Trac issueshttps://gitlab.torproject.org/legacy/trac/-/issues2020-06-13T15:52:34Zhttps://gitlab.torproject.org/legacy/trac/-/issues/17254Scalable HSes by splitting intro/rendezvous2020-06-13T15:52:34ZTvdWScalable HSes by splitting intro/rendezvousasn suggested creating a ticket before the proposal is committed, so here I go.
Most relevant mail from the thread (contains the proposal): https://lists.torproject.org/pipermail/tor-dev/2015-October/009625.htmlasn suggested creating a ticket before the proposal is committed, so here I go.
Most relevant mail from the thread (contains the proposal): https://lists.torproject.org/pipermail/tor-dev/2015-October/009625.htmlTor: unspecifiedTvdWTvdWhttps://gitlab.torproject.org/legacy/trac/-/issues/11327Dir auths should choose Fast and Guard flags by consensus weight if they don'...2020-06-13T14:35:06ZRoger DingledineDir auths should choose Fast and Guard flags by consensus weight if they don't measureIn #8435 we made directory-authorities-that-run-bwauths stop voting Fast or Guard for relays they hadn't measured yet.
But as I pointed out in https://trac.torproject.org/projects/tor/ticket/8435#comment:13, since only a minority of dir...In #8435 we made directory-authorities-that-run-bwauths stop voting Fast or Guard for relays they hadn't measured yet.
But as I pointed out in https://trac.torproject.org/projects/tor/ticket/8435#comment:13, since only a minority of dir auths run bwauths, the majority of dir auths are still voting Fast and Guard based on descriptor bandwidths.
So while the title of ticket #8435 says "Ignore advertised bandwidths for flags once we have enough measured bandwidths", the ChangeLog entry is more accurate:
```
- Directory authorities that have more than a threshold number
of relays with measured bandwidths now treat relays with unmeasured
bandwidths as having bandwidth 0. Resolves ticket 8435.
```
We should at some point actually do the original goal, which is to give Fast to the 7/8s of relays whose consensus weights are highest, and Guard to the 1/2 of relays whose consensus weights are highest and who match the other guard constraints.Tor: unspecifiedTvdWTvdWhttps://gitlab.torproject.org/legacy/trac/-/issues/11150Remove client code for connecting to and using 0.2.2 servers2020-07-31T12:53:28ZNick MathewsonRemove client code for connecting to and using 0.2.2 serversWe can finally drop support for the client-side V2 link handshake!We can finally drop support for the client-side V2 link handshake!Tor: 0.2.8.x-finalTvdWTvdW