryNodes if any of those are available, and only falls back to others if a) they're all down and b) StrictNodes is not set. Also, now we refresh your entry guards from EntryNode at each consensus fetch (rather than just at startup and then they slowly rot as the network changes). The goal here is to make users less likely to set StrictNodes, since it's doing closer to what they expect it should be doing.
-
Roger Dingledine authored
This is step one of handling ExcludedNodes better. This first step is just to make EntryNodes and ExitNodes do what they did before.
-
- Dec 19, 2009
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 18, 2009
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Dec 17, 2009
-
-
Nick Mathewson authored
We do this in too many places throughout the code; it's time to start clamping down. Also, refactor Karsten's patch to use strchr-then-strndup, rather than malloc-then-strlcpy-then-strchr-then-clear.
-
Karsten Loesing authored
-
Karsten Loesing authored
Fix statistics on client numbers by country as seen by bridges that were broken in 0.2.2.1-alpha. Also switch to reporting full 24-hour intervals instead of variable 12-to-48-hour intervals.
-
Karsten Loesing authored
-
Karsten Loesing authored
The HSAuthorityRecordStats option was used to track statistics of overall hidden service usage on the version 0 hidden service authorities. With the version 2 hidden service directories being deployed and version 0 descriptors being phased out, these statistics are not as useful anymore. Goodbye, you fine piece of software; my first major code contribution to Tor.
-
Nick Mathewson authored
Conflicts: ChangeLog
-
- Dec 15, 2009
-
-
Nick Mathewson authored
Conflicts: ChangeLog
-
Nick Mathewson authored
The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log".
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
The rule is now: take the value from the CircuitPriorityHalflife config option if it is set. If it zero, disable the cell_ewma algorithm. If it is set, use it to calculate the scaling factor. If it is not set, look for a CircPriorityHalflifeMsec parameter in the consensus networkstatus. If *that* is zero, then disable the cell_ewma algorithm; if it is set, use it to calculate the scaling factor. If it is not set at all, disable the algorithm.
-
Nick Mathewson authored
Conflicts: src/or/relay.c
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Dec 14, 2009
-
-
Sebastian Hahn authored
Apparently Panther doesn't like comparing ints and enums
-
Sebastian Hahn authored
In connection_dir_client_reached_eof, we make sure that we either return when we get an http status code of 503 or handle the problem and set it to 200. Later we check if the status code is 503. Remove that check.
-
Sebastian Hahn authored
When calculating the current tick, cap (tv_sec / EWMA_TICK_LEN) to an unsigned int.
-