aboutsummaryrefslogtreecommitdiff
path: root/src/or/entrynodes.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2013-02-14 12:06:59 -0500
committerNick Mathewson <nickm@torproject.org>2013-02-14 12:06:59 -0500
commit1070a720ad7f45fa82b77be0512056a06e535b72 (patch)
tree2ff76f12390f5f7c88b1b62080ebe73b5e58873c /src/or/entrynodes.c
parent91027218e29090b18d42e1868367cc2a9e149900 (diff)
downloadtor-1070a720ad7f45fa82b77be0512056a06e535b72.tar
tor-1070a720ad7f45fa82b77be0512056a06e535b72.tar.gz
Be more robust when excluding existing nodes as new dirguards
In addition to rejecting them post-hoc, avoid picking them in the first place. This makes us less likely to decide that we can't add guards at all.
Diffstat (limited to 'src/or/entrynodes.c')
-rw-r--r--src/or/entrynodes.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/or/entrynodes.c b/src/or/entrynodes.c
index 3e471ed01..5dd27905d 100644
--- a/src/or/entrynodes.c
+++ b/src/or/entrynodes.c
@@ -362,7 +362,7 @@ add_an_entry_guard(const node_t *chosen, int reset_status, int prepend,
} else {
const routerstatus_t *rs;
rs = router_pick_directory_server(MICRODESC_DIRINFO|V3_DIRINFO,
- PDS_PREFER_TUNNELED_DIR_CONNS_);
+ PDS_PREFER_TUNNELED_DIR_CONNS_|PDS_FOR_GUARD);
if (!rs)
return NULL;
node = node_get_by_id(rs->identity_digest);