Future version:
+ - servers might check certs for known-good ssl websites, and if they
+ come back self-signed, declare themselves to be non-exits. similar
+ to how we test for broken/evil dns now.
- we try to build 4 test circuits to break them over different
servers. but sometimes our entry node is the same for multiple
test circuits. this defeats the point.
109 No more than one server per IP address [ACCEPTED]
110 Avoiding infinite length circuits [OPEN]
111 Prioritizing local traffic over relayed traffic [OPEN]
-112 Bring Back Patlen Coin Weight [OPEN]
-113 Simplifying directory authority administration [OPEN]
\ No newline at end of file
+112 Bring Back Pathlen Coin Weight [OPEN]
+113 Simplifying directory authority administration [OPEN]
+
The "fingerprint" field is generated based on the identity key, not
the signing key.
- Consensus network statues change as follows:
+ Consensus network statuses change as follows:
Remove dir-signing-key.
Verification:
- [XXXX write me]
\ No newline at end of file
+ [XXXX write me]
Right now, the tor-ops list is very high volume. There should be another
list that's only for dealing with problems that need prompt action, like
marking a router as !badexit.
+
struct connection_t *linked_conn;
/* XXXX020 NM move these up to the other 1-bit flags. */
unsigned int linked:1; /**< True if there is, or has been, a linked_conn. */
- /** True iff we'd like to be notified about read events from the linked conn.
- */
+ /** True iff we'd like to be notified about read events from the
+ * linked conn. */
unsigned int reading_from_linked_conn:1;
- /** True iff we're willing to write to the linked conn. */
+ /** True iff we're willing to write to the linked conn. */
unsigned int writing_to_linked_conn:1;
/** True iff we're currently able to read on the linked conn, and our
* read_event should be made active with libevent. */
{
/* Maybe we haven't called init_cell_pool yet; need to check for it. */
if (cell_pool) {
- tor_assert(cell_pool);
mp_pool_destroy(cell_pool);
cell_pool = NULL;
}