Roger Dingledine
d478948844
admit that the "get a relay operator mailing list going" plan is the
...
one to slip if something is going to
svn:r18334
2009-01-30 01:18:15 +00:00
Andrew Lewman
65ad80bc79
Updated win32/mingw directions for openssl 0.9.8j.
...
svn:r18327
2009-01-29 23:21:37 +00:00
Andrew Lewman
742b823fdf
Clean up the rpm creation steps.
...
svn:r18325
2009-01-29 23:19:56 +00:00
Steven Murdoch
a692ed550c
Add data files generated by selection probability optimization algorithm
...
svn:r18316
2009-01-29 11:13:20 +00:00
Nick Mathewson
e1f03572ca
Support setting serverdnsrandomizecase during sighup. Backportable, unless too trivial.
...
svn:r18307
2009-01-28 19:53:03 +00:00
Nick Mathewson
f78793879d
Fix a race condition on nameserver reconfiguration.
...
This resolves bug 526, wherein we would crash if the following
events occurred in this order:
A: We're an OR, and one of our nameservers goes down.
B: We launch a probe to it to see if it's up again. (We do this hourly
in steady-state.)
C: Before the probe finishes, we reconfigure our nameservers,
usually because we got a SIGHUP and the resolve.conf file changed.
D: The probe reply comes back, or times out. (There is a five-second
window for this, after B has happens).
IOW, if one of our nameservers is down and our nameserver
configuration has changed, there were 5 seconds per hour where HUPing
the server was unsafe.
Bugfix on 0.1.2.1-alpha. Too obscure to backport.
svn:r18306
2009-01-28 18:26:20 +00:00
Nick Mathewson
e06de61d84
Don't obsolete a very-new connection for having no circuits yet.
...
This fixes the last known case of bug 891, which could happen if two
hosts, A and B, disagree about how long a circuit has been open,
because of clock drift of some kind. Host A would then mark the
connection as is_bad_for_new_circs when it got too old and open a new
connection. In between when B receives a NETINFO cell on the new
conn, and when B receives a conn cell on the new circuit, the new
circuit will seem worse to B than the old one, and so B will mark it
as is_bad_for_new_circs in the second or third loop of
connection_or_group_set_badness().
Bugfix on 0.1.1.13-alpha. Bug found by rovv.
Not a backport candidate: the bug is too obscure and the fix too tricky.
svn:r18303
2009-01-28 17:36:41 +00:00
Nick Mathewson
62a460d55f
Fix an old changelog entry to mention which bug it fixed.
...
svn:r18302
2009-01-28 17:36:37 +00:00
Nick Mathewson
0d5f4d4e73
Remove some dead code.
...
svn:r18301
2009-01-28 17:36:34 +00:00
Nick Mathewson
8027c8c6dd
Forward-port: Fix bug 893: check AP connections for markedness before expiring them.
...
svn:r18299
2009-01-28 16:30:06 +00:00
Nick Mathewson
ef001cf85d
Actually send the extra_headers content in write_http_response_header_impl. This make X-Descriptor-Now-New get sent. Bugfix on 0.2.0.10-alpha. Spotted by "multiplication".
...
svn:r18297
2009-01-28 16:06:46 +00:00
Roger Dingledine
9fdae765e3
clean up r18287
...
svn:r18288
2009-01-28 07:16:22 +00:00
Roger Dingledine
edff606317
patch from matt to implement 'getinfo status/clients-seen'
...
svn:r18287
2009-01-28 06:50:36 +00:00
Roger Dingledine
31d60992c6
more minor bugs in the control spec
...
svn:r18286
2009-01-28 06:46:14 +00:00
Roger Dingledine
09eab14f78
typo found by 'nil'
...
svn:r18283
2009-01-28 00:03:47 +00:00
Roger Dingledine
59f57a0117
gah. yet another place that needs to be edited when we add
...
a new event. what a mess.
svn:r18277
2009-01-27 04:43:43 +00:00
Karsten Loesing
ed48c58838
Correct some typos while reading dir specs.
...
svn:r18266
2009-01-25 11:26:11 +00:00
Nick Mathewson
72e420ff3c
Fix typo found by Justin Coffi on or-talk
...
svn:r18258
2009-01-23 22:45:08 +00:00
Steven Murdoch
494dbd3ccb
Section on peer-to-peer bandwidth estimation
...
svn:r18242
2009-01-22 21:07:30 +00:00
Nick Mathewson
afc5b61777
Do not use == in our shell code; = is standard.
...
svn:r18239
2009-01-22 19:06:28 +00:00
Nick Mathewson
25c6ff6f55
Support 64-bit time_t. Patch from Matthias Drochner. Partial backport candidate.
...
svn:r18234
2009-01-22 16:28:12 +00:00
Steven Murdoch
15d3c28503
New section "Minimzing latency of paths" in performance optimization paper
...
svn:r18227
2009-01-22 12:49:04 +00:00
Jacob Appelbaum
1ac3e2abce
Update 'sd' to allow users to select v2 or v3 protocols when looking up a node name. Default to v2. Either way, we're using Weasel's DA.
...
svn:r18220
2009-01-22 05:50:19 +00:00
Nick Mathewson
8ebceeb352
Make sure that even in the weird fiddly paths that lead to init_keys,
...
crypto_global_init gets called. Also have it be crypto_global_init
that calls crypto_seed_rng, so we are not dependent on OpenSSL's
RAND_poll in these fiddly cases.
Should fix bug 907. Bugfix on 0.0.9pre6. Backport candidate.
svn:r18210
2009-01-21 15:38:39 +00:00
Nick Mathewson
bf2b71beb8
Fix an error in tor_addr_parse that kept us from having a hidden service or a bridge live at an IPv6 address.
...
svn:r18206
2009-01-21 07:24:50 +00:00
Nick Mathewson
3f8ab367c1
Fix warning on panther compile, and bug 913. Backport candidate.
...
svn:r18203
2009-01-21 03:51:14 +00:00
Roger Dingledine
62203d1d5b
note that BridgeRecordUsageByCountry is on by default (but it
...
still only takes effect if BridgeRelay is set)
svn:r18202
2009-01-21 03:43:07 +00:00
Roger Dingledine
a5a6b9a08a
Let controllers actually ask for the "clients_seen" event. Bugfix
...
on 0.2.1.10-alpha; reported by Matt Edman.
svn:r18201
2009-01-21 03:24:27 +00:00
Roger Dingledine
90a5042aeb
get ready for more development
...
svn:r18200
2009-01-21 02:51:30 +00:00
Martin Peck
5bbb7c809f
Update Tor WiX MSI package for 0.2.1.11-alpha, new component GUIDs.
...
svn:r18198
2009-01-21 02:24:21 +00:00
Peter Palfrader
df5a94fc67
And forward port patches
...
svn:r18195
2009-01-21 00:01:07 +00:00
Peter Palfrader
8304026b1a
New upstream version
...
svn:r18194
2009-01-20 23:56:20 +00:00
Roger Dingledine
3c668245b7
bump to 0.2.1.11-alpha, clean up changelog
...
svn:r18192
2009-01-20 23:33:04 +00:00
Roger Dingledine
5a52c7a70c
remove some done items, clarify a few others
...
svn:r18190
2009-01-20 22:55:23 +00:00
Nick Mathewson
a87980c2eb
Add a better (non-locale-having) ctypes implementation to avoid protocol and parsing mismatches on different platforms.
...
svn:r18189
2009-01-20 21:33:56 +00:00
Steven Murdoch
d20ae4962f
Discuss effect of adjusting node selection probability based on exit policy
...
svn:r18188
2009-01-20 11:41:49 +00:00
Roger Dingledine
44a3587d74
mark off some done items
...
svn:r18173
2009-01-18 20:48:43 +00:00
Roger Dingledine
c426e1de91
move my microdescriptors proposal into slot 158
...
svn:r18172
2009-01-18 18:57:20 +00:00
Roger Dingledine
18eba0073d
clean up my microdescriptors proposals now that i've slept on it
...
svn:r18171
2009-01-18 18:56:28 +00:00
Peter Palfrader
1c70922491
make it work with base64
...
base64 from coreutils is really picky about the number of equation
marks (=) that end a base64 encoded string. Unfortunately Tor doesn't
believe they are important at all so it cuts them all off all the time.
For perl purposes we just added a good measure of = and were happy about
it. For base64 we now need to add the proper number of equation marks.
It turns out that number is 1 for the length of strings we process.
svn:r18170
2009-01-18 13:22:47 +00:00
Peter Palfrader
804f2dd716
Aliases do not work so well in scripts
...
svn:r18169
2009-01-18 13:22:45 +00:00
Peter Palfrader
d81208dbe3
Add base64-decode as an alias or shell function. it was a proper binary in sarge
...
svn:r18168
2009-01-18 13:12:47 +00:00
Karsten Loesing
9f6703ea3a
Update lists of directory authorities.
...
svn:r18167
2009-01-18 13:03:44 +00:00
Roger Dingledine
31d05f5aa3
touchups
...
svn:r18165
2009-01-18 10:22:13 +00:00
Roger Dingledine
3f9b2dda53
the rest of the propsets i noticed we were missing in the ideas/ dir
...
svn:r18164
2009-01-18 09:51:23 +00:00
Roger Dingledine
464502b7e2
some notes on how exactly to do this microdescriptor thing.
...
svn:r18163
2009-01-18 09:51:09 +00:00
Peter Palfrader
d21d90c9b9
Mention tor-resolve also
...
svn:r18162
2009-01-18 01:08:48 +00:00
Peter Palfrader
0d77226a19
Debian changelog for upcoming upstream version fixing #495829
...
svn:r18161
2009-01-18 01:08:45 +00:00
Peter Palfrader
0636369b83
mention that tsocks only socksifies TCP
...
In the torify(1) manpage explain that tsocks will only socksify
TCP connections, and that therefore it will most likely leak DNS
requests.
svn:r18160
2009-01-18 01:05:17 +00:00
Peter Palfrader
5811005442
README.Debian: No longer claim we change the default 'Group' setting when run
...
as debian-user. That setting no longer exists.
svn:r18159
2009-01-18 00:50:31 +00:00