[or-cvs] r17657: {tor} Clip the MaxCircuitDirtiness config option to a minimum of 1 (in tor/trunk: . src/or)
arma at seul.org
arma at seul.org
Wed Dec 17 22:32:18 UTC 2008
Author: arma
Date: 2008-12-17 17:32:17 -0500 (Wed, 17 Dec 2008)
New Revision: 17657
Modified:
tor/trunk/ChangeLog
tor/trunk/src/or/config.c
Log:
Clip the MaxCircuitDirtiness config option to a minimum of 10
seconds. Warn the user if lower values are given in the
configuration. Bugfix on 0.1.0.1-rc. Patch by Sebastian.
Clip the CircuitBuildTimeout to a minimum of 30 seconds. Warn the
user if lower values are given in the configuration. Bugfix on
0.1.1.17-rc. Patch by Sebastian.
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2008-12-17 21:50:01 UTC (rev 17656)
+++ tor/trunk/ChangeLog 2008-12-17 22:32:17 UTC (rev 17657)
@@ -57,6 +57,12 @@
than a noncanonical one for a given OR ID, always use the
canonical one. Bugfix on 0.2.0.12-alpha. Fixes bug 805.
Spotted by rovv.
+ - Clip the MaxCircuitDirtiness config option to a minimum of 10
+ seconds. Warn the user if lower values are given in the
+ configuration. Bugfix on 0.1.0.1-rc. Patch by Sebastian.
+ - Clip the CircuitBuildTimeout to a minimum of 30 seconds. Warn the
+ user if lower values are given in the configuration. Bugfix on
+ 0.1.1.17-rc. Patch by Sebastian.
o Minor bugfixes (hidden services):
- Do not throw away existing introduction points on SIGHUP; bugfix on
Modified: tor/trunk/src/or/config.c
===================================================================
--- tor/trunk/src/or/config.c 2008-12-17 21:50:01 UTC (rev 17656)
+++ tor/trunk/src/or/config.c 2008-12-17 22:32:17 UTC (rev 17657)
@@ -2841,6 +2841,15 @@
/** Highest allowable value for RendPostPeriod. */
#define MAX_DIR_PERIOD (MIN_ONION_KEY_LIFETIME/2)
+/** Lowest allowable value for CircuitBuildTimeout; values too low will
+ * increase network load because of failing connections being retried, and
+ * might prevent users from connecting to the network at all. */
+#define MIN_CIRCUIT_BUILD_TIMEOUT 30
+
+/** Lowest allowable value for MaxCircuitDirtiness; if this is too low, Tor
+ * will generate too many circuits and potentially overload the network. */
+#define MIN_MAX_CIRCUIT_DIRTINESS 10
+
/** Return 0 if every setting in <b>options</b> is reasonable, and a
* permissible transition from <b>old_options</b>. Else return -1.
* Should have no side effects, except for normalizing the contents of
@@ -3241,8 +3250,8 @@
}
if (options->RendPostPeriod < MIN_REND_POST_PERIOD) {
- log(LOG_WARN,LD_CONFIG,"RendPostPeriod option must be at least %d seconds."
- " Clipping.", MIN_REND_POST_PERIOD);
+ log(LOG_WARN,LD_CONFIG,"RendPostPeriod option is too short; "
+ "raising to %d seconds.", MIN_REND_POST_PERIOD);
options->RendPostPeriod = MIN_REND_POST_PERIOD;
}
@@ -3252,6 +3261,18 @@
options->RendPostPeriod = MAX_DIR_PERIOD;
}
+ if (options->CircuitBuildTimeout < MIN_CIRCUIT_BUILD_TIMEOUT) {
+ log(LOG_WARN, LD_CONFIG, "CircuitBuildTimeout option is too short; "
+ "raising to %d seconds.", MIN_CIRCUIT_BUILD_TIMEOUT);
+ options->CircuitBuildTimeout = MIN_CIRCUIT_BUILD_TIMEOUT;
+ }
+
+ if (options->MaxCircuitDirtiness < MIN_MAX_CIRCUIT_DIRTINESS) {
+ log(LOG_WARN, LD_CONFIG, "MaxCircuitDirtiness option is too short; "
+ "raising to %d seconds.", MIN_MAX_CIRCUIT_DIRTINESS);
+ options->MaxCircuitDirtiness = MIN_MAX_CIRCUIT_DIRTINESS;
+ }
+
if (options->KeepalivePeriod < 1)
REJECT("KeepalivePeriod option must be positive.");
More information about the tor-commits
mailing list