mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
Update manpage.
This commit is contained in:
parent
08da247042
commit
43a00877cf
@ -1183,12 +1183,18 @@ The following options are useful only for clients (that is, if
|
||||
|
||||
**PathBiasMultFactor** __NUM__ +
|
||||
|
||||
**PathBiasScaleFactor** __NUM__::
|
||||
**PathBiasScaleFactor** __NUM__ +
|
||||
|
||||
**PathBiasUseCloseCounts** __NUM__::
|
||||
These options override the default behavior of Tor's (**currently
|
||||
experimental**) path bias detection algorithm. To try to find broken or
|
||||
misbehaving guard nodes, Tor looks for nodes where more than a certain
|
||||
fraction of circuits through that node fail after the first hop. The
|
||||
PathBiasCircThreshold option controls how many circuits we need to build
|
||||
fraction of circuits through that guard fail to get built. If
|
||||
PathBiasUseCloseCounts is set to 1 (the default), usage-based accounting is
|
||||
performed, and circuits that fail to carry streams are also counted as
|
||||
failures. +
|
||||
+
|
||||
The PathBiasCircThreshold option controls how many circuits we need to build
|
||||
through a guard before we make these checks. The PathBiasNoticeRate,
|
||||
PathBiasWarnRate and PathBiasExtremeRate options control what fraction of
|
||||
circuits must succeed through a guard so we won't write log messages.
|
||||
|
Loading…
Reference in New Issue
Block a user