Age | Commit message (Collapse) | Author |
|
resolves #116
|
|
Closes #113
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
Closes: #81.
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Related to #40312
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
Related to https://gitlab.torproject.org/tpo/core/tor/-/issues/40560
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Changes:
- Rework exit negotiation logic a bit
- Specify using ntorv3 with extension fields for negotiation
- Clients only request congestion control; exits and services
control sendme_inc
- Rework onion service negotiation for descriptor-controlled
FlowCtrl protover and sendme_inc value
- Add bounds checks on sendme_inc for clients
- Update parameter values based on Shadow results
- Improvements to TOR_VEGAS algorithm based on simulation testing
- Additional consensus parameters for RTT N-EWMA smoothing and
TOR_VEGAS queue use caps
- Clarify N_EWMA smoothing, and relocate it to its own sub-section.
- TOR_VEGAS now defaults to CWND/RTT BDP estimator
- Minor TOR_VEGAS alg bugfixes
- Add a 'delta' parameter to TOR_VEGAS for steady-state backoff
- Consensus param update notes and param range fixes.
- Add glossary of common congestion control acronyms
- Misc clarifications
|
|
|
|
These patch changes describe new default behaviors for extension
field lists, as appear in ntor3 and in many places throughout the
ntor3 protocol. In general:
* Unrecognized extensions MUST be ignored.
Additionally, all the following rules apply _unless otherwise stated
in the documentation for an extension.
* Extensions are sent in sorted order.
* Extensions should only be sent once in a message
* If you receive multiple copies of an extension, only the first
one counts.
This comes out of discussions on tor!525.
|
|
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
The descriptor format uses a curve25519->ed25519 conversion
algorithm to cross-certify descriptors with their ntor onion keys.
This patch clarifies two aspects of the algorithm:
1. When deriving a private key, how to derive the part of the
private key that _isn't_ a point on the curve.
2. That there are two algorithms here, one for private->private and
one for public->public.
|
|
In particular, this commit clarifies that the ranges of some
parameters are such that choosing a very high value will, in effect,
disable parts of the circuit timeout inference code.
|
|
Also, mark it closed.
|
|
334 is superseded by 335, which is Finished but not Closed.
|
|
See tor#40134
|
|
|
|
|
|
There's not been much progress here, and I don't think we'll
come back to it any time soon.
|
|
It was documented back in b4d580ebbd65fde4d69fa4f9d2c75c405e1a12a1.
|
|
George Kadianakis documented this back in 4dcd7e94f17c072.
|
|
This behavior is now documented in guard-spec, since around
91ea21e3a36d5.
|
|
Nobody votes on this flag any more, but we _didn't_ actually remove
support in the code for voting on it.
I incorrectly marked it Finished because its ticket was closed,
but it doesn't seem to be actually implemented in Tor.
|
|
I incorrectly marked it Finished because its ticket was closed,
but it doesn't seem to be actually implemented in Tor.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Relays started advertising Relay=3 in 0.4.5.1-alpha, see core/tor commit
e787e521af9.
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Closes #70
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|