summaryrefslogtreecommitdiff
path: root/src/or/config.c
AgeCommit message (Collapse)Author
2013-03-28Make PathsNeededToBuildCircuits option work.Karsten Loesing
2013-03-20Set default minimum bandwidth for exit flag to zero for TestingTorNetworkAndrea Shepard
2013-03-20Let testing networks override ABSOLUTE_MIN_VALUE_FOR_FAST_FLAGNick Mathewson
This adds a new option to fix bug 8508 which broke chutney networks. The bug was introduced by 317d16de.
2013-03-20Merge remote-tracking branch 'public/bug6304_v3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/circuitbuild.c src/or/config.c
2013-03-19Merge branch 'bug8240_v2_squashed' into maint-0.2.4Nick Mathewson
Conflicts: doc/tor.1.txt src/or/circuitbuild.c src/or/config.c src/or/or.h
2013-03-19Add support for days of the week to intervalsNick Mathewson
2013-03-19Make the guard lifetime configurable and adjustable via the consensusNick Mathewson
Fixes 8240. (Don't actually increase the default guard lifetime. It seems likely to break too many things if done precipitiously.)
2013-03-18Merge remote-tracking branch 'public/bug6174' into maint-0.2.4Nick Mathewson
2013-03-18Merge remote-tracking branch 'andrea/bug8435' into maint-0.2.4Nick Mathewson
2013-03-18Ignore advertised bandwidths if we have enough measured bandwidths availableAndrea Shepard
2013-03-15Merge remote-tracking branch 'public/bug8180_023_v2' into maint-0.2.4Nick Mathewson
2013-03-15Upgrade the warn for EntryNodes without UseEntryGuards to an errorNick Mathewson
fixes bug 8180
2013-03-13Fix the warning about LearnCircuitBuildTimeout && !CircuitBuildTimeoutNick Mathewson
This is for bug 6304. Add a changes file too
2013-03-10randomize SSLKeyLifetime by defaultRoger Dingledine
resolves ticket 8443.
2013-03-10parameterize SSLKeyLifetimeRoger Dingledine
no actual changes in behavior yet
2013-03-10set DisableV2DirectoryInfo_ off by defaultRoger Dingledine
since it's only enableable by authorities, nobody else would be able to start their tor
2013-03-10Tweak bug6783 patch.Nick Mathewson
2013-03-10Add a DisableV2DirectoryInfo_ option to 404 all v2 ns requestsNick Mathewson
I have no idea whether b0rken clients will DoS the network if the v2 authorities all turn this on or not. It's experimental. See #6783 for a description of how to test it more or less safely, and please be careful!
2013-02-19Rename circuit_expire_all_dirty_circsNick Mathewson
The new name is circuit_mark_all_dirty_circs_as_unusable. This resolves an XXX024
2013-02-15make check-spacesNick Mathewson
2013-02-12get rid of the new caching notion in resolve_my_address()Roger Dingledine
and replace it with the good old-fashioned two functions approach
2013-02-11Teach resolve_my_address() to return a cached answerRoger Dingledine
I didn't make any of the callers use this feature yet.
2013-02-11Merge remote-tracking branch 'public/bug7816_023'Nick Mathewson
2013-02-11Fix another memory leakNick Mathewson
This one occurs when changing configuration options. Found by coverity.
2013-02-11Avoid generating extra spaces when explaining how we guessed our addressNick Mathewson
2013-02-11Refactor resolve_my_address() so logs are more accurate / helpfulRoger Dingledine
It returns the method by which we decided our public IP address (explicitly configured, resolved from explicit hostname, guessed from interfaces, learned by gethostname). Now we can provide more helpful log messages when a relay guesses its IP address incorrectly (e.g. due to unexpected lines in /etc/hosts). Resolves ticket 2267. While we're at it, stop sending a stray "(null)" in some cases for the server status "EXTERNAL_ADDRESS" controller event. Resolves bug 8200.
2013-02-01Merge remote-tracking branch 'public/feature7706'Nick Mathewson
2013-02-01Bounds-check path bias rate parameters.Mike Perry
The other remaining parameters don't really need range checks.
2013-02-01Refactor the scaling parameter fetching into a single function.Mike Perry
Also, deprecate the torrc options for the scaling values. It's unlikely anyone but developers will ever tweak them, even if we provided a single ratio value.
2013-02-01Rename log() to tor_log() for loggingNick Mathewson
This is meant to avoid conflict with the built-in log() function in math.h. It resolves ticket 7599. First reported by dhill. This was generated with the following perl script: #!/usr/bin/perl -w -i -p s/\blog\(LOG_(ERR|WARN|NOTICE|INFO|DEBUG)\s*,\s*/log_\L$1\(/g; s/\blog\(/tor_log\(/g;
2013-01-30Merge branch 'bug5956_squashed'Nick Mathewson
2013-01-30Parameterize FRAC_USABLE_NEEDED for fraction of circuitsNick Mathewson
Instead of hardcoding the minimum fraction of possible paths to 0.6, we take it from the user, and failing that from the consensus, and failing that we fall back to 0.6.
2013-01-28Merge branch 'bug7802' of ssh://git-rw.torproject.org/mikeperry/torAndrea Shepard
2013-01-24Merge branch 'time_based_onionqueue_v2' of ssh://git-rw.torproject.org/nickm/torAndrea Shepard
2013-01-18Implement Path use bias accounting.Mike Perry
Path use bias measures how often we can actually succeed using the circuits we actually try to use. It is a subset of path bias accounting, but it is computed as a separate statistic because the rate of client circuit use may vary depending on use case.
2013-01-17When excluding nodes by country, exclude {??} and {A1} tooNick Mathewson
This is ticket 7706, reported by "bugcatcher." The rationale here is that if somebody says 'ExcludeNodes {tv}', then they probably don't just want to block definitely Tuvaluan nodes: they also want to block nodes that have unknown country, since for all they know such nodes are also in Tuvalu. This behavior is controlled by a new GeoIPExcludeUnknown autobool option. With the default (auto) setting, we exclude ?? and A1 if any country is excluded. If the option is 1, we add ?? and A1 unconditionally; if the option is 0, we never add them. (Right now our geoip file doesn't actually seem to include A1: I'm including it here in case it comes back.) This feature only takes effect if you have a GeoIP file. Otherwise you'd be excluding every node.
2013-01-16Update the copyright date to 201.Nick Mathewson
2013-01-03Eliminate MaxOnionsPending; replace it with MaxOnionQueueDelayNick Mathewson
The right way to set "MaxOnionsPending" was to adjust it until the processing delay was appropriate. So instead, let's measure how long it takes to process onionskins (sampling them once we have a big number), and then limit the queue based on its expected time to finish. This change is extra-necessary for ntor, since there is no longer a reasonable way to set MaxOnionsPending without knowing what mix of onionskins you'll get. This patch also reserves 1/3 of the onionskin spots for ntor handshakes, on the theory that TAP handshakes shouldn't be allowed to starve their speedier cousins. We can change this later if need be. Resolves 7291.
2013-01-03Merge branch 'ntor-resquashed'Nick Mathewson
Conflicts: src/or/cpuworker.c src/or/or.h src/test/bench.c
2013-01-03Enable the ntor handshake on the client side.Nick Mathewson
"works for me"
2013-01-02Avoid spurious local-port warningsNick Mathewson
Our old warn_nonlocal_client_ports() would give a bogus warning for every nonlocal port every time it parsed any ports at all. So if it parsed a nonlocal socksport, it would complain that it had a nonlocal socksport...and then turn around and complain about the nonlocal socksport again, calling it a nonlocal transport or nonlocal dnsport, if it had any of those. Fixes bug 7836; bugfix on 0.2.3.3-alpha.
2012-12-25Merge remote-tracking branch 'mikeperry/209-path-bias-changes'Nick Mathewson
2012-12-25Add configuration options for directory guardsNick Mathewson
In addition to all the other ways to make directory gurads not go, you can now set UseEntryGuardsAsDirGuards to 0.
2012-12-25Make ECDHE group configurable: 224 for public, 256 for bridges (default)Nick Mathewson
2012-12-18Changes from Nick's code review 'part 1'Mike Perry
I think this is actually his third code review of this branch so far.
2012-12-17Per-listener option to prefer IPv6 automaps when possible.Nick Mathewson
2012-12-17Build and test most of the machinery needed for IPv6 virtualaddrmapsNick Mathewson
With an IPv6 virtual address map, we can basically hand out a new IPv6 address for _every_ address we connect to. That'll be cool, and will let us maybe get around prop205 issues. This uses some fancy logic to try to make the code paths in the ipv4 and the ipv6 case as close as possible, and moves to randomly generated addresses so we don't need to maintain those stupid counters that will collide if Tor restarts but apps don't. Also has some XXXX items to fix to make this useful. More design needed.
2012-12-17Turn off by-default use of client-side DNS cacheing.Nick Mathewson
2012-12-17Refactor port_cfg_t creation into a port_cfg_new() functionNick Mathewson
This function gives us a single place to set reasonable default flags for port_cfg_t entries, to avoid bugs like the one where we weren't setting ipv4_traffic_ok to 1 on SocksPorts initialized in an older way.
2012-12-17Add options to turn DNS cache use on or off per client port.Nick Mathewson
(This is part 1 of making DNS cache use enabled/disabled on a per-client port basis. These options are shuffled around correctly, but don't do anything yet.)