|
@@ -1242,16 +1242,11 @@ The following options are useful only for clients (that is, if
|
|
|
|
|
|
**PathBiasMultFactor** __NUM__ +
|
|
|
|
|
|
-**PathBiasScaleFactor** __NUM__ +
|
|
|
-
|
|
|
-**PathBiasUseCloseCounts** __NUM__::
|
|
|
+**PathBiasScaleFactor** __NUM__::
|
|
|
These options override the default behavior of Tor's (**currently
|
|
|
experimental**) path bias detection algorithm. To try to find broken or
|
|
|
misbehaving guard nodes, Tor looks for nodes where more than a certain
|
|
|
- fraction of circuits through that guard fail to get built. If
|
|
|
- PathBiasUseCloseCounts is set to 1 (the default), usage-based accounting is
|
|
|
- performed, and circuits that fail to carry streams are also counted as
|
|
|
- failures. +
|
|
|
+ fraction of circuits through that guard fail to get built.
|
|
|
+
|
|
|
The PathBiasCircThreshold option controls how many circuits we need to build
|
|
|
through a guard before we make these checks. The PathBiasNoticeRate,
|
|
@@ -1270,6 +1265,28 @@ The following options are useful only for clients (that is, if
|
|
|
If no defaults are available there, these options default to 150, .70,
|
|
|
.50, .30, 0, 300, 1, and 2 respectively.
|
|
|
|
|
|
+**PathBiasUseThreshold** __NUM__ +
|
|
|
+
|
|
|
+**PathBiasNoticeUseRate** __NUM__ +
|
|
|
+
|
|
|
+**PathBiasExtremeUseRate** __NUM__ +
|
|
|
+
|
|
|
+**PathBiasScaleUseThreshold** __NUM__::
|
|
|
+ Similar to the above options, these options override the default behavior
|
|
|
+ of Tor's (**currently experimental**) path use bias detection algorithm.
|
|
|
+ +
|
|
|
+ Where as the path bias parameters govern thresholds for successfully
|
|
|
+ building circuits, these four path use bias parameters govern thresholds
|
|
|
+ only for circuit usage. Circuits which receive no stream usage
|
|
|
+ are not counted by this detection algorithm. A used circuit is considered
|
|
|
+ successful if it is capable of carrying streams or otherwise receiving
|
|
|
+ well-formed responses to RELAY cells.
|
|
|
+ +
|
|
|
+ By default, or if a negative value is provided for one of these options,
|
|
|
+ Tor uses reasonable defaults from the networkstatus consensus document.
|
|
|
+ If no defaults are available there, these options default to 20, .90,
|
|
|
+ .70, and 100, respectively.
|
|
|
+
|
|
|
**ClientUseIPv6** **0**|**1**::
|
|
|
If this option is set to 1, Tor might connect to entry nodes over
|
|
|
IPv6. Note that clients configured with an IPv6 address in a
|