aboutsummaryrefslogtreecommitdiff
path: root/src/or/entrynodes.c
Commit message (Collapse)AuthorAge
* be willing to bootstrap from all three of our directory guardsRoger Dingledine2013-10-12
| | | | | | | | | | | Also fix a bug where if the guard we choose first doesn't answer, we would try the second guard, but once we connected to the second guard we would abandon it and retry the first one, slowing down bootstrapping. The fix in both cases is to treat all our initially chosen guards as acceptable to use. Fixes bug 9946.
* NumDirectoryGuards now tracks NumEntryGuards by defaultRoger Dingledine2013-07-30
| | | | | Now a user who changes only NumEntryGuards will get the behavior she expects. Fixes bug 9354; bugfix on 0.2.4.8-alpha.
* Increase the pathbias state file miscounting version check.Mike Perry2013-04-24
| | | | | We now know the bug is present in 0.2.4.12-alpha too. It should be fixed in 0.2.4.13-alpha, though.
* Clip invalid path bias counts at startup.Mike Perry2013-04-03
| | | | | | There was a bug in Tor prior to 0.2.4.10-alpha that allowed counts to become invalid. Clipping the counts at startup allows us to rule out log messages due to corruption from these prior Tor versions.
* The *default* guard lifetime is two months; the *min* is oneNick Mathewson2013-03-21
| | | | | | This caused an assertion failure when pruning guards. Fixes bug #8553; bug not in any released Tor.
* Merge branch 'bug8240_v2_squashed' into maint-0.2.4Nick Mathewson2013-03-19
| | | | | | | | Conflicts: doc/tor.1.txt src/or/circuitbuild.c src/or/config.c src/or/or.h
* Fix some wide linesNick Mathewson2013-03-18
|
* Merge remote-tracking branch 'public/no_dup_guards' into maint-0.2.4Nick Mathewson2013-03-18
|\
| * Be more robust when excluding existing nodes as new dirguardsNick Mathewson2013-02-14
| | | | | | | | | | | | In addition to rejecting them post-hoc, avoid picking them in the first place. This makes us less likely to decide that we can't add guards at all.
| * Add some code to bluntly prevent duplicate guards from getting addedNick Mathewson2013-02-14
| | | | | | | | | | | | Apparently something in the directory guard code made it possible for the same node to get added as a guard over and over when there were no actual running guard nodes.
* | Correctly set entry->is_dir_cache when adding an entry guard for the first timeAndrea Shepard2013-03-01
| | | | | | | | (Second part of a bug8367 fix. -NM)
* | Fix bootstrapping with bridges by making is_dir_cache is set on them.Nick Mathewson2013-03-01
| | | | | | | | | | This fixes bug 8367, introduced in d7089ff228227259137b5a8b. Not in any released Tor.
* | Restore the entry/dirguard distinction.Nick Mathewson2013-02-12
| | | | | | | | | | We shouldn't be calling choose_random_entry() for directory conncetions; that's what choose_random_dirguard() is for.
* | generalize choose_random_entry()'s dirinfo parameterRoger Dingledine2013-02-02
| | | | | | | | | | | | | | | | Now we can specify to skip bridges that wouldn't be able to answer the type of dir fetch we're launching. It's still the responsibility of the rest of the code to prevent us from launching a given dir fetch if we have no bridges that could handle it.
* | use microdescriptors if *any* of our bridges can handle themRoger Dingledine2013-02-02
|/ | | | | | Now as we move into a future where most bridges can handle microdescs we will generally find ourselves using them, rather than holding back just because one of our bridges doesn't use them.
* Implement Path use bias accounting.Mike Perry2013-01-18
| | | | | | | Path use bias measures how often we can actually succeed using the circuits we actually try to use. It is a subset of path bias accounting, but it is computed as a separate statistic because the rate of client circuit use may vary depending on use case.
* Rename *_isin to *_containsNick Mathewson2013-01-16
| | | | | | | | | | | This is an automatically generated commit, from the following perl script, run with the options "-w -i -p". s/smartlist_string_num_isin/smartlist_contains_int_as_string/g; s/smartlist_string_isin((?:_case)?)/smartlist_contains_string$1/g; s/smartlist_digest_isin/smartlist_contains_digest/g; s/smartlist_isin/smartlist_contains/g; s/digestset_isin/digestset_contains/g;
* Merge remote-tracking branch 'asn/bug7896'Nick Mathewson2013-01-16
|\
| * Mention name of the transport used when we learn the fpr of a bridge.George Kadianakis2013-01-09
| |
* | Update the copyright date to 201.Nick Mathewson2013-01-16
|/
* Merge branch 'ntor-resquashed'Nick Mathewson2013-01-03
|\ | | | | | | | | | | | | Conflicts: src/or/cpuworker.c src/or/or.h src/test/bench.c
| * Enable the ntor handshake on the client side.Nick Mathewson2013-01-03
| | | | | | | | "works for me"
* | Merge remote-tracking branch 'mikeperry/209-path-bias-changes'Nick Mathewson2012-12-25
|\ \
| * | Nick's Code review #3 part 2.Mike Perry2012-12-18
| | |
| * | Changes from Nick's code review 'part 1'Mike Perry2012-12-18
| | | | | | | | | | | | I think this is actually his third code review of this branch so far.
| * | Space fixes.Mike Perry2012-12-09
| | |
| * | Fix a rather serious use-count state bug.Mike Perry2012-12-09
| | | | | | | | | | | | | | | We need to use the success count or the use count depending on the consensus parameter.
| * | Convert to doubles for all pathbias state.Mike Perry2012-12-09
| | | | | | | | | | | | Let's hope this solves the rounding error issue..
| * | Also shorten circuit_successes to circ_successes.Mike Perry2012-12-09
| | | | | | | | | | | | | | | | | | For consistency and great justice. Ok, mostly consistency.
| * | Rename first_hop to circ_attempt.Mike Perry2012-12-09
| | | | | | | | | | | | | | | Since we've generalized what we can count from (first or second hop), we should generalize the variable and constant naming too.
| * | Prop 209: Add path bias counts for timeouts and other mechanisms.Mike Perry2012-12-07
| | | | | | | | | | | | | | | | | | | | | Turns out there's more than one way to block a tagged circuit. This seems to successfully handle all of the normal exit circuits. Hidden services need additional tweaks, still.
| * | Update with code review changes from Nick.Mike Perry2012-12-07
| | |
| * | Update pathbias parameters to match Proposal 209.Mike Perry2012-12-07
| | | | | | | | | | | | Needs manpage update and testing still..
| * | Add the ability to count circuit timeouts for guards.Mike Perry2012-12-07
| | | | | | | | | | | | This is purely for informational reasons for debugging.
* | | Add configuration options for directory guardsNick Mathewson2012-12-25
| | | | | | | | | | | | | | | In addition to all the other ways to make directory gurads not go, you can now set UseEntryGuardsAsDirGuards to 0.
* | | Directory guard implementation.Nick Mathewson2012-12-25
| | | | | | | | | | | | Implements proposal 207; ticket 6526.
* | | Remember which of our guards are directory cachesNick Mathewson2012-12-25
|/ /
* / Bug 3443: Don't count ORconn setup in circuit build time.Mike Perry2012-12-07
|/ | | | | Also, add a hack Roger suggested where we're more patient if no circuits are opened yet.
* Fix more madness from the split_circuitbuild mergeNick Mathewson2012-10-22
|
* Split code for entry guards and bridges into a new module.Nick Mathewson2012-10-15