Commit Graph

613 Commits

Author SHA1 Message Date
Nick Mathewson
a509dbba50 Merge commit 'karsten/dirbytes2'
Conflicts:
	src/or/rephist.h
2010-08-18 10:06:14 -04:00
Karsten Loesing
db94b7f46e Count bytes we spend on answering directory requests. 2010-08-18 13:54:41 +02:00
Nick Mathewson
9bcea4a8ef Merge commit 'sebastian/misc-reason' 2010-08-15 21:27:32 -04:00
Sebastian Hahn
2d8db2aacb Fix url in rend-spec
Fixes bug 1822
2010-08-12 02:40:19 +02:00
Sebastian Hahn
28962ecae8 Fix a typo in control-spec 2010-08-12 02:38:58 +02:00
Sebastian Hahn
161b275028 Retry streams that ended with NOROUTE error
Also add the NOROUTE reason to control-spec.
2010-08-04 00:51:39 +02:00
Nick Mathewson
cafd868a78 Clarify that implementation is for discussion of implementation 2010-08-03 14:25:07 -04:00
Nick Mathewson
d5abd0b43e Add proposal 174 from Ian Goldberg: Optimistic Data for Tor: Server Side 2010-08-03 14:23:51 -04:00
Nick Mathewson
9d317e9bb4 Bless two proposals from Damian Johnson as 172 and 173.
(Leaving a gap for the proposal Jake blessed as 171.)
2010-08-03 13:23:34 -04:00
Sebastian Hahn
150ed553df Introduce END_STREAM_REASON_NOROUTE 2010-08-03 16:46:28 +02:00
Nick Mathewson
05fa0a3ef6 Merge commit 'sebastian/rend-spec' 2010-08-03 09:16:24 -04:00
Sebastian Hahn
8557f64220 Clarify that rend cookies shouldn't be reused 2010-08-03 14:48:17 +02:00
Karsten Loesing
b3b3c919c6 Fix copy-and-paste fail in dir-spec.txt. 2010-08-03 13:12:06 +02:00
Karsten Loesing
1cf6da821c Add two authoritzation protocols to rend-spec.txt. 2010-07-30 10:33:28 +02:00
Karsten Loesing
9ecb64c44d Clean up Section 1 of rend-spec.txt. 2010-07-30 10:33:28 +02:00
Karsten Loesing
6e4c06598f Interchange sections 1.2 and 1.3. 2010-07-30 10:29:14 +02:00
Karsten Loesing
f6e0dc2a6e Rename all RELAY_* cell types to RELAY_COMMAND_*. 2010-07-30 10:28:07 +02:00
Mike Perry
9d5d0f040f Alter how guard flags are chosen.
V3 authorities no longer decide not to vote on Guard+Exit. The bandwidth
weights should take care of this now.

Also, lower the max threshold for WFU to 0.98, to allow more nodes to become
guards.
2010-07-14 20:49:19 -07:00
Nick Mathewson
bea55766af Merge remote branch 'mikeperry/cbt-bugfixes3' 2010-06-29 18:57:50 -04:00
Nick Mathewson
deb9e4aff7 Make spec docs reference RFC2119
Now people will have no excuse for not knowing what "MUST" and "MAY"
mean.  Fixes bug 1310.
2010-06-25 14:58:25 -04:00
Mike Perry
2abe1ceccf Add CLOSE_MS and CLOSE_RATE keywords to buildtimeout event. 2010-06-15 20:04:49 -07:00
Nick Mathewson
faef0fa35d Merge commit 'sjmurdoch/xxx-using-spdy' 2010-06-11 13:25:38 -04:00
Mike Perry
81736f426f Update spec with new right-censored pareto estimators. 2010-06-09 00:22:39 -07:00
Mike Perry
29e0d70814 Bug 1296: Add option+logic to disable CBT learning.
There are now four ways that CBT can be disabled:

1. Network-wide, with the cbtdisabled consensus param.
2. Via config, with "LearnCircuitBuildTimeout 0"
3. Via config, with "AuthoritativeDirectory 1"
4. Via a state file write failure.
2010-05-10 13:11:48 -07:00
Mike Perry
e84025bc2b Update path-spec.txt with contents of proposal 151. 2010-05-10 12:59:05 -07:00
Mike Perry
835ab53102 Add a TIMEOUT_RATE keyword to buildtimeout event. 2010-05-10 12:59:05 -07:00
Nick Mathewson
96a0edf373 Rename CircPriorityHalflifeMsec to CircuitPriorityHalflifeMsec
Everything that accepted the 'Circ' name handled it wrong, so even now
that we fixed the handling of the parameter, we wouldn't be able to
set it without making all the 0.2.2.7..0.2.2.10 relays act wonky.
This patch makes Tors accept the 'Circuit' name instead, so we can
turn on circuit priorities without confusing the versions that treated
the 'Circ' name as occasion to act weird.
2010-04-13 13:29:30 -04:00
Nick Mathewson
28cda33299 Add a missing NL to dir-spec.
Found by Oğuz
2010-03-21 12:45:01 -04:00
Nick Mathewson
03b9c2cb90 fix some dangling refs in dirspec 2010-03-15 15:41:59 -04:00
Steven Murdoch
9e473bd1be Update idea xxx-using-spdy, based on or-dev discussion
- Mention potentially negative consequence of server push, combined
  with client caching

- Make the new cell type more generic, allowing other types of
  exit-side transforms (suggested by nickm)

See http://archives.seul.org/or/dev/Feb-2010/msg00000.html
2010-03-14 19:07:52 +00:00
Nick Mathewson
f8d176d1b9 Clarify title of section 3.3 2010-03-13 14:54:05 -05:00
Steven Murdoch
9c315bda0e Add new idea: Using the SPDY protocol to improve Tor performance 2010-03-12 21:17:46 +00:00
Nick Mathewson
2d29c7be2d Document possibility of "unknown" version state.
reported by atagar; fixes bug 1289.
2010-03-09 00:08:38 -05:00
Nick Mathewson
ac8b8bca11 Clarify that CRLF means "A CR then an LF". Explain what those are.
Apparently this is not as obvious as I thought.
2010-03-05 17:00:42 -05:00
Sebastian Hahn
f3003d588f Add proposal 170 "Configuration options regarding circuit building" 2010-03-03 23:56:59 -05:00
Nick Mathewson
2ab3389ed6 Merge remote branch 'mikeperry/consensus-bw-weights5-merge'
Conflicts:
	ChangeLog
2010-02-25 16:22:29 -05:00
Mike Perry
00f9a35678 Update dir-spec.txt with begin_dir weights. 2010-02-25 11:42:24 -08:00
Mike Perry
4311318f7d Update consensus methods in spec. 2010-02-22 18:43:44 -08:00
Nick Mathewson
2e159967c9 Mark 160 and 161 as Finished. 2010-02-22 20:52:32 -05:00
Mike Perry
5d4f5ef07d Update specs for weight computation and use. 2010-02-22 16:52:11 -08:00
Roger Dingledine
a8a0542c77 minor fixes in proposal 169
still need to finish reading it, but so far so good
2010-02-21 17:20:37 -05:00
Mike Perry
ac68704f07 Allow "EXTENDCIRCUIT 0" to omit a path. 2010-02-18 09:08:31 -08:00
Mike Perry
8512e33773 Add BUILDTIMEOUT_SET event for CBT stress testing. 2010-02-18 09:08:31 -08:00
Nick Mathewson
f75f7322b9 Clarify a paragraph in prop 169. 2010-01-29 16:39:27 -05:00
Nick Mathewson
c5380d6064 The name for the proposal status of 151 is "finished", not "Implemented" 2010-01-28 00:04:45 -05:00
Nick Mathewson
380d00246b Proposal 169: Eliminate TLS renegotiation
I propose a backward-compatible change to the Tor connection
establishment protocol to avoid the use of TLS
renegotiation.

Rather than doing a TLS renegotiation to exchange
certificates and authenticate the original handshake, this
proposal takes an approach similar to Steven Murdoch's
proposal 124, and uses Tor cells to authenticate the
parties' identities once the initial TLS handshake is
finished.
2010-01-28 00:04:25 -05:00
Roger Dingledine
b9f1bd3c4e whitespace fixes 2010-01-15 15:58:35 -05:00
Roger Dingledine
397f7c874f fix some typos in our spec files 2010-01-15 15:56:54 -05:00
Roger Dingledine
f6e8fcfe7a ship the bridges spec file in the tarball too 2010-01-15 15:56:53 -05:00
Roger Dingledine
d035b65cd7 start to document commonly used "param" arguments 2009-12-19 05:11:50 -05:00