| Commit message (Expand) | Author | Age |
... | |
| * | | Add a missing comment. | Mike Perry | 2012-12-10 |
| * | | More log message and space fixups. | Mike Perry | 2012-12-10 |
| * | | Clean up some XXX comments. | Mike Perry | 2012-12-09 |
| * | | Space fixes. | Mike Perry | 2012-12-09 |
| * | | Fix a rather serious use-count state bug.•••We need to use the success count or the use count depending on the consensus
parameter.
| Mike Perry | 2012-12-09 |
| * | | Convert to doubles for all pathbias state.•••Let's hope this solves the rounding error issue..
| Mike Perry | 2012-12-09 |
| * | | Also shorten circuit_successes to circ_successes.•••For consistency and great justice.
Ok, mostly consistency.
| Mike Perry | 2012-12-09 |
| * | | Rename first_hop to circ_attempt.•••Since we've generalized what we can count from (first or second hop), we
should generalize the variable and constant naming too.
| Mike Perry | 2012-12-09 |
| * | | Change from first hop accounting to 2nd hop accounting•••This has several advantages, including more resilience to ambient failure.
I still need to rename all the first_hop vars tho.. Saving that for a separate
commit.
| Mike Perry | 2012-12-09 |
| * | | Add intro+rend cannibalize param.. | Mike Perry | 2012-12-09 |
| * | | Flag cannibalized circs as used (non-ideal).•••Also add some comments.
| Mike Perry | 2012-12-09 |
| * | | Allow any valid 'end' cell to mean a circuit was used successfully.•••Also improve some log messages.
| Mike Perry | 2012-12-08 |
| * | | Sadly, we can't safely count client intro circ success | Mike Perry | 2012-12-08 |
| * | | Fix some hidden service edge cases. | Mike Perry | 2012-12-08 |
| * | | Refactor path use bias code into own function.•••Also, improve and log some failure cases.
| Mike Perry | 2012-12-07 |
| * | | Actually, both nacks and acks indicate a valid path | Mike Perry | 2012-12-07 |
| * | | Note more potential issues. | Mike Perry | 2012-12-07 |
| * | | Note a strange case for SOCKS streams. | Mike Perry | 2012-12-07 |
| * | | Fix another crash bug. | Mike Perry | 2012-12-07 |
| * | | Fix a crash bug and pass down a remote reason code.•••Unexpected channel closures count as remote circ failures.
| Mike Perry | 2012-12-07 |
| * | | Document that care needs to be taken with any_streams_attached. | Mike Perry | 2012-12-07 |
| * | | Remove n_chan codepaths for determinining guard.•••Cpath is apparently good enough.
| Mike Perry | 2012-12-07 |
| * | | Move a pathbias function that depends on entryguard_t. | Mike Perry | 2012-12-07 |
| * | | Fix a crash due to NULL circ->n_chan.•••Is this redundant? Can we always rely on circ->cpath->extend_info
being present for origin circuits?
| Mike Perry | 2012-12-07 |
| * | | Prop209: Rend circuits weren't ever marked dirty. | Mike Perry | 2012-12-07 |
| * | | Prop 209: Add in hidserv path bias counts for usage. | Mike Perry | 2012-12-07 |
| * | | Prop 209: Add path bias counts for timeouts and other mechanisms.•••Turns out there's more than one way to block a tagged circuit.
This seems to successfully handle all of the normal exit circuits. Hidden
services need additional tweaks, still.
| Mike Perry | 2012-12-07 |
| * | | Be explicit about units for timeout. | Mike Perry | 2012-12-07 |
| * | | Fix an assert crash and an incorrectly placed return. | Mike Perry | 2012-12-07 |
| * | | Update with code review changes from Nick. | Mike Perry | 2012-12-07 |
| * | | Fix spaces. | Mike Perry | 2012-12-07 |
| * | | Refactor pathbias functions to use pathbias_should_count. | Mike Perry | 2012-12-07 |
| * | | Update Path Bias log messages to match Proposal 209. | Mike Perry | 2012-12-07 |
| * | | Add log message checks for different rates.•••May want to squash this forward or back..
| Mike Perry | 2012-12-07 |
| * | | Update pathbias parameters to match Proposal 209.•••Needs manpage update and testing still..
| Mike Perry | 2012-12-07 |
| * | | Add the ability to count circuit timeouts for guards.•••This is purely for informational reasons for debugging.
| Mike Perry | 2012-12-07 |
* | | | Add configuration options for directory guards•••In addition to all the other ways to make directory gurads not go,
you can now set UseEntryGuardsAsDirGuards to 0.
| Nick Mathewson | 2012-12-25 |
* | | | Directory guard implementation.•••Implements proposal 207; ticket 6526.
| Nick Mathewson | 2012-12-25 |
* | | | Remember which of our guards are directory caches | Nick Mathewson | 2012-12-25 |
* | | | Split choosing a regular directory into its own fn | Nick Mathewson | 2012-12-25 |
* | | | One last fix for a warning on non-EC systems | Nick Mathewson | 2012-12-25 |
* | | | Be more noncomittal about performance improvement of uint128 backend. | Nick Mathewson | 2012-12-25 |
* | | | Make ECDHE group configurable: 224 for public, 256 for bridges (default) | Nick Mathewson | 2012-12-25 |
* | | | Inform the user if they're passing up a 10x ECDH speedup. | Nick Mathewson | 2012-12-25 |
* | | | Add benchmark for DH handshake and ECDH-P-224/56 handshake | Nick Mathewson | 2012-12-25 |
* | | | Let servers choose better ciphersuites when clients support them•••This implements the server-side of proposal 198 by detecting when
clients lack the magic list of ciphersuites that indicates that
they're lying faking some ciphers they don't really have. When
clients lack this list, we can choose any cipher that we'd actually
like. The newly allowed ciphersuites are, currently, "All ECDHE-RSA
ciphers that openssl supports, except for ECDHE-RSA-RC4".
The code to detect the cipher list relies on on (ab)use of
SSL_set_session_secret_cb.
| Nick Mathewson | 2012-12-25 |
* | | | Remove the address argument from client cipher classification fns | Nick Mathewson | 2012-12-25 |
* | | | Cache the type of client cipher list we have in the tor_tls_t•••We already use this classification for deciding whether (as a server)
to do a v2/v3 handshake, and we're about to start using it for
deciding whether we can use good ciphersuites too.
| Nick Mathewson | 2012-12-25 |
* | | | prop198: Detect the list of ciphersuites we used to lie about having•••This is less easy than you might think; we can't just look at the
client ciphers list, since openssl doesn't remember client ciphers if
it doesn't know about them. So we have to keep a list of the "v2"
ciphers, with the ones we don't know about removed.
| Nick Mathewson | 2012-12-25 |
* | | | Configure SSL context to know about using P-256 for ECDHE. | Nick Mathewson | 2012-12-25 |