Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Container Registry
Model registry
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
The Tor Project
Core
Tor
Commits
12c6475c
Commit
12c6475c
authored
12 years ago
by
Nick Mathewson
Browse files
Options
Downloads
Plain Diff
Merge branch 'ticket8161_squashed'
parents
0175209e
eb15be3d
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
changes/bug8161
+6
-0
6 additions, 0 deletions
changes/bug8161
doc/tor.1.txt
+2
-2
2 additions, 2 deletions
doc/tor.1.txt
src/or/circuitbuild.c
+12
-9
12 additions, 9 deletions
src/or/circuitbuild.c
src/or/entrynodes.h
+4
-0
4 additions, 0 deletions
src/or/entrynodes.h
with
24 additions
and
11 deletions
changes/bug8161
0 → 100644
+
6
−
0
View file @
12c6475c
o Minor changes:
- Lower path use bias thresholds to .80 for notice and .60 for warn.
Fixes bug #8161; bugfix on 0.2.4.10-alpa.
- Make the rate limiting flags for the path use bias log messages
independent from the original path bias flags. Fixes bug #8161;
bugfix on 0.2.4.10-alpha.
This diff is collapsed.
Click to expand it.
doc/tor.1.txt
+
2
−
2
View file @
12c6475c
...
...
@@ -1291,8 +1291,8 @@ The following options are useful only for clients (that is, if
+
By default, or if a negative value is provided for one of these options,
Tor uses reasonable defaults from the networkstatus consensus document.
If no defaults are available there, these options default to 20, .
9
0,
.
7
0, and 100, respectively.
If no defaults are available there, these options default to 20, .
8
0,
.
6
0, and 100, respectively.
**ClientUseIPv6** **0**|**1**::
If this option is set to 1, Tor might connect to entry nodes over
...
...
This diff is collapsed.
Click to expand it.
src/or/circuitbuild.c
+
12
−
9
View file @
12c6475c
...
...
@@ -1222,7 +1222,7 @@ pathbias_get_min_use(const or_options_t *options)
static
double
pathbias_get_notice_use_rate
(
const
or_options_t
*
options
)
{
#define DFLT_PATH_BIAS_NOTICE_USE_PCT
9
0
#define DFLT_PATH_BIAS_NOTICE_USE_PCT
8
0
if
(
options
->
PathBiasNoticeUseRate
>=
0
.
0
)
return
options
->
PathBiasNoticeUseRate
;
else
...
...
@@ -1238,7 +1238,7 @@ pathbias_get_notice_use_rate(const or_options_t *options)
double
pathbias_get_extreme_use_rate
(
const
or_options_t
*
options
)
{
#define DFLT_PATH_BIAS_EXTREME_USE_PCT
7
0
#define DFLT_PATH_BIAS_EXTREME_USE_PCT
6
0
if
(
options
->
PathBiasExtremeUseRate
>=
0
.
0
)
return
options
->
PathBiasExtremeUseRate
;
else
...
...
@@ -2273,8 +2273,8 @@ pathbias_measure_use_rate(entry_guard_t *guard)
entry_guards_changed
();
return
;
}
}
else
if
(
!
guard
->
path_bias_extreme
)
{
guard
->
path_bias_extreme
=
1
;
}
else
if
(
!
guard
->
path_bias_
use_
extreme
)
{
guard
->
path_bias_
use_
extreme
=
1
;
log_warn
(
LD_CIRC
,
"Your Guard %s=%s is failing to carry an extremely large "
"amount of streams on its circuits. "
...
...
@@ -2297,8 +2297,8 @@ pathbias_measure_use_rate(entry_guard_t *guard)
}
}
else
if
(
pathbias_get_use_success_count
(
guard
)
/
guard
->
use_attempts
<
pathbias_get_notice_use_rate
(
options
))
{
if
(
!
guard
->
path_bias_noticed
)
{
guard
->
path_bias_noticed
=
1
;
if
(
!
guard
->
path_bias_
use_
noticed
)
{
guard
->
path_bias_
use_
noticed
=
1
;
log_notice
(
LD_CIRC
,
"Your Guard %s=%s is failing to carry more streams on its "
"circuits than usual. "
...
...
@@ -2336,7 +2336,10 @@ pathbias_measure_use_rate(entry_guard_t *guard)
* pathbias_measure_use_rate(). It may be possible to combine them
* eventually, especially if we can ever remove the need for 3
* levels of closure warns (if the overall circuit failure rate
* goes down with ntor).
* goes down with ntor). One way to do so would be to multiply
* the build rate with the use rate to get an idea of the total
* fraction of the total network paths the user is able to use.
* See ticket #8159.
*/
static
void
pathbias_measure_close_rate
(
entry_guard_t
*
guard
)
...
...
@@ -2457,7 +2460,7 @@ pathbias_measure_close_rate(entry_guard_t *guard)
*
* XXX: The attempt count transfer stuff here might be done
* better by keeping separate pending counters that get
* transfered at circuit close.
* transfered at circuit close.
See ticket #8160.
*/
static
void
pathbias_scale_close_rates
(
entry_guard_t
*
guard
)
...
...
@@ -2503,7 +2506,7 @@ pathbias_scale_close_rates(entry_guard_t *guard)
*
* XXX: The attempt count transfer stuff here might be done
* better by keeping separate pending counters that get
* transfered at circuit close.
* transfered at circuit close.
See ticket #8160.
*/
void
pathbias_scale_use_rates
(
entry_guard_t
*
guard
)
...
...
This diff is collapsed.
Click to expand it.
src/or/entrynodes.h
+
4
−
0
View file @
12c6475c
...
...
@@ -39,6 +39,10 @@ typedef struct entry_guard_t {
* bias for this node already? */
unsigned
int
path_bias_disabled
:
1
;
/**< Have we disabled this node because
* of path bias issues? */
unsigned
int
path_bias_use_noticed
:
1
;
/**< Did we alert the user about path
* use bias for this node already? */
unsigned
int
path_bias_use_extreme
:
1
;
/**< Did we alert the user about path
* use bias for this node already? */
unsigned
int
is_dir_cache
:
1
;
/**< Is this node a directory cache? */
time_t
bad_since
;
/**< 0 if this guard is currently usable, or the time at
* which it was observed to become (according to the
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment