mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-23 20:03:31 +01:00
When relays do their initial bandwidth measurement, don't limit
to just our our entry guards for the test circuits. Otherwise we tend to have multiple test circuits going through a single entry guard, which makes our bandwidth test less accurate. Fixes part of bug 654; patch contributed by Josh Albrecht. (Actually, modify Josh's patch to avoid doing that when you're a bridge relay, since it would leak more than we want to leak.) svn:r15850
This commit is contained in:
parent
53f558decc
commit
267e61d0f3
@ -9,6 +9,13 @@ Changes in version 0.2.1.3-alpha - 2008-07-xx
|
||||
on the client side when connecting to a hidden service. Bugfix
|
||||
on 0.0.6pre1. Found and fixed by Christian Wilms; resolves bug 743.
|
||||
|
||||
o Minor features:
|
||||
- When relays do their initial bandwidth measurement, don't limit
|
||||
to just our our entry guards for the test circuits. Otherwise we
|
||||
tend to have multiple test circuits going through a single entry
|
||||
guard, which makes our bandwidth test less accurate. Fixes part
|
||||
of bug 654; patch contributed by Josh Albrecht.
|
||||
|
||||
o Minor bugfixes:
|
||||
- Change the contrib/tor.logrotate script so it makes the new
|
||||
logs as "_tor:_tor" rather than the default, which is generally
|
||||
|
@ -1621,9 +1621,9 @@ choose_good_entry_server(uint8_t purpose, cpath_build_state_t *state)
|
||||
routerinfo_t *r, *choice;
|
||||
smartlist_t *excluded;
|
||||
or_options_t *options = get_options();
|
||||
(void)purpose; /* not used yet. */
|
||||
|
||||
if (state && options->UseEntryGuards) {
|
||||
if (state && options->UseEntryGuards &&
|
||||
(purpose != CIRCUIT_PURPOSE_TESTING || options->BridgeRelay)) {
|
||||
return choose_random_entry(state);
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user