For TorBroswer:
No sense to launch parallel connection after 250ms by default, and no logic to tweak it. As long as Tor client retries stream buildings too, any "high" level timeouts makes not so much profit and probably do things much worse.
Right now it overloads network and relay exits in first place with waste connection request.
TBB must disable it by setting network.http.connection-retry-timeout to 0.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
What's going on here? Is this a real bug or not? At a glance, it looks like this only applies to native socket transports, not proxies. Is that why you marked it invalid? What about #7657 (closed)?
What's going on here? Is this a real bug or not? At a glance, it looks like this only applies to native socket transports, not proxies. Is that why you marked it invalid? What about #7657 (closed)?
Did someone else mark your bugs invalid?
This ticket and #7657 (closed) look like they were created by the bug-eating ‘troll’ with many names, who then closed them because he/she/it was annoyed that you hadn't fixed them within 36 hours.
Trac: Resolution: invalid toN/A Status: closed to reopened
What's going on here? Is this a real bug or not? At a glance, it looks like this only applies to native socket transports, not proxies. Is that why you marked it invalid? What about #7657 (closed)?
Did someone else mark your bugs invalid?
This ticket and #7657 (closed) look like they were created by the bug-eating ‘troll’ with many names, who then closed them because he/she/it was annoyed that you hadn't fixed them within 36 hours.
This is my impression too. I think he/she/it tried to pull a #1240 (moved) where you close valid tickets after some hours without any reason.
Downgrading the priority to reduce the troll factor.
<oftc_must_be_destroyed> because it overloaded by firefox attempt second conn> hey, speaking of which. has anybody tracked down when and why that firefox-second-attempt happens?> (and can we turn it off?)<oftc_must_be_destroyed> yes we can!<oftc_must_be_destroyed> everything tracked<oftc_must_be_destroyed> but nobody cares<oftc_must_be_destroyed> #7656> fun. does that behavior happen when there's a proxy set too?> "At a glance, it looks like this only applies to native socket transports, not proxies"<oftc_must_be_destroyed> yes<oftc_must_be_destroyed> happen> i guess it is especially bad for tor, since it very likely just reuses the same circuit as the first request<oftc_must_be_destroyed> yes
This pref is set in TBB-2.3.25-4. It had been set in TBB-alpha for the past two releases. I stopped commenting on the ticket because there was no point in trying to discuss this here with so much trolling and other self-conflicting nonsense. It certainly would have gotten fixed in TBB-stable faster without quite so much of that.
For future reference, such behavior is the absolute best way to get me to ignore a ticket.