The fallback directory mirrors are randomly selected based on a hard-coded weight. This weight is based on their consensus weight at the time the list of mirrors was created. (We exclude low-weight mirrors, and reduce the weights of some high-weight mirrors so they don't see too many client requests.)
The fallbacks are used for the initial consensus download, and a connection is tried as soon as tor starts up. So they're always being used. The standard tor bootstrap events are issued to any controllers during bootstrap, regardless of whether the initial consensus is downloaded from an authority or a fallback. The info-level logs look something like this:
78.47.18.110 (and the fingerprint) are a randomly-selected hard-coded fallback directory mirror IP addresses and fingerprint. Tor will try several fallbacks, then try an authority. It doesn't wait for the first connection to timeout before trying another fallback or authority. It downloads the consensus from the first fallback or authority it can successfully connect to, and closes all the other connections. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F |
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev