12/27/2023 0 Comments Tor 12.5.5 free instals![]() We added a global write limit in Tor 0.1.2.5-alpha, Add separate per-conn write limiting to go with the per-conn read Design and code by Ian Goldberg, Can Tang, and Chris This default by using the new "CircuitPriorityHalflife" config By default, relays enable or disable thisįeature based on a setting in the consensus. When choosing which cells to relay first, relays can now favorĬircuits that have been quiet recently, to provide lower latencyįor low-volume circuits. We alsoĪutomatically discard guards picked using the old algorithm. Select guards weighted by currently advertised bandwidth. Probably latency too) by the first hop in their circuit. Meant that Tor clients were severely limited on throughput (and Which of our guards we'd use uniformly at random. We were selecting our guards uniformly at random, and then weighting Rotate keys (both v3 identity and relay identity) for moria1 This release also rotates two directory authority keys, due to a securityīreach of some of the Torproject servers: ItĪlso starts cleaning up client behavior with respect to the EntryNodes,ĮxitNodes, and StrictNodes config options. Alpha fixes a huge client-side performance bug, as wellĪs laying the groundwork for further relay-side performance fixes. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |