=== Make iptables rule that simulates FascistFirewall, then try connecting without FascistFirewall. Note differences between old and new algo. ===
### Make iptables rule that simulates FascistFirewall, then try connecting without FascistFirewall. Note differences between old and new algo.
prop271 will not work well in a fascist firewall environment, if FascistFirewall is not turned on. It will basically get stuck on the first primary guard for a long time.
...
...
@@ -25,33 +25,33 @@ Legacy:
Need to check whether old code was behaving better.
=== Make iptables rule that disables outgoing connections. Make sure that the sampled guards set size limit works. ===
### Make iptables rule that disables outgoing connections. Make sure that the sampled guards set size limit works.
Max SAMPLED_GUARDS size limit restriction works fine. `Not expanding the guard sample any further; just hit the maximum sample threshold of 627`
=== Test hardcoded entry guards (`EntryNodes`) ===
### Test hardcoded entry guards (`EntryNodes`)
prop271 will not work at all with very restricted `EntryNodes` sets. It will fill up the sampled guards list, and then fail to find the right node. That's #20826.
=== Test bridges support ===
### Test bridges support
Basic bridge test with 1 bridge seems to work fine. SIGHUP also works fine transitioning between bridges and non-bridges.
=== Test transition between modes using SIGHUP ===
### Test transition between modes using SIGHUP
Basic testing seems to work. Managed to switch from "default" to "bridge" to "restricted" just with SIGHUP without any visible problems or leaks.
=== Switch between guard selections on the fly. Test flappiness ===
### Switch between guard selections on the fly. Test flappiness