]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Raise the minimum bandwidth to be a relay from 20000 bytes to 20480
authorRoger Dingledine <arma@torproject.org>
Sun, 12 Apr 2009 07:56:58 +0000 (07:56 +0000)
committerRoger Dingledine <arma@torproject.org>
Sun, 12 Apr 2009 07:56:58 +0000 (07:56 +0000)
bytes (aka 20KB/s), to match our documentation. Also update
directory authorities so they always assign the Fast flag to relays
with 20KB/s of capacity. Now people running relays won't suddenly
find themselves not seeing any use, if the network gets faster
on average.

svn:r19305

ChangeLog
src/or/config.c
src/or/dirserv.c
src/or/or.h

index a2e2ff66aabfb6e81868885896bdb2dd5b83a752..465cbd6800fb58206e332d23469b0d4fbbff5c48 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,4 +1,4 @@
-Changes in version 0.2.1.14-rc - 2009-04-11
+Changes in version 0.2.1.14-rc - 2009-04-12
   o Major features:
     - Clients replace entry guards that were chosen more than a few months
       ago. This change should significantly improve client performance,
@@ -30,6 +30,12 @@ Changes in version 0.2.1.14-rc - 2009-04-11
     - If the bridge config line doesn't specify a port, assume 443.
       This makes bridge lines a bit smaller and easier for users to
       understand.
+    - Raise the minimum bandwidth to be a relay from 20000 bytes to 20480
+      bytes (aka 20KB/s), to match our documentation. Also update
+      directory authorities so they always assign the Fast flag to relays
+      with 20KB/s of capacity. Now people running relays won't suddenly
+      find themselves not seeing any use, if the network gets faster
+      on average.
 
   o Minor bugfixes:
     - Avoid trying to print raw memory to the logs when we decide to
index 06fab71a53439e463ef2dc4f170932862426cb65..aa61ecf9a56367de74dc4254640e345f496a8c96 100644 (file)
@@ -3271,21 +3271,21 @@ options_validate(or_options_t *old_options, or_options_t *options,
     return -1;
 
   if (server_mode(options)) {
-    if (options->BandwidthRate < ROUTER_REQUIRED_MIN_BANDWIDTH*2) {
+    if (options->BandwidthRate < ROUTER_REQUIRED_MIN_BANDWIDTH) {
       r = tor_snprintf(buf, sizeof(buf),
                        "BandwidthRate is set to %d bytes/second. "
                        "For servers, it must be at least %d.",
                        (int)options->BandwidthRate,
-                       ROUTER_REQUIRED_MIN_BANDWIDTH*2);
+                       ROUTER_REQUIRED_MIN_BANDWIDTH);
       *msg = tor_strdup(r >= 0 ? buf : "internal error");
       return -1;
     } else if (options->MaxAdvertisedBandwidth <
-               ROUTER_REQUIRED_MIN_BANDWIDTH) {
+               ROUTER_REQUIRED_MIN_BANDWIDTH/2) {
       r = tor_snprintf(buf, sizeof(buf),
                        "MaxAdvertisedBandwidth is set to %d bytes/second. "
                        "For servers, it must be at least %d.",
                        (int)options->MaxAdvertisedBandwidth,
-                       ROUTER_REQUIRED_MIN_BANDWIDTH);
+                       ROUTER_REQUIRED_MIN_BANDWIDTH/2);
       *msg = tor_strdup(r >= 0 ? buf : "internal error");
       return -1;
     }
index 42b7b03d6a09c96c20c776435dea48a78218eaba..9fc30154e342986c0ec439af85c8d1c2dda385f6 100644 (file)
@@ -1633,7 +1633,7 @@ should_generate_v2_networkstatus(void)
 #define MTBF_TO_GUARANTEE_STABLE (60*60*24*5)
 /** Similarly, we protect sufficiently fast nodes from being pushed
  * out of the set of Fast nodes. */
-#define BANDWIDTH_TO_GUARANTEE_FAST (100*1024)
+#define BANDWIDTH_TO_GUARANTEE_FAST ROUTER_REQUIRED_MIN_BANDWIDTH
 /** Similarly, every node with sufficient bandwidth can be considered
  * for Guard status. */
 #define BANDWIDTH_TO_GUARANTEE_GUARD (250*1024)
@@ -1814,7 +1814,7 @@ dirserv_compute_performance_thresholds(routerlist_t *rl)
     /* The 12.5th percentile bandwidth is fast. */
     fast_bandwidth = find_nth_uint32(bandwidths, n_active, n_active/8);
     /* (Now bandwidths is sorted.) */
-    if (fast_bandwidth < ROUTER_REQUIRED_MIN_BANDWIDTH)
+    if (fast_bandwidth < ROUTER_REQUIRED_MIN_BANDWIDTH/2)
       fast_bandwidth = bandwidths[n_active/4];
     guard_bandwidth_including_exits = bandwidths[(n_active-1)/2];
     guard_tk = find_nth_long(tks, n_active, n_active/8);
index 30d44bc52bf22fc827af0dbde6d73af4f3ea69e6..aa3824a3dcf0d29b37d7b227c5bb45985ceaa8da 100644 (file)
@@ -4289,7 +4289,7 @@ typedef struct trusted_dir_server_t {
                                **/
 } trusted_dir_server_t;
 
-#define ROUTER_REQUIRED_MIN_BANDWIDTH 10000
+#define ROUTER_REQUIRED_MIN_BANDWIDTH (20*1024)
 
 #define ROUTER_MAX_DECLARED_BANDWIDTH INT32_MAX