Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-02-23 | Merge branch 'tor-gitlab/mr/488' | David Goulet | |
2022-02-23 | cc: Fix memleak when building extension response | David Goulet | |
Fixes #40575 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-23 | Merge branch 'tor-gitlab/mr/536' | David Goulet | |
2022-02-23 | and fix those typos in the releasenotes too | Roger Dingledine | |
2022-02-23 | fix typos, remove wrong stanzas, update 0.4.6.10 | Roger Dingledine | |
we were missing the 0.4.6.10 changes in ReleaseNotes, and the 0.4.0.5 releasenotes mistakenly included some 0.4.0.x bugfixes. | |||
2022-02-23 | fix a typo in a comment | Roger Dingledine | |
2022-02-23 | Reject intro2 cells that request unadvertized congestion control. | Mike Perry | |
2022-02-23 | Properly initialize the cc_enabled field in hs intro data. | Mike Perry | |
2022-02-22 | Add test for sendme_inc validation. | Mike Perry | |
2022-02-22 | Add test for sendme_cell_is_next with sendme_inc of 31 | Mike Perry | |
2022-02-22 | Add test for circuit_sendme_cell_is_next() when sendme_inc is 100. | Mike Perry | |
This ensures compatibility with old tor. | |||
2022-02-22 | Add changes file | Mike Perry | |
2022-02-22 | Add a delta parameter to Vegas. | Mike Perry | |
This allows us to cap the queue use during steady state. In shadow, this reduced instances of long circuit queues at relays. | |||
2022-02-22 | Exit slow start at the gamma threshold | Mike Perry | |
This improves performance and fairness. | |||
2022-02-22 | Increment by at least 2 sendme_incs in slow start | Mike Perry | |
2022-02-22 | Only apply more frequent cwnd updates after slow start. | Mike Perry | |
2022-02-22 | Make N_EWMA a percentage of CWND update rate, capped by a max value. | Mike Perry | |
This proved better in Shadow sims than just a multiple of CWND. | |||
2022-02-22 | Relocate two parameters from circuit scope to global scope. | Mike Perry | |
Changes in these will not affect in-progress transfers. | |||
2022-02-22 | Guard against 0 time delta in BDP calc. | Mike Perry | |
This can only happen in Shadow, but it will cause issues there. | |||
2022-02-22 | Increase RTT ratio used to detect monotime jumps/stalls. | Mike Perry | |
In Shadow, we saw RTT jumps as high as 1000 naturally. So let's set this to 5000, to give us some breathing room. | |||
2022-02-22 | Fix NULL pointer deref in logs | Mike Perry | |
2022-02-22 | Properly compute the number or recv cells from deliver_window | Mike Perry | |
Without this conversion, there is an implict 1000-recv_cells, which causes the mod to fail if it is not a factor of 1000. | |||
2022-02-22 | Use path type hint for Vegas queue parameters. | Mike Perry | |
These parameters will vary depending on path length, especially for onions. | |||
2022-02-22 | Set new defaults for congestion control parameters. | Mike Perry | |
Defaults determined from Shadow experimentation. More parameter functionality changes to follow. | |||
2022-02-22 | cc: Change edge_get_ccontrol() to look at both cpath and on_circuit | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Fix tests for congestion control | David Goulet | |
2022-02-22 | hs: Setup congestion control on service rends using intro data | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Decode and cache the INTRODUCE cell congestion control extension | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Build INTRODUCE extension in the encrypted section | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Setup congestion control on client rends | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Republish onion descriptor on sendme_inc change | David Goulet | |
Republishing is necessary to ensure that clients connect using the correct sendme_inc upon any change. Additionally, introduction points must be re-chosen, so that cached descriptors with old values are not usable. We do not expect to change sendme_inc, unless cell size or TLS record size changes, so this should be rare. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Decode flow-control line | David Goulet | |
This puts the flow control version (unparsed) in the descriptor. The client doesn't use it yet. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | hs: Encode flow control value in the descriptor | David Goulet | |
This simply adds the "flow-control" line, as detailed in prop324, to the descriptor. No decoding is done at this commit. Part of #40506 | |||
2022-02-22 | cc: Export sendme_inc validation into public function | David Goulet | |
This is needed for client validation of server descriptor value, before launching a rend/intro. | |||
2022-02-22 | cc: Use trunnel extension for ntorv3 circ parameters | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | trunnel: Make hs/cell_common.trunnel generic | David Goulet | |
Move it to extension.trunnel instead so that extension ABI construction can be used in other parts of tor than just HS cells. Specifically, we'll use it in the ntorv3 data payload and make a congestion control parameter extension using that binary structure. Only rename. No code behavior changes. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | protover: Add function to get the value of a single type | David Goulet | |
We can now query the protover subsystem to get the current value we support for a specific protover type. This will be useful for prop324 onion service part which puts in the FlowCtrl value in the service descriptor. No behavior change. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | Add test for congestion control negotiation logic. | Mike Perry | |
2022-02-22 | Add test for TAP vs ntor2+ntor3 onion queue ordering | Mike Perry | |
2022-02-22 | Add hidden torrc option to always try CC negotiation. | Mike Perry | |
This is for public network testing and for sbws. Should not otherwise be used, hence it is an undocumented __option. The option deliberately does not allow force-disabling congestion control, as this is bad for queueing and fairness. | |||
2022-02-22 | Handle other places that use onion handshake type values | Mike Perry | |
We want ntor and ntorv3 to use the same queues and stats. | |||
2022-02-22 | Extend info argument updates for non-ntorv3 cases | Mike Perry | |
2022-02-22 | Congestion control usage of negotiated params | Mike Perry | |
2022-02-22 | Protover flag handling for congestion control negotiation | Mike Perry | |
2022-02-22 | Hook up client usage of congestion control negotiation | Mike Perry | |
2022-02-22 | Implement congestion control parameter negotiation | Mike Perry | |
2022-02-22 | Add circuit param payload definitions to trunnel | Mike Perry | |
2022-02-22 | Convert TODO into TODO-324 for better visibility. | Nick Mathewson | |
2022-02-22 | Add stub argument for constructing congestion_control_t | Nick Mathewson | |
2022-02-22 | Negotiated circuit parameters must pass from worker. | Nick Mathewson | |