Commit Graph

10813 Commits

Author SHA1 Message Date
Roger Dingledine
d478948844 admit that the "get a relay operator mailing list going" plan is the
one to slip if something is going to


svn:r18334
2009-01-30 01:18:15 +00:00
Andrew Lewman
65ad80bc79 Updated win32/mingw directions for openssl 0.9.8j.
svn:r18327
2009-01-29 23:21:37 +00:00
Andrew Lewman
742b823fdf Clean up the rpm creation steps.
svn:r18325
2009-01-29 23:19:56 +00:00
Steven Murdoch
a692ed550c Add data files generated by selection probability optimization algorithm
svn:r18316
2009-01-29 11:13:20 +00:00
Nick Mathewson
e1f03572ca Support setting serverdnsrandomizecase during sighup. Backportable, unless too trivial.
svn:r18307
2009-01-28 19:53:03 +00:00
Nick Mathewson
f78793879d Fix a race condition on nameserver reconfiguration.
This resolves bug 526, wherein we would crash if the following
events occurred in this order:
  A: We're an OR, and one of our nameservers goes down.
  B: We launch a probe to it to see if it's up again. (We do this hourly
     in steady-state.)
  C: Before the probe finishes, we reconfigure our nameservers,
     usually because we got a SIGHUP and the resolve.conf file changed.
  D: The probe reply comes back, or times out. (There is a five-second
     window for this, after B has happens).

IOW, if one of our nameservers is down and our nameserver
configuration has changed, there were 5 seconds per hour where HUPing
the server was unsafe.

Bugfix on 0.1.2.1-alpha.  Too obscure to backport.

svn:r18306
2009-01-28 18:26:20 +00:00
Nick Mathewson
e06de61d84 Don't obsolete a very-new connection for having no circuits yet.
This fixes the last known case of bug 891, which could happen if two
hosts, A and B, disagree about how long a circuit has been open,
because of clock drift of some kind.  Host A would then mark the
connection as is_bad_for_new_circs when it got too old and open a new
connection.  In between when B receives a NETINFO cell on the new
conn, and when B receives a conn cell on the new circuit, the new
circuit will seem worse to B than the old one, and so B will mark it
as is_bad_for_new_circs in the second or third loop of
connection_or_group_set_badness().

Bugfix on 0.1.1.13-alpha.  Bug found by rovv.

Not a backport candidate: the bug is too obscure and the fix too tricky.

svn:r18303
2009-01-28 17:36:41 +00:00
Nick Mathewson
62a460d55f Fix an old changelog entry to mention which bug it fixed.
svn:r18302
2009-01-28 17:36:37 +00:00
Nick Mathewson
0d5f4d4e73 Remove some dead code.
svn:r18301
2009-01-28 17:36:34 +00:00
Nick Mathewson
8027c8c6dd Forward-port: Fix bug 893: check AP connections for markedness before expiring them.
svn:r18299
2009-01-28 16:30:06 +00:00
Nick Mathewson
ef001cf85d Actually send the extra_headers content in write_http_response_header_impl. This make X-Descriptor-Now-New get sent. Bugfix on 0.2.0.10-alpha. Spotted by "multiplication".
svn:r18297
2009-01-28 16:06:46 +00:00
Roger Dingledine
9fdae765e3 clean up r18287
svn:r18288
2009-01-28 07:16:22 +00:00
Roger Dingledine
edff606317 patch from matt to implement 'getinfo status/clients-seen'
svn:r18287
2009-01-28 06:50:36 +00:00
Roger Dingledine
31d60992c6 more minor bugs in the control spec
svn:r18286
2009-01-28 06:46:14 +00:00
Roger Dingledine
09eab14f78 typo found by 'nil'
svn:r18283
2009-01-28 00:03:47 +00:00
Roger Dingledine
59f57a0117 gah. yet another place that needs to be edited when we add
a new event. what a mess.


svn:r18277
2009-01-27 04:43:43 +00:00
Karsten Loesing
ed48c58838 Correct some typos while reading dir specs.
svn:r18266
2009-01-25 11:26:11 +00:00
Nick Mathewson
72e420ff3c Fix typo found by Justin Coffi on or-talk
svn:r18258
2009-01-23 22:45:08 +00:00
Steven Murdoch
494dbd3ccb Section on peer-to-peer bandwidth estimation
svn:r18242
2009-01-22 21:07:30 +00:00
Nick Mathewson
afc5b61777 Do not use == in our shell code; = is standard.
svn:r18239
2009-01-22 19:06:28 +00:00
Nick Mathewson
25c6ff6f55 Support 64-bit time_t. Patch from Matthias Drochner. Partial backport candidate.
svn:r18234
2009-01-22 16:28:12 +00:00
Steven Murdoch
15d3c28503 New section "Minimzing latency of paths" in performance optimization paper
svn:r18227
2009-01-22 12:49:04 +00:00
Jacob Appelbaum
1ac3e2abce Update 'sd' to allow users to select v2 or v3 protocols when looking up a node name. Default to v2. Either way, we're using Weasel's DA.
svn:r18220
2009-01-22 05:50:19 +00:00
Nick Mathewson
8ebceeb352 Make sure that even in the weird fiddly paths that lead to init_keys,
crypto_global_init gets called.  Also have it be crypto_global_init
that calls crypto_seed_rng, so we are not dependent on OpenSSL's
RAND_poll in these fiddly cases.

Should fix bug 907.  Bugfix on 0.0.9pre6.  Backport candidate.

svn:r18210
2009-01-21 15:38:39 +00:00
Nick Mathewson
bf2b71beb8 Fix an error in tor_addr_parse that kept us from having a hidden service or a bridge live at an IPv6 address.
svn:r18206
2009-01-21 07:24:50 +00:00
Nick Mathewson
3f8ab367c1 Fix warning on panther compile, and bug 913. Backport candidate.
svn:r18203
2009-01-21 03:51:14 +00:00
Roger Dingledine
62203d1d5b note that BridgeRecordUsageByCountry is on by default (but it
still only takes effect if BridgeRelay is set)


svn:r18202
2009-01-21 03:43:07 +00:00
Roger Dingledine
a5a6b9a08a Let controllers actually ask for the "clients_seen" event. Bugfix
on 0.2.1.10-alpha; reported by Matt Edman.


svn:r18201
2009-01-21 03:24:27 +00:00
Roger Dingledine
90a5042aeb get ready for more development
svn:r18200
2009-01-21 02:51:30 +00:00
Martin Peck
5bbb7c809f Update Tor WiX MSI package for 0.2.1.11-alpha, new component GUIDs.
svn:r18198
2009-01-21 02:24:21 +00:00
Peter Palfrader
df5a94fc67 And forward port patches
svn:r18195
2009-01-21 00:01:07 +00:00
Peter Palfrader
8304026b1a New upstream version
svn:r18194
2009-01-20 23:56:20 +00:00
Roger Dingledine
3c668245b7 bump to 0.2.1.11-alpha, clean up changelog
svn:r18192
2009-01-20 23:33:04 +00:00
Roger Dingledine
5a52c7a70c remove some done items, clarify a few others
svn:r18190
2009-01-20 22:55:23 +00:00
Nick Mathewson
a87980c2eb Add a better (non-locale-having) ctypes implementation to avoid protocol and parsing mismatches on different platforms.
svn:r18189
2009-01-20 21:33:56 +00:00
Steven Murdoch
d20ae4962f Discuss effect of adjusting node selection probability based on exit policy
svn:r18188
2009-01-20 11:41:49 +00:00
Roger Dingledine
44a3587d74 mark off some done items
svn:r18173
2009-01-18 20:48:43 +00:00
Roger Dingledine
c426e1de91 move my microdescriptors proposal into slot 158
svn:r18172
2009-01-18 18:57:20 +00:00
Roger Dingledine
18eba0073d clean up my microdescriptors proposals now that i've slept on it
svn:r18171
2009-01-18 18:56:28 +00:00
Peter Palfrader
1c70922491 make it work with base64
base64 from coreutils is really picky about the number of equation
marks (=) that end a base64 encoded string.  Unfortunately Tor doesn't
believe they are important at all so it cuts them all off all the time.

For perl purposes we just added a good measure of = and were happy about
it.  For base64 we now need to add the proper number of equation marks.
It turns out that number is 1 for the length of strings we process.

svn:r18170
2009-01-18 13:22:47 +00:00
Peter Palfrader
804f2dd716 Aliases do not work so well in scripts
svn:r18169
2009-01-18 13:22:45 +00:00
Peter Palfrader
d81208dbe3 Add base64-decode as an alias or shell function. it was a proper binary in sarge
svn:r18168
2009-01-18 13:12:47 +00:00
Karsten Loesing
9f6703ea3a Update lists of directory authorities.
svn:r18167
2009-01-18 13:03:44 +00:00
Roger Dingledine
31d05f5aa3 touchups
svn:r18165
2009-01-18 10:22:13 +00:00
Roger Dingledine
3f9b2dda53 the rest of the propsets i noticed we were missing in the ideas/ dir
svn:r18164
2009-01-18 09:51:23 +00:00
Roger Dingledine
464502b7e2 some notes on how exactly to do this microdescriptor thing.
svn:r18163
2009-01-18 09:51:09 +00:00
Peter Palfrader
d21d90c9b9 Mention tor-resolve also
svn:r18162
2009-01-18 01:08:48 +00:00
Peter Palfrader
0d77226a19 Debian changelog for upcoming upstream version fixing #495829
svn:r18161
2009-01-18 01:08:45 +00:00
Peter Palfrader
0636369b83 mention that tsocks only socksifies TCP
In the torify(1) manpage explain that tsocks will only socksify
TCP connections, and that therefore it will most likely leak DNS
requests.

svn:r18160
2009-01-18 01:05:17 +00:00
Peter Palfrader
5811005442 README.Debian: No longer claim we change the default 'Group' setting when run
as debian-user.  That setting no longer exists.


svn:r18159
2009-01-18 00:50:31 +00:00