summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2012-06-15give 0.2.3.17-beta a release blurbtor-0.2.3.17-betaRoger Dingledine
2012-06-15another little step at making debugging 5458 easierRoger Dingledine
2012-06-15tab-man returneth (this time using the name 'rob')Roger Dingledine
2012-06-15fix typos, logic error, default in man pageRoger Dingledine
2012-06-15bump to 0.2.3.17-betaRoger Dingledine
2012-06-15fold in next changes itemsRoger Dingledine
2012-06-15Expand on bug5458 changes fileNick Mathewson
2012-06-14Add a changes file for bug5458.Mike Perry
2012-06-14Lower the default path bias notice rate to 40%.Mike Perry
I saw 72% on a test run with 26 circuits. 70% might be a little close to the line. That, or min_circs is too low and we need to be more patient. We still need to test/simulate more.
2012-06-14For now, never disable any guards.Mike Perry
2012-06-14Defend against entry node path bias attacksMike Perry
The defense counts the circuit failure rate for each guard for the past N circuits. Failure is defined as the ability to complete a first hop, but not finish completing the circuit all the way to the exit. If the failure rate exceeds a certain amount, a notice is emitted. If it exceeds a greater amount, a warn is emitted and the guard is disabled. These values are governed by consensus parameters which we intend to tune as we perform experiments and statistical simulations.
2012-06-14Document --hush; fix documentation for --quiet.Nick Mathewson
2012-06-14Merge remote-tracking branch 'asn-mytor/bug5589_take2'Nick Mathewson
2012-06-14Remove validate_pluggable_transports_config(): redundant since 9d9b5ed0.George Kadianakis
The warning message of validate_pluggable_transports_config() is superseded by the changes in the warning message of connection_or_connect() when the proxy credentials can't be found.
2012-06-14demote two entries that don't affect most usersRoger Dingledine
2012-06-14fold in further changes filesRoger Dingledine
2012-06-13Merge remote-tracking branch 'public/bug4663'Nick Mathewson
2012-06-13Merge branch 'trac-5049-squashed'Nick Mathewson
2012-06-13One more fix for bug 5049.Nick Mathewson
2012-06-13Satisfy make check-spacesAndrea Shepard
2012-06-13Move cbt->liveness.timeouts_after_firsthop free code into its own functionAndrea Shepard
2012-06-13Add change file for bug 5049Andrea Shepard
2012-06-13Early exit from circuit_build_times_set_timeout() if adaptive timeouts are ↵Andrea Shepard
disabled
2012-06-13Don't poll to see if we need to build circuits for timeout data if ↵Andrea Shepard
LearnCircuitBuildTimeout is disabled
2012-06-13Use K&R styleAndrea Shepard
2012-06-13Unconditionally use config CircuitBuildTimeout if LearnCircuitBuildTimeout ↵Andrea Shepard
is disabled
2012-06-13Don't track circuit timeout history unless we're actually using adaptive ↵Andrea Shepard
timeouts
2012-06-13Add debug logging to circuit_build_times_* of circuitbuild.c to trace ↵Andrea Shepard
queries of consensus parameters for bug 5049
2012-06-13Only use -Qunused-arguments when building with clang. fix on 5210 fix.Nick Mathewson
2012-06-13Merge branch 'bug5263_023'Nick Mathewson
2012-06-13Add changes file for bug5263Nick Mathewson
2012-06-13Add rate-limited log message to bug5263 fixNick Mathewson
Initially I said, "I claim that we shouldn't be reading and marked; let's see if I'm right." But Rob finds that it does.
2012-06-13Fix busy Libevent loops (infinite loops in Shadow)Rob G. Jansen
There is a bug causing busy loops in Libevent and infinite loops in the Shadow simulator. A connection that is marked for close, wants to flush, is held open to flush, but is rate limited (the token bucket is empty) triggers the bug. This commit fixes the bug. Details are below. This currently happens on read and write callbacks when the active socket is marked for close. In this case, Tor doesn't actually try to complete the read or write (it returns from those methods when marked), but instead tries to clear the connection with conn_close_if_marked(). Tor will not close a marked connection that contains data: it must be flushed first. The bug occurs when this flush operation on the marked connection can not occur because the connection is rate-limited (its write token bucket is empty). The fix is to detect when rate limiting is preventing a marked connection from properly flushing. In this case, it should be flagged as read/write_blocked_on_bandwidth and the read/write events de-registered from Libevent. When the token bucket gets refilled, it will check the associated read/write_blocked_on_bandwidth flag, and add the read/write event back to Libevent, which will cause it to fire. This time, it will be properly flushed and closed. The reason that both read and write events are both de-registered when the marked connection can not flush is because both result in the same behavior. Both read/write events on marked connections will never again do any actual reads/writes, and are only useful to trigger the flush and close the connection. By setting the associated read/write_blocked_on_bandwidth flag, we ensure that the event will get added back to Libevent, properly flushed, and closed. Why is this important? Every Shadow event occurs at a discrete time instant. If Tor does not properly deregister Libevent events that fire but result in Tor essentially doing nothing, Libevent will repeatedly fire the event. In Shadow this means infinite loop, outside of Shadow this means wasted CPU cycles.
2012-06-13Change smartlist_create->smartlist_new in bug4744 branch as merged to masterNick Mathewson
2012-06-13Merge branch 'bug4744_squashed'Nick Mathewson
2012-06-13Implement the client side of proposal 198Nick Mathewson
This is a feature removal: we no longer fake any ciphersuite other than the not-really-standard SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA (0xfeff). This change will let servers rely on our actually supporting what we claim to support, and thereby let Tor migrate to better TLS ciphersuites. As a drawback, Tor instances that use old openssl versions and openssl builds with ciphers disabled will no longer give the "firefox" cipher list.
2012-06-13Merge remote-tracking branch 'public/bug3940_redux'Nick Mathewson
2012-06-13Merge remote-tracking branch 'public/bug5210'Nick Mathewson
2012-06-13Fix another clang compile warningSebastian Hahn
We forgot this when we fixed 5969.
2012-06-13Merge branch 'task-5849-3-squashed'Nick Mathewson
2012-06-13Fix integer overflow in cell stats spotted by atagar.Karsten Loesing
Fixes #5849.
2012-06-13Merge branch 'maint-0.2.2'Roger Dingledine
2012-06-13Update to the June 2012 GeoIP database.Karsten Loesing
Manually removed range 0.116.0.0 to 0.119.255.255 which Maxmind says is assigned to AT. This is very likely a bug in their database, because 0.0.0.0/8 is a reserved range.
2012-06-12Add a warning for using HTTPProxy with no other proxy.Nick Mathewson
From what I can tell, this configuration is usually a mistake, and leads people to think that all their traffic is getting proxied when in fact practically none of it is. Resolves the issue behind "bug" 4663.
2012-06-12forward-port the 0.2.2.37 changelogRoger Dingledine
2012-06-12fold in changes files so farRoger Dingledine
2012-06-11fixup! An attempt at bug3940 and making AllowDotExit 0 work with MapAddressNick Mathewson
2012-06-11Document ADDRMAPSRC_NONE.Nick Mathewson
2012-06-11Merge branch 'bug5452'Nick Mathewson
2012-06-11Call bug5452 fix a feature; note its trac number in the changes fileNick Mathewson