to just our our entry guards for the test circuits. Otherwise we
tend to have multiple test circuits going through a single entry
guard, which makes our bandwidth test less accurate. Fixes part
of bug 654; patch contributed by Josh Albrecht.
(Actually, modify Josh's patch to avoid doing that when you're
a bridge relay, since it would leak more than we want to leak.)
svn:r15850
on the client side when connecting to a hidden service. Bugfix
on 0.0.6pre1. Found and fixed by Christian Wilms; resolves bug 743.
+ o Minor features:
+ - When relays do their initial bandwidth measurement, don't limit
+ to just our our entry guards for the test circuits. Otherwise we
+ tend to have multiple test circuits going through a single entry
+ guard, which makes our bandwidth test less accurate. Fixes part
+ of bug 654; patch contributed by Josh Albrecht.
+
o Minor bugfixes:
- Change the contrib/tor.logrotate script so it makes the new
logs as "_tor:_tor" rather than the default, which is generally
routerinfo_t *r, *choice;
smartlist_t *excluded;
or_options_t *options = get_options();
- (void)purpose; /* not used yet. */
- if (state && options->UseEntryGuards) {
+ if (state && options->UseEntryGuards &&
+ (purpose != CIRCUIT_PURPOSE_TESTING || options->BridgeRelay)) {
return choose_random_entry(state);
}