| Commit message (Collapse) | Author | Age |
|
|
|
|
|
|
|
|
|
|
| |
Also fix a bug where if the guard we choose first doesn't answer, we
would try the second guard, but once we connected to the second guard
we would abandon it and retry the first one, slowing down bootstrapping.
The fix in both cases is to treat all our initially chosen guards as
acceptable to use.
Fixes bug 9946.
|
|
|
|
|
| |
Now a user who changes only NumEntryGuards will get the behavior she
expects. Fixes bug 9354; bugfix on 0.2.4.8-alpha.
|
|
|
|
|
| |
We now know the bug is present in 0.2.4.12-alpha too. It should be fixed in
0.2.4.13-alpha, though.
|
|
|
|
|
|
| |
There was a bug in Tor prior to 0.2.4.10-alpha that allowed counts to
become invalid. Clipping the counts at startup allows us to rule out
log messages due to corruption from these prior Tor versions.
|
|
|
|
|
|
| |
This caused an assertion failure when pruning guards.
Fixes bug #8553; bug not in any released Tor.
|
|
|
|
|
|
|
|
| |
Conflicts:
doc/tor.1.txt
src/or/circuitbuild.c
src/or/config.c
src/or/or.h
|
| |
|
|\ |
|
| |
| |
| |
| |
| |
| | |
In addition to rejecting them post-hoc, avoid picking them in the
first place. This makes us less likely to decide that we can't add
guards at all.
|
| |
| |
| |
| |
| |
| | |
Apparently something in the directory guard code made it possible
for the same node to get added as a guard over and over when there
were no actual running guard nodes.
|
| |
| |
| |
| | |
(Second part of a bug8367 fix. -NM)
|
| |
| |
| |
| |
| | |
This fixes bug 8367, introduced in d7089ff228227259137b5a8b. Not in
any released Tor.
|
| |
| |
| |
| |
| | |
We shouldn't be calling choose_random_entry() for directory
conncetions; that's what choose_random_dirguard() is for.
|
| |
| |
| |
| |
| |
| |
| |
| | |
Now we can specify to skip bridges that wouldn't be able to answer the
type of dir fetch we're launching.
It's still the responsibility of the rest of the code to prevent us from
launching a given dir fetch if we have no bridges that could handle it.
|
|/
|
|
|
|
| |
Now as we move into a future where most bridges can handle microdescs
we will generally find ourselves using them, rather than holding back
just because one of our bridges doesn't use them.
|
|
|
|
|
|
|
| |
Path use bias measures how often we can actually succeed using the circuits we
actually try to use. It is a subset of path bias accounting, but it is
computed as a separate statistic because the rate of client circuit use may
vary depending on use case.
|
|
|
|
|
|
|
|
|
|
|
| |
This is an automatically generated commit, from the following perl script,
run with the options "-w -i -p".
s/smartlist_string_num_isin/smartlist_contains_int_as_string/g;
s/smartlist_string_isin((?:_case)?)/smartlist_contains_string$1/g;
s/smartlist_digest_isin/smartlist_contains_digest/g;
s/smartlist_isin/smartlist_contains/g;
s/digestset_isin/digestset_contains/g;
|
|\ |
|
| | |
|
|/ |
|
|\
| |
| |
| |
| |
| |
| | |
Conflicts:
src/or/cpuworker.c
src/or/or.h
src/test/bench.c
|
| |
| |
| |
| | |
"works for me"
|
|\ \ |
|
| | | |
|
| | |
| | |
| | |
| | | |
I think this is actually his third code review of this branch so far.
|
| | | |
|
| | |
| | |
| | |
| | |
| | | |
We need to use the success count or the use count depending on the consensus
parameter.
|
| | |
| | |
| | |
| | | |
Let's hope this solves the rounding error issue..
|
| | |
| | |
| | |
| | |
| | |
| | | |
For consistency and great justice.
Ok, mostly consistency.
|
| | |
| | |
| | |
| | |
| | | |
Since we've generalized what we can count from (first or second hop), we
should generalize the variable and constant naming too.
|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Turns out there's more than one way to block a tagged circuit.
This seems to successfully handle all of the normal exit circuits. Hidden
services need additional tweaks, still.
|
| | | |
|
| | |
| | |
| | |
| | | |
Needs manpage update and testing still..
|
| | |
| | |
| | |
| | | |
This is purely for informational reasons for debugging.
|
| | |
| | |
| | |
| | |
| | | |
In addition to all the other ways to make directory gurads not go,
you can now set UseEntryGuardsAsDirGuards to 0.
|
| | |
| | |
| | |
| | | |
Implements proposal 207; ticket 6526.
|
|/ / |
|
|/
|
|
|
| |
Also, add a hack Roger suggested where we're more patient if no circuits are
opened yet.
|
| |
|
|
|