[tor-commits] [tor/release-0.2.4] Copy-paste description of PathBias params from man page to or.h comment

arma at torproject.org arma at torproject.org
Sat May 25 03:58:42 UTC 2013


commit a2e72ac04a5eabc17336fb55bd6b3a482448d3a8
Author: Andrea Shepard <andrea at torproject.org>
Date:   Mon May 20 12:46:00 2013 -0700

    Copy-paste description of PathBias params from man page to or.h comment
---
 changes/bug7982 |    3 +++
 src/or/or.h     |   35 +++++++++++++++++++++++++++++++++++
 2 files changed, 38 insertions(+)

diff --git a/changes/bug7982 b/changes/bug7982
new file mode 100644
index 0000000..46aa532
--- /dev/null
+++ b/changes/bug7982
@@ -0,0 +1,3 @@
+  o Minor bugfixes:
+     - Copy-paste description for PathBias params from man page into or.h
+       comment.  Fixes bug 7982.
diff --git a/src/or/or.h b/src/or/or.h
index f2f27ee..ab5e3aa 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -4002,6 +4002,27 @@ typedef struct {
   /**
    * Parameters for path-bias detection.
    * @{
+   * These options override the default behavior of Tor's (**currently
+   * experimental**) path bias detection algorithm. To try to find broken or
+   * misbehaving guard nodes, Tor looks for nodes where more than a certain
+   * fraction of circuits through that guard fail to get built.
+   *
+   * The PathBiasCircThreshold option controls how many circuits we need to
+   * build through a guard before we make these checks.  The
+   * PathBiasNoticeRate, PathBiasWarnRate and PathBiasExtremeRate options
+   * control what fraction of circuits must succeed through a guard so we
+   * won't write log messages.  If less than PathBiasExtremeRate circuits
+   * succeed *and* PathBiasDropGuards is set to 1, we disable use of that
+   * guard.
+   *
+   * When we have seen more than PathBiasScaleThreshold circuits through a
+   * guard, we scale our observations by 0.5 (governed by the consensus) so
+   * that new observations don't get swamped by old ones.
+   *
+   * By default, or if a negative value is provided for one of these options,
+   * Tor uses reasonable defaults from the networkstatus consensus document.
+   * If no defaults are available there, these options default to 150, .70,
+   * .50, .30, 0, and 300 respectively.
    */
   int PathBiasCircThreshold;
   double PathBiasNoticeRate;
@@ -4014,6 +4035,20 @@ typedef struct {
   /**
    * Parameters for path-bias use detection
    * @{
+   * Similar to the above options, these options override the default behavior
+   * of Tor's (**currently experimental**) path use bias detection algorithm.
+   *
+   * Where as the path bias parameters govern thresholds for successfully
+   * building circuits, these four path use bias parameters govern thresholds
+   * only for circuit usage. Circuits which receive no stream usage are not
+   * counted by this detection algorithm. A used circuit is considered
+   * successful if it is capable of carrying streams or otherwise receiving
+   * well-formed responses to RELAY cells.
+   *
+   * By default, or if a negative value is provided for one of these options,
+   * Tor uses reasonable defaults from the networkstatus consensus document.
+   * If no defaults are available there, these options default to 20, .80,
+   * .60, and 100, respectively.
    */
   int PathBiasUseThreshold;
   double PathBiasNoticeUseRate;





More information about the tor-commits mailing list