Age | Commit message (Collapse) | Author |
|
|
|
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
This has already been discussed somewhat on a pad; now we can move
to an MR and fill in the missing parts.
|
|
(Based on network team discussion, 28 April 2022)
|
|
Closes #113
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
Closes: #81.
|
|
|
|
|
|
Changes:
- Rework exit negotiation logic a bit
- Specify using ntorv3 with extension fields for negotiation
- Clients only request congestion control; exits and services
control sendme_inc
- Rework onion service negotiation for descriptor-controlled
FlowCtrl protover and sendme_inc value
- Add bounds checks on sendme_inc for clients
- Update parameter values based on Shadow results
- Improvements to TOR_VEGAS algorithm based on simulation testing
- Additional consensus parameters for RTT N-EWMA smoothing and
TOR_VEGAS queue use caps
- Clarify N_EWMA smoothing, and relocate it to its own sub-section.
- TOR_VEGAS now defaults to CWND/RTT BDP estimator
- Minor TOR_VEGAS alg bugfixes
- Add a 'delta' parameter to TOR_VEGAS for steady-state backoff
- Consensus param update notes and param range fixes.
- Add glossary of common congestion control acronyms
- Misc clarifications
|
|
|
|
These patch changes describe new default behaviors for extension
field lists, as appear in ntor3 and in many places throughout the
ntor3 protocol. In general:
* Unrecognized extensions MUST be ignored.
Additionally, all the following rules apply _unless otherwise stated
in the documentation for an extension.
* Extensions are sent in sorted order.
* Extensions should only be sent once in a message
* If you receive multiple copies of an extension, only the first
one counts.
This comes out of discussions on tor!525.
|
|
Also, mark it closed.
|
|
334 is superseded by 335, which is Finished but not Closed.
|
|
See tor#40134
|
|
|
|
|
|
There's not been much progress here, and I don't think we'll
come back to it any time soon.
|
|
It was documented back in b4d580ebbd65fde4d69fa4f9d2c75c405e1a12a1.
|
|
George Kadianakis documented this back in 4dcd7e94f17c072.
|
|
This behavior is now documented in guard-spec, since around
91ea21e3a36d5.
|
|
Nobody votes on this flag any more, but we _didn't_ actually remove
support in the code for voting on it.
I incorrectly marked it Finished because its ticket was closed,
but it doesn't seem to be actually implemented in Tor.
|
|
I incorrectly marked it Finished because its ticket was closed,
but it doesn't seem to be actually implemented in Tor.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Closes #70
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
Implemented but not yet merged into main spec.
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
|
|
|
|
|
|
- Specify rate advertisement of edge drain rate in XON, to minimize chatter
- Limit the frequency of XON/XOFF with consensus parsams
- Describe dropmark defenses using XON/XOFF limits
- Describe how half-closed edge connections are handled with flow control
- Describe flow control consensus parameters
- Describe flow control shadow experiments and live comparison
- Create and describe additional consensus parameters that will influence
congestion control performance and memory usage
- Clarify performance metrics involved in experiments
- Remove some stale XXXs and TODOs
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Signed-off-by: David Goulet <dgoulet@torproject.org>
|
|
|