[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: AllowedUnverifiedNodes



This is not *entirely* related, but I'm typing it here before I forget, which can happen quite suddenly at times! My question is: I've picked up that Tor compression has been considered, at least in passing, before. What algorythms were considered? Just gzip or something else? I've used Guttman and VanSomebodyOrOther algorythms, at least in the context of ethernet frames/TCPIP and it gains about 8-10x more throughput on avarage. The problem is that they require all the routers in the path to actually support compression, which doesn't often happen.
    I guess the bottom line here is: Can plain old generic SSL be compressed, or is that functionality specific to the SSh toolset itself and not the SSL protocol proper?

~Andrew

Roger Dingledine wrote:
On Tue, Aug 30, 2005 at 04:06:27PM -0700, Tor Operator wrote:
  
I submitted a bug to the torcp bugtracker about the
AllowUnverifiedNodes setting, but wasn't sure what the correct syntax
would be for allowing no unverified nodes.

Is it just "AllowUnverifiedNodes "on a line by itself for none?  I
tried "AllowUnverifiedNodes None" and "AllowUnverifiedNodes Null",
but tor doesn't like any of those lines.  It accepts
"AllowUnverifiedNodes ", but I don't know if that just reverts to the
default of "middle, rendezvous" or does it actually mean none.
    

Thanks for spotting this bug.

In the upcoming 0.1.1.6-alpha release, there will be a new controller
command "RESETCONF AllowUnverifiedNodes" which will return it to its
default ("middle,rendezvous").

The command "SETCONF AllowUnverifiedNodes" will set it to "".

You will also be able to set it to "" in your torrc by putting the
line "AllowUnverifiedNodes" by itself in your torrc.

Thanks,
--Roger