diff options
author | Roger Dingledine <arma@torproject.org> | 2004-07-13 07:42:20 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2004-07-13 07:42:20 +0000 |
commit | 86e0ede07eb24aa8e74f5b27bec204d10d5e9fe5 (patch) | |
tree | b922897299f5b5a8176221324cd7f1ebb1cf6156 | |
parent | 017d7d1fb3f03cc421186c92bfb2e1350b4b7c0b (diff) | |
download | tor-86e0ede07eb24aa8e74f5b27bec204d10d5e9fe5.tar tor-86e0ede07eb24aa8e74f5b27bec204d10d5e9fe5.tar.gz |
checkpoint: start working on bandwidth tracking and
letting clients evaluate whether they're suitable servers
svn:r2037
-rw-r--r-- | src/or/config.c | 5 | ||||
-rw-r--r-- | src/or/connection.c | 14 | ||||
-rw-r--r-- | src/or/main.c | 79 | ||||
-rw-r--r-- | src/or/or.h | 1 | ||||
-rw-r--r-- | src/or/rephist.c | 48 |
5 files changed, 123 insertions, 24 deletions
diff --git a/src/or/config.c b/src/or/config.c index 03d886521..e9068bd2d 100644 --- a/src/or/config.c +++ b/src/or/config.c @@ -193,6 +193,7 @@ static int config_assign(or_options_t *options, struct config_line_t *list) { config_compare(list, "BandwidthRate", CONFIG_TYPE_INT, &options->BandwidthRate) || config_compare(list, "BandwidthBurst", CONFIG_TYPE_INT, &options->BandwidthBurst) || + config_compare(list, "ClientOnly", CONFIG_TYPE_BOOL, &options->ClientOnly) || config_compare(list, "ContactInfo", CONFIG_TYPE_STRING, &options->ContactInfo) || config_compare(list, "DebugLogFile", CONFIG_TYPE_STRING, &options->DebugLogFile) || @@ -678,6 +679,10 @@ int getconfig(int argc, char **argv, or_options_t *options) { result = -1; } + /* XXX008 if AuthDir and !ORPort then fail */ + + /* XXX008 if AuthDir and ClientOnly then fail */ + if(options->SocksPort > 1 && (options->PathlenCoinWeight < 0.0 || options->PathlenCoinWeight >= 1.0)) { log(LOG_WARN,"PathlenCoinWeight option must be >=0.0 and <1.0."); diff --git a/src/or/connection.c b/src/or/connection.c index 0128cf93f..7bfd20f31 100644 --- a/src/or/connection.c +++ b/src/or/connection.c @@ -820,10 +820,12 @@ int connection_outbuf_too_full(connection_t *conn) { */ int connection_handle_write(connection_t *conn) { int e, len=sizeof(e); + int result; + time_t now = time(NULL); tor_assert(!connection_is_listener(conn)); - conn->timestamp_lastwritten = time(NULL); + conn->timestamp_lastwritten = now; /* Sometimes, "writeable" means "connected". */ if (connection_state_is_connecting(conn)) { @@ -859,7 +861,8 @@ int connection_handle_write(connection_t *conn) { } /* else open, or closing */ - switch(flush_buf_tls(conn->tls, conn->outbuf, &conn->outbuf_flushlen)) { + result = flush_buf_tls(conn->tls, conn->outbuf, &conn->outbuf_flushlen); + switch(result) { case TOR_TLS_ERROR: case TOR_TLS_CLOSE: log_fn(LOG_INFO,"tls error. breaking."); @@ -888,7 +891,8 @@ int connection_handle_write(connection_t *conn) { */ } } else { - if (flush_buf(conn->s, conn->outbuf, &conn->outbuf_flushlen) < 0) { + result = flush_buf(conn->s, conn->outbuf, &conn->outbuf_flushlen); + if (result < 0) { connection_close_immediate(conn); /* Don't flush; connection is dead. */ conn->has_sent_end = 1; connection_mark_for_close(conn); @@ -896,6 +900,10 @@ int connection_handle_write(connection_t *conn) { } } + if(result > 0) { /* remember it */ + rep_hist_note_bytes_written(result, now); + } + if(!connection_wants_to_flush(conn)) { /* it's done flushing */ if(connection_finished_flushing(conn) < 0) { /* already marked */ diff --git a/src/or/main.c b/src/or/main.c index 4a6a2703d..87f4e39b0 100644 --- a/src/or/main.c +++ b/src/or/main.c @@ -366,16 +366,14 @@ static void run_connection_housekeeping(int i, time_t now) { return; } - /* check connections to see whether we should send a keepalive, expire, or wait */ - if(!connection_speaks_cells(conn)) - return; - /* If we haven't written to an OR connection for a while, then either nuke the connection or send a keepalive, depending. */ - if(now >= conn->timestamp_lastwritten + options.KeepalivePeriod) { + if(connection_speaks_cells(conn) && + now >= conn->timestamp_lastwritten + options.KeepalivePeriod) { if((!options.ORPort && !circuit_get_by_conn(conn)) || (!connection_state_is_open(conn))) { - /* we're an onion proxy, with no circuits; or our handshake has expired. kill it. */ + /* we're an onion proxy, with no circuits; + * or our handshake has expired. kill it. */ log_fn(LOG_INFO,"Expiring connection to %d (%s:%d).", i,conn->address, conn->port); /* flush anything waiting, e.g. a destroy for a just-expired circ */ @@ -392,6 +390,36 @@ static void run_connection_housekeeping(int i, time_t now) { } } +#define MIN_BW_TO_PUBLISH_DESC 5000 /* 5000 bytes sustained */ +#define MIN_UPTIME_TO_PUBLISH_DESC (30*60) /* half an hour */ + +/** Decide if we're a server or just a client. We are a server if: + * - We have the AuthoritativeDirectory option set. + * or + * - We don't have the ClientOnly option set; and + * - We have ORPort set; and + * - We have been up for at least MIN_UPTIME_TO_PUBLISH_DESC seconds; and + * - We have processed some suitable minimum bandwidth recently; and + * - We believe we are reachable from the outside. + */ +static int decide_if_server(time_t now) { + + if(options.AuthoritativeDir) + return 1; + if(options.ClientOnly) + return 0; + if(!options.ORPort) + return 0; + + /* here, determine if we're reachable */ + + if(stats_n_seconds_uptime < MIN_UPTIME_TO_PUBLISH_DESC) + return 0; + if(rep_hist_bandwidth_assess(now) < MIN_BW_TO_PUBLISH_DESC) + return 0; + return 1; +} + /** Perform regular maintenance tasks. This function gets run once per * second by prepare_for_poll. */ @@ -401,7 +429,6 @@ static void run_scheduled_events(time_t now) { static time_t last_rotated_certificate = 0; int i; - /** 1a. Every MIN_ONION_KEY_LIFETIME seconds, rotate the onion keys, * shut down and restart all cpuworkers, and update the directory if * necessary. @@ -430,37 +457,42 @@ static void run_scheduled_events(time_t now) { * XXXX them at all. */ } - /** 1c. Every DirFetchPostPeriod seconds, we get a new directory and upload - * our descriptor (if any). */ + /** 2. Every DirFetchPostPeriod seconds, we get a new directory and upload + * our descriptor (if we've passed our internal checks). */ if(time_to_fetch_directory < now) { - /* it's time to fetch a new directory and/or post our descriptor */ - if(options.ORPort) { + + if(decide_if_server(now)) { router_rebuild_descriptor(); router_upload_dir_desc_to_dirservers(); } + routerlist_remove_old_routers(); /* purge obsolete entries */ + if(options.AuthoritativeDir) { /* We're a directory; dump any old descriptors. */ dirserv_remove_old_servers(); /* dirservers try to reconnect too, in case connections have failed */ router_retry_connections(); } + directory_get_from_dirserver(DIR_PURPOSE_FETCH_DIR, NULL, 0); - /* Force an upload of our descriptors every DirFetchPostPeriod seconds. */ + + /* Force an upload of our rend descriptors every DirFetchPostPeriod seconds. */ rend_services_upload(1); last_uploaded_services = now; rend_cache_clean(); /* should this go elsewhere? */ + time_to_fetch_directory = now + options.DirFetchPostPeriod; } - /** 2. Every second, we examine pending circuits and prune the + /** 3a. Every second, we examine pending circuits and prune the * ones which have been pending for more than a few seconds. * We do this before step 3, so it can try building more if * it's not comfortable with the number of available circuits. */ circuit_expire_building(now); - /** 2b. Also look at pending streams and prune the ones that 'began' + /** 3b. Also look at pending streams and prune the ones that 'began' * a long time ago but haven't gotten a 'connected' yet. * Do this before step 3, so we can put them back into pending * state to be picked up by the new circuit. @@ -468,11 +500,11 @@ static void run_scheduled_events(time_t now) { connection_ap_expire_beginning(); - /** 2c. And expire connections that we've held open for too long. + /** 3c. And expire connections that we've held open for too long. */ connection_expire_held_open(); - /** 3. Every second, we try a new circuit if there are no valid + /** 4. Every second, we try a new circuit if there are no valid * circuits. Every NewCircuitPeriod seconds, we expire circuits * that became dirty more than NewCircuitPeriod seconds ago, * and we make a new circ if there are no clean circuits. @@ -480,22 +512,22 @@ static void run_scheduled_events(time_t now) { if(has_fetched_directory) circuit_build_needed_circs(now); - /** 4. We do housekeeping for each connection... */ + /** 5. We do housekeeping for each connection... */ for(i=0;i<nfds;i++) { run_connection_housekeeping(i, now); } - /** 5. And remove any marked circuits... */ + /** 6. And remove any marked circuits... */ circuit_close_all_marked(); - /** 6. And upload service descriptors for any services whose intro points + /** 7. And upload service descriptors for any services whose intro points * have changed in the last second. */ if (last_uploaded_services < now-5) { rend_services_upload(0); last_uploaded_services = now; } - /** 7. and blow away any connections that need to die. have to do this now, + /** 8. and blow away any connections that need to die. have to do this now, * because if we marked a conn for close and left its socket -1, then * we'll pass it to poll/select and bad things will happen. */ @@ -510,6 +542,7 @@ static void run_scheduled_events(time_t now) { static int prepare_for_poll(void) { static long current_second = 0; /* from previous calls to gettimeofday */ connection_t *conn; + int bytes_read; struct timeval now; int i; @@ -517,8 +550,12 @@ static int prepare_for_poll(void) { /* Check how much bandwidth we've consumed, and increment the token * buckets. */ - stats_n_bytes_read += stats_prev_global_read_bucket-global_read_bucket; + bytes_read = stats_prev_global_read_bucket - global_read_bucket; + stats_n_bytes_read += bytes_read; connection_bucket_refill(&now); + if (bytes_read > 0) { + rep_hist_note_bytes_read(bytes_read, now.tv_sec); + } stats_prev_global_read_bucket = global_read_bucket; if(now.tv_sec > current_second) { /* the second has rolled over. check more stuff. */ diff --git a/src/or/or.h b/src/or/or.h index ac72b3322..61ed9a5a2 100644 --- a/src/or/or.h +++ b/src/or/or.h @@ -840,6 +840,7 @@ typedef struct { int SocksPort; /**< Port to listen on for SOCKS connections. */ int DirPort; /**< Port to listen on for directory connections. */ int AuthoritativeDir; /**< Boolean: is this an authoritative directory? */ + int ClientOnly; /**< Boolean: should we never evolve into a server role? */ int MaxConn; /**< Maximum number of simultaneous connections. */ int TrafficShaping; /**< Unused. */ int LinkPadding; /**< Unused. */ diff --git a/src/or/rephist.c b/src/or/rephist.c index 418fc8dd6..0e1471421 100644 --- a/src/or/rephist.c +++ b/src/or/rephist.c @@ -287,6 +287,54 @@ void write_rep_history(const char *filename) } #endif +#define NUM_SECS_ROLLING_MEASURE 10 +#define NUM_SECS_BW_SUM_IS_VALID (12*60*60) /* half a day */ + +/** We read <b>num_bytes</b> more bytes in second <b>when</b>. + * + * Add num_bytes to the current running total for <b>when</b>. + * + * <b>when</b> can go back to time, but it's safe to ignore calls + * earlier that the latest <b>when</b> you've heard of. + */ +void rep_hist_note_bytes_written(int num_bytes, time_t when) { +/* Maybe a circular array for recent seconds, and step to a new point + * every time a new second shows up. Or simpler is to just to have + * a normal array and push down each item every second; it's short. + */ +/* When a new second has rolled over, compute the sum of the bytes we've + * seen over when-1 to when-1-NUM_SECS_ROLLING_MEASURE, and stick it + * somewhere. See rep_hist_bandwidth_assess() below. + */ + +} + +/** We wrote <b>num_bytes</b> more bytes in second <b>when</b>. + * (like rep_hist_note_bytes_written() above) + */ +void rep_hist_note_bytes_read(int num_bytes, time_t when) { +/* if we're smart, we can make this func and the one above share code */ +} + +/** + * Find the largest sums in the past NUM_SECS_BW_SUM_IS_VALID (roughly) + * seconds. Find one sum for reading and one for writing. They don't have + * to be at the same time). + * + * Return the smaller of these sums, divided by NUM_SECS_ROLLING_MEASURE. + */ +int rep_hist_bandwidth_assess(time_t when) { +/* To get a handle on space complexity, I promise I will call this + * function at most every options.DirFetchPostPeriod seconds. So in + * rep_hist_note_bytes_foo() above, you could keep a running max sum + * for the current period, and when the period ends you can tuck it away + * in a circular array of more managable size. We lose a bit of precision, + * but this is all guesswork anyway. + */ + + return 0; +} + /* Local Variables: mode:c |