tor/changes
Nick Mathewson cc35157805 Twiddle ROUTER_{MAX_COSMETIC_TIME_DIFFERENCE,MAX_AGE_TO_PUBLISH}
This is ticket 2479. Roger's original explanation was:

   We have a series of bugs where relays publish a descriptor within
   12 hours of their last descriptor, but the authorities drop it
   because it's not different "enough" from the last one and it's
   too close to the last one.

   The original goal of this idea was to a) reduce the number of new
   descriptors authorities accept (and thus have to store) and b)
   reduce the total number of descriptors that clients and mirrors
   fetch. It's a defense against bugs where relays publish a new
   descriptor every minute.

   Now that we're putting out one consensus per hour, we're doing
   better at the total damage that can be caused by 'b'.

   There are broader-scale design changes that would help here, and
   we've had a trac entry open for years about how relays should
   recognize that they're not in the consensus, or recognize when
   their publish failed, and republish sooner.

   In the mean time, I think we should change some of the parameters
   to make the problem less painful.
2012-03-30 15:38:16 -04:00
..
bug2749 Twiddle ROUTER_{MAX_COSMETIC_TIME_DIFFERENCE,MAX_AGE_TO_PUBLISH} 2012-03-30 15:38:16 -04:00
bug2987 Write initial documentation for the contents of the state file 2012-03-28 04:08:56 -04:00
bug4011 Keep separate time-to-downloads for each consensus flavor 2012-03-28 02:55:33 -04:00
bug4091_debugging Log statement to help track down bug4091 2012-03-27 18:28:39 -04:00
bug4875 Make relays handle an address suggestion from a directory server giving an IPv6 address. 2012-03-28 22:16:55 +02:00
bug5053 Count IPv6 connections in bridge and entry stats. 2012-02-09 11:12:30 +01:00
bug5151 note that bug 5151 is on 0.2.3.9-alpha 2012-03-28 17:19:24 -04:00
bug5180 Changelog for torify changes 2012-03-27 18:46:47 -04:00
bug5449 Provide large enough buffer in test_util_sscanf() 2012-03-27 15:16:22 +02:00
bug5508 Add changes file. 2012-03-30 12:06:53 +02:00
crypto_api Refactor the API for setting up a block cipher. 2012-03-27 22:37:56 -04:00
memleak_safecookie Fix a memory leak in an error case of SAFECOOKIE authentication. 2012-03-30 10:20:48 -04:00
openssl101_aes Use OpenSSL 1.0.1's EVP aes_ctr implementation when available 2012-03-27 22:38:06 -04:00
pad_rsa_always Excise PK_NO_PADDING entirely: Unpadded RSA is silly. 2012-03-27 22:38:06 -04:00