#13718 (moved) has revealed an issue where chutney-run tor authorities don't flag anything as an Exit. This was resolved in #13161 (moved) with TestingDirAuthVoteExit, but a more elegant solution (or a root cause) needs to be found in order to properly test #13718 (moved).
Workarounds are available:
TestingDirAuthVoteExit *
AssumeReachable 0(not actually a workaround)
But they make it harder to justify that the test results apply to real-world tor bootstraps, or even chutney configs without special-case configurations.
This issue is like #11264 (moved), and could have the same root cause (a conflict between the setting of the exit flag and exit policy summaries), although this seems unlikely.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items
0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items
0
Link issues together to show that they're related.
Learn more.
Trac: Description: #13718 (moved) has revealed an issue here chutney-run tor authorities don't flag anything as an Exit. This was resolved in #13161 (moved) with TestingDirAuthVoteExit, but a more elegant solution (or a root cause) needs to be found in order to properly test #13718 (moved).
Workarounds are available:
TestingDirAuthVoteExit *
AssumeReachable 0
But they make it harder to justify that the test results apply to real-world tor bootstraps, or even chutney configs without special-case configurations.
This issue is like #11264 (moved), and could have the same root cause (a conflict between the setting of the exit flag and exit policy summaries), although this seems unlikely.
to
#13718 (moved) has revealed an issue where chutney-run tor authorities don't flag anything as an Exit. This was resolved in #13161 (moved) with TestingDirAuthVoteExit, but a more elegant solution (or a root cause) needs to be found in order to properly test #13718 (moved).
Workarounds are available:
TestingDirAuthVoteExit *
AssumeReachable 0
But they make it harder to justify that the test results apply to real-world tor bootstraps, or even chutney configs without special-case configurations.
This issue is like #11264 (moved), and could have the same root cause (a conflict between the setting of the exit flag and exit policy summaries), although this seems unlikely.
Trac: Description: #13718 (moved) has revealed an issue where chutney-run tor authorities don't flag anything as an Exit. This was resolved in #13161 (moved) with TestingDirAuthVoteExit, but a more elegant solution (or a root cause) needs to be found in order to properly test #13718 (moved).
Workarounds are available:
TestingDirAuthVoteExit *
AssumeReachable 0
But they make it harder to justify that the test results apply to real-world tor bootstraps, or even chutney configs without special-case configurations.
This issue is like #11264 (moved), and could have the same root cause (a conflict between the setting of the exit flag and exit policy summaries), although this seems unlikely.
to
#13718 (moved) has revealed an issue where chutney-run tor authorities don't flag anything as an Exit. This was resolved in #13161 (moved) with TestingDirAuthVoteExit, but a more elegant solution (or a root cause) needs to be found in order to properly test #13718 (moved).
Workarounds are available:
TestingDirAuthVoteExit *
AssumeReachable 0(not actually a workaround)
But they make it harder to justify that the test results apply to real-world tor bootstraps, or even chutney configs without special-case configurations.
This issue is like #11264 (moved), and could have the same root cause (a conflict between the setting of the exit flag and exit policy summaries), although this seems unlikely. Status: new to assigned Owner: N/Ato teor
I think this issue occurs because dirserv_compute_performance_thresholds() assigns exit flags after filtering by router_counts_toward_thresholds(). This appears to be a feature intended to avoid pollution of the Tor network by low-quality Exit nodes.
The fix is to use an option that's already in the code. I think TestingMinExitFlagThreshold 0 should ensure the exit flag is assigned to all potential exit relays, after they self-test reachability and post their descriptors to the authorities.
A patch is required to make TestingMinExitFlagThreshold 0 work the way I assume it should.
I expect that TestingMinExitFlagThreshold 0 would cause authorities to ignore bandwidth (either advertised or measured) when assigning the Exit flag.
But router_is_active() marks routers as inactive if they have no bandwidthcapacity in their routerinfo.
My suggested patch is to ignore the non-zero bandwidthcapacity requirement when TestingTorNetwork is set, and TestingMinExitFlagThreshold 0.
This causes the authorities to mark themselves, and any qualifying relays, as Exits.