aboutsummaryrefslogtreecommitdiff
path: root/src/or/circuitbuild.c
Commit message (Expand)AuthorAge
* When we need to open a new origin circuit, log why.•••svn:r17705 Nick Mathewson2008-12-19
* Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this p...•••svn:r17686 Nick Mathewson2008-12-18
* Rename or_is_obsolete and move it to or_connection_t where it belongs.•••svn:r17642 Nick Mathewson2008-12-17
* Don't extend circuits over noncanonical connections with mismatched addresses.•••Also, refactor the logic to check whether we will use a connection or launch a new one into a new function. svn:r17628 Nick Mathewson2008-12-15
* When the client is choosing entry guards, now it selects at most•••one guard from a given relay family. Otherwise we could end up with all of our entry points into the network run by the same operator. Suggested by Camilo Viecco. Fix on 0.1.1.11-alpha. Not a backport candidate, since I think this might break for users who only have a given /16 in their reachableaddresses, or something like that. svn:r17514 Roger Dingledine2008-12-08
* when building preemptive circuits, ignore streams that have a•••chosen exit node in mind already. otherwise we get tricked into trying to build a new circuit that will handle them. svn:r17184 Roger Dingledine2008-11-03
* fix the other half of r17091. now that best_support can be -1,•••we were complaining about no support for our one-hop streams, when in fact choose_good_exit_server_general() has no business caring about one-hop streams. patch from miner. svn:r17181 Roger Dingledine2008-11-01
* Patch from rovv: when we have no pending streams, choose exits with choose_go...•••svn:r17091 Nick Mathewson2008-10-14
* another coverity-found memory leak•••svn:r17062 Roger Dingledine2008-10-12
* minor memory leak found by coverity•••svn:r17061 Roger Dingledine2008-10-12
* Make sure ExcludeSingleHopRelays works for an exit.•••svn:r16984 Nick Mathewson2008-09-26
* Proposal 152 implementation from Josh Albrecht, with tweaks.•••svn:r16983 Nick Mathewson2008-09-26
* Add country-code support to configured node lists to implement the ever-popul...•••svn:r16966 Nick Mathewson2008-09-25
* Fix for bug 797 (by arma, with tweaks): always use create_fast for circuits w...•••svn:r16942 Nick Mathewson2008-09-23
* backport candidate:•••If not enough of our entry guards are available so we add a new one, we might use the new one even if it overlapped with the current circuit's exit relay (or its family). Anonymity bugfix pointed out by rovv. svn:r16698 Roger Dingledine2008-08-31
* Relays now reject risky extend cells: if the extend cell includes•••a digest of all zeroes, or asks to extend back to the relay that sent the extend cell, tear down the circuit. Ideas suggested by rovv. svn:r16605 Roger Dingledine2008-08-20
* r17641@31-33-44: nickm | 2008-08-05 16:07:53 -0400••• Initial conversion of uint32_t addr to tor_addr_t addr in connection_t and related types. Most of the Tor wire formats using these new types are in, but the code to generate and use it is not. This is a big patch. Let me know what it breaks for you. svn:r16435 Nick Mathewson2008-08-05
* Take out the TestVia config option, since it was a workaround for•••a bug that was fixed in Tor 0.1.1.21. svn:r16409 Roger Dingledine2008-08-05
* Make check-spaces happy.•••svn:r16406 Karsten Loesing2008-08-04
* Fix a false assertion when extending a circuit to a relay to which a connecti...•••svn:r16375 Karsten Loesing2008-08-03
* r17436@tombo: nickm | 2008-07-30 09:03:19 -0400••• Move n_addr, n_port, and n_conn_id_digest fields of circuit_t into a separately allocated extend_info_t. Saves 22 bytes per connected circuit_t on 32-bit platforms, and makes me more comfortable with using tor_addr_t in place of uint32_t n_addr. svn:r16257 Nick Mathewson2008-07-30
* r17338@aud-055: nickm | 2008-07-24 11:21:06 +0200••• Refactor the router_choose_random_node interface: any function with 10 parameters, most of which are boolean and one of which is unused, should get refactored like this. svn:r16167 Nick Mathewson2008-07-24
* r17322@aud-055: nickm | 2008-07-23 16:50:50 +0200••• Make circid_t and streamid_t get used instead of uint16_t; it is possible we will soon want to make circid_t change to uint32_t. svn:r16155 Nick Mathewson2008-07-23
* r17309@aud-055: nickm | 2008-07-23 16:05:43 +0200••• Patch from Christian Wilms: remove (HiddenService|Rend)(Exclude)?Nodes options. They never worked properly, and nobody seems to be using them. Resolves bug 754. svn:r16144 Nick Mathewson2008-07-23
* r17302@aud-055: nickm | 2008-07-23 14:55:28 +0200••• Never allow a circuit to be created with the same circid as a circuit that has been marked for close. May be a fix for bug 779. Needs testing. Backport candidate. svn:r16136 Nick Mathewson2008-07-23
* r17188@tombo: nickm | 2008-07-18 14:35:18 -0400••• Add new ExcludeExitNodes option. Also add a new routerset type to handle Exclude[Exit]Nodes. It is optimized for O(1) membership tests, so as to make choosing a random router run in O(N_routers) time instead of in O(N_routers*N_Excluded_Routers). svn:r16061 Nick Mathewson2008-07-18
* Stop trying to detect versions of Tor on the server-side older than 0.1.1.15-...•••svn:r15982 Nick Mathewson2008-07-16
* When relays do their initial bandwidth measurement, don't limit•••to just our our entry guards for the test circuits. Otherwise we tend to have multiple test circuits going through a single entry guard, which makes our bandwidth test less accurate. Fixes part of bug 654; patch contributed by Josh Albrecht. (Actually, modify Josh's patch to avoid doing that when you're a bridge relay, since it would leak more than we want to leak.) svn:r15850 Roger Dingledine2008-07-11
* If you're using bridges, generate "bootstrap problem" warnings•••as soon as you run out of working bridges, rather than waiting for ten failures -- which will never happen if you have less than ten bridges. svn:r15368 Roger Dingledine2008-06-20
* Big bridge bugfixes. Backport candidates.•••If you have more than one bridge but don't know their keys, you would only learn a request for the descriptor of the first one on your list. (Tor considered launching requests for the others, but found that it already had a connection on the way for $0000...0000 so it didn't open another.) If you have more than one bridge but don't know their keys, and the connection to one of the bridges failed, you would cancel all pending bridge connections. (After all, they all have the same digest.) svn:r15366 Roger Dingledine2008-06-20
* minor fixes and notes•••svn:r15111 Roger Dingledine2008-06-10
* include tags in the bootstrap status events. also document the•••bootstrapping process and how the phases break down. svn:r15020 Roger Dingledine2008-06-08
* infrastructure for the 'bootstrap status event' feature, so we can•••tell the controller how we're doing at bootstrapping, and it can tell the user. svn:r15008 Roger Dingledine2008-06-07
* make some log entries more accurate•••svn:r14998 Roger Dingledine2008-06-06
* Also add create/create fast/extends to the dir-usage stats.•••svn:r14900 Peter Palfrader2008-06-02
* I bet I screwed up while merging in the changes from the feature branch into ...•••svn:r14452 Peter Palfrader2008-04-24
* Merge conditional consensus downloading•••svn:r14451 Peter Palfrader2008-04-24
* and the client part of the consensus-by-authority-fpr proposal (ifdef'ed out)•••svn:r14446 Peter Palfrader2008-04-24
* r15277@tombo: nickm | 2008-04-22 13:14:18 -0400••• Note a place to refactor. svn:r14412 Nick Mathewson2008-04-22
* r18873@catbus: nickm | 2008-03-17 00:06:31 -0400••• oops. guard status logging change had a bug. it is non-obvious how to make the code perfect atm; just make it work. svn:r14070 Nick Mathewson2008-03-17
* r18872@catbus: nickm | 2008-03-16 23:56:48 -0400••• Only dump all guard node status to the log when the guard node status actually changes. Downgrade the 4 most common remaining INFO log messages to DEBUG. svn:r14069 Nick Mathewson2008-03-17
* r18195@catbus: nickm | 2008-02-19 14:11:15 -0500••• TOR_PERF has not not been a sane thing for ages. Remove it. svn:r13579 Nick Mathewson2008-02-19
* Start choosing which bridge to use proportional to its advertised•••bandwidth, rather than uniformly at random. This should speed up Tor for bridge users. Also do this for people who set StrictEntryNodes. svn:r13486 Roger Dingledine2008-02-12
* note a simplification for the future•••svn:r13466 Roger Dingledine2008-02-11
* r14102@tombo: nickm | 2008-02-10 13:30:04 -0500••• Remove some deadcode. svn:r13459 Nick Mathewson2008-02-10
* doxygen and other cleanups•••svn:r13440 Roger Dingledine2008-02-09
* r14063@tombo: nickm | 2008-02-08 15:48:32 -0500••• Add a bunch more code documentation; change the interface of fetch_var_cell_from_buf() so it takes the current link protocol into account and can't get confused by weird command bytes on v1 connections. svn:r13430 Nick Mathewson2008-02-08
* Update some copyright notices: it is now 2008.•••svn:r13412 Nick Mathewson2008-02-07
* r17930@catbus: nickm | 2008-02-05 18:20:40 -0500••• Initial attempts to track down bug 600, and refactor possibly offending code. 1) complain early if circuit state is set to OPEN when an onionskin is pending. 2) refactor onionskin field into one only used when n_conn is pending, and a separate onionskin field waiting for attention by a cpuworker. This might even fix the bug. More likely, it will make it fail with a more useful core. svn:r13394 Nick Mathewson2008-02-05
* If we're a relay, avoid picking ourselves as an introduction point,•••a rendezvous point, or as the final hop for internal circuits. Bug reported by taranis and lodger. Bugfix on 0.1.2.x. svn:r13372 Roger Dingledine2008-02-04