| Commit message (Expand) | Author | Age |
* | r18195@catbus: nickm | 2008-02-19 14:11:15 -0500••• TOR_PERF has not not been a sane thing for ages. Remove it.
svn:r13579
| Nick Mathewson | 2008-02-19 |
* | Start choosing which bridge to use proportional to its advertised•••bandwidth, rather than uniformly at random. This should speed up Tor
for bridge users. Also do this for people who set StrictEntryNodes.
svn:r13486
| Roger Dingledine | 2008-02-12 |
* | note a simplification for the future•••svn:r13466
| Roger Dingledine | 2008-02-11 |
* | r14102@tombo: nickm | 2008-02-10 13:30:04 -0500••• Remove some deadcode.
svn:r13459
| Nick Mathewson | 2008-02-10 |
* | doxygen and other cleanups•••svn:r13440
| Roger Dingledine | 2008-02-09 |
* | r14063@tombo: nickm | 2008-02-08 15:48:32 -0500••• Add a bunch more code documentation; change the interface of fetch_var_cell_from_buf() so it takes the current link protocol into account and can't get confused by weird command bytes on v1 connections.
svn:r13430
| Nick Mathewson | 2008-02-08 |
* | Update some copyright notices: it is now 2008.•••svn:r13412
| Nick Mathewson | 2008-02-07 |
* | r17930@catbus: nickm | 2008-02-05 18:20:40 -0500••• Initial attempts to track down bug 600, and refactor possibly offending code. 1) complain early if circuit state is set to OPEN when an onionskin is pending. 2) refactor onionskin field into one only used when n_conn is pending, and a separate onionskin field waiting for attention by a cpuworker. This might even fix the bug. More likely, it will make it fail with a more useful core.
svn:r13394
| Nick Mathewson | 2008-02-05 |
* | If we're a relay, avoid picking ourselves as an introduction point,•••a rendezvous point, or as the final hop for internal circuits. Bug
reported by taranis and lodger. Bugfix on 0.1.2.x.
svn:r13372
| Roger Dingledine | 2008-02-04 |
* | r17611@catbus: nickm | 2008-01-14 13:44:16 -0500••• add some missing checks for failing return values.
svn:r13130
| Nick Mathewson | 2008-01-14 |
* | bugfix on r10612:•••When we load a bridge descriptor from the cache,
and it was previously unreachable, mark it as retriable so we won't
just ignore it. Also, try fetching a new copy immediately.
svn:r12950
| Roger Dingledine | 2007-12-24 |
* | r15653@tombo: nickm | 2007-12-23 14:15:12 -0500••• Refactor circuit_launch* functions to take a bitfield of flags rather than 4 separate nonconsecutive flags arguments. Also, note a possible but in circuit_find_to_cannibalize, which seems to be ignoring its purpose argument.
svn:r12948
| Nick Mathewson | 2007-12-23 |
* | Fix a crash when we load a bridge descriptor from disk but we don't•••currently have a Bridge line for it in our torrc. Bugfix on
0.2.0.12-alpha.
svn:r12921
| Roger Dingledine | 2007-12-22 |
* | Fix a crash when we fetch a descriptor that turns out to be•••unexpected (it used to be in our networkstatus when we started
fetching it, but it isn't in our current networkstatus), and we
aren't using bridges. Bugfix on 0.2.0.x.
svn:r12911
| Roger Dingledine | 2007-12-21 |
* | clean up copyrights, and assign 2007 copyrights to The Tor Project, Inc•••svn:r12786
| Roger Dingledine | 2007-12-12 |
* | If we can't expand our list of entry guards (e.g. because we're•••using bridges or we have StrictEntryNodes set), don't mark relays
down when they fail a directory request. Otherwise we're too quick
to mark all our entry points down.
svn:r12755
| Roger Dingledine | 2007-12-10 |
* | We were ignoring our RelayBandwidthRate for the first 30 seconds•••after opening a circuit -- even relayed circuits. Bugfix on
0.2.0.3-alpha.
svn:r12638
| Roger Dingledine | 2007-12-02 |
* | minor cleanups•••svn:r12571
| Roger Dingledine | 2007-11-26 |
* | Only update guard status (usable / not usable) once we have•••enough directory information. This was causing us to always pick
two new guards on startup (bugfix on 0.2.0.9-alpha), and it was
causing us to discard all our guards on startup if we hadn't been
running for a few weeks (bugfix on 0.1.2.x). Fixes bug 448.
svn:r12570
| Roger Dingledine | 2007-11-26 |
* | If we're using bridges or have strictentrynodes set, and our•••chosen exit is in the same family as all our bridges/entry guards,
then be flexible about families.
svn:r12514
| Roger Dingledine | 2007-11-16 |
* | i'm a little teapot, ...•••svn:r12513
| Roger Dingledine | 2007-11-16 |
* | If we're trying to fetch a bridge descriptor and there's no way•••the bridge authority could help us (for example, we don't know
a digest, or there is no bridge authority), don't be so eager to
fall back to asking the bridge authority.
svn:r12512
| Roger Dingledine | 2007-11-16 |
* | Fix a small memory leak whenever we decide against using a•••newly picked entry guard. Reported by Mike Perry.
svn:r12506
| Roger Dingledine | 2007-11-15 |
* | If bridge users set UpdateBridgesFromAuthority, but the digest•••they ask for is a 404 from the bridge authority, they now fall
back to trying the bridge directly.
svn:r12368
| Roger Dingledine | 2007-11-04 |
* | r16242@catbus: nickm | 2007-10-28 16:28:13 -0400••• Implement if-modified-since for consensus networkstatuses so that we do not download duplicates needlessly.
svn:r12258
| Nick Mathewson | 2007-10-28 |
* | bugfix on r11298:•••Fix a minor memory leak whenever we parse guards from our state
file. Bugfix on 0.2.0.7-alpha.
svn:r11862
| Roger Dingledine | 2007-10-11 |
* | i heard that users know the phrase 'system clock' better than 'clock'. hm.•••svn:r11820
| Roger Dingledine | 2007-10-09 |
* | r15530@catbus: nickm | 2007-10-04 12:16:27 -0400••• Add a bunch of function documentation; clean up a little code; fix some XXXXs; tag the nonsensical EXTRAINFO_PURPOSE_GENERAL as nonsesnse; note another bit of "do not cache special routers" code to nuke.
svn:r11761
| Nick Mathewson | 2007-10-04 |
* | Make "UpdateBridgesFromAuthority" torrc option work: when bridge•••users configure that and specify a bridge with an identity
fingerprint, now they will lookup the bridge descriptor at the
default bridge authority via a one-hop tunnel, but once circuits
are established they will switch to a three-hop tunnel for later
connections to the bridge authority.
svn:r11550
| Roger Dingledine | 2007-09-21 |
* | r14294@Kushana: nickm | 2007-09-01 13:50:03 -0400••• Oops. Initialize "changed" variable when removing obsolete guards.
svn:r11346
| Nick Mathewson | 2007-09-01 |
* | r14826@catbus: nickm | 2007-08-29 13:19:55 -0400••• Add a line to the state file for each guard to let us know which version added the guard. If the line is absent, assume the guard was added by whatever version of Tor last wrote the state file. Remove guards if the version that added them was using a bad guard selection algorithm. (Previously, we removed guards if the version that wrote the file was using a bad guard selection algorithm, even if the guards themselves were chosen by a good version.)
svn:r11298
| Nick Mathewson | 2007-08-29 |
* | r14821@catbus: nickm | 2007-08-27 19:57:56 -0400••• Check for absent nickname when making extend info. I still dont know when this happens, but it is easy enough to check for. Fixes bug 467.
svn:r11293
| Nick Mathewson | 2007-08-28 |
* | r14200@kushana: nickm | 2007-08-24 08:33:41 -0400••• In new code, let's try to prefer named flags to mazes of twisted boolean arguments, all alike.
svn:r11267
| Nick Mathewson | 2007-08-24 |
* | patch from mike perry to a) stop overloading guards as much, and•••b) raise the max-believable-bandwidth to 10MB/s.
svn:r11258
| Roger Dingledine | 2007-08-24 |
* | backport candidate:•••Fix a minor memory leak when we fail to find enough suitable
servers to choose a circuit. Bugfix on 0.1.2.x.
svn:r11247
| Roger Dingledine | 2007-08-22 |
* | r14659@catbus: nickm | 2007-08-18 14:19:34 -0400••• When we are loading state info from disk, never believe any date in the future. Doing so can keep us from retrying guards, rotating onion keys, storing bandwidth info, etc. Fixes bug 434, and others. Backport candidate, once it has been tested.
svn:r11166
| Nick Mathewson | 2007-08-18 |
* | Be even more aggressive about separating local traffic from relayed•••traffic when RelayBandwidthRate is set. (Refines proposal 111.)
svn:r10974
| Roger Dingledine | 2007-07-29 |
* | make progress towards retrying our bridges when they're all•••down and we get a new socks request
svn:r10967
| Roger Dingledine | 2007-07-29 |
* | r13920@catbus: nickm | 2007-07-26 16:25:25 -0400••• whitespace fixes
svn:r10935
| Nick Mathewson | 2007-07-26 |
* | r13858@catbus: nickm | 2007-07-22 18:44:02 -0400••• Fix/note some relatively trivial mem usage issues
svn:r10905
| Nick Mathewson | 2007-07-22 |
* | handle fetching bridge descriptors from the bridge authority too.•••svn:r10898
| Roger Dingledine | 2007-07-22 |
* | when requesting tor/server/authority, ask for tor/server/authority.z•••instead. same functionality, saves a bit of bandwidth. and might even
work.
svn:r10896
| Roger Dingledine | 2007-07-21 |
* | timeout and retry schedules for fetching bridge descriptors•••svn:r10867
| Roger Dingledine | 2007-07-18 |
* | using fascistfirewall and having your bridge on an unreachable•••port silently didn't mix. now they loudly don't mix.
svn:r10862
| Roger Dingledine | 2007-07-18 |
* | free bridge list on exit; try harder to free buffer freelists on exit.•••svn:r10854
| Roger Dingledine | 2007-07-17 |
* | If there's a never-before-connected-to guard node in our list,•••never choose any guards past it. This way we don't expand our
guard list unless we need to. [Bugfix in 0.1.2.x]
I'm not sure if this will solve all our problems, but it is at least
something.
svn:r10730
| Roger Dingledine | 2007-07-02 |
* | if we already have a bridge in our state file, it won't be•••in the networkstatuses, so we'll mark it unusable when we
load it, and then when we get a new routerinfo for it, we'll
still think it's unusable. fix that.
svn:r10612
| Roger Dingledine | 2007-06-15 |
* | bugfix on r10609: don't fail asserts when closing circuits•••that were connected to an unkeyed connection.
svn:r10611
| Roger Dingledine | 2007-06-15 |
* | now we can specify a bridge without specifying its key,•••and we will still connect to it and use it. getting closer!
svn:r10609
| Roger Dingledine | 2007-06-15 |
* | Refine r10571: more work on bridge stuff.••• - Only listen to responses for "authority" fetches if we're configured
to use Bridges. Otherwise it's safe (and maybe smarter) to silently
discard them like we used to.
- React faster to download networkstatuses after the first bridge
descriptor arrives.
- Don't do dir fetches before we have any bridges, even when our
dirport is open.
svn:r10604
| Roger Dingledine | 2007-06-15 |