Hm! I think our definition of 100% bootstrapped is that we made a circuit. Is that so terrible a definition?
What situation is causing us to set DisablePredictedCircuits without a controller generating its own circuits? That is, is this just a pathological config, or is it actually a thing that somebody wants to do?
And lastly, be aware that "80% connecting to tor network" is the initial bootstrap message if you start Tor with enough cached dir info. That is, seeing 80% doesn't mean anything at all in this case about whether the network is plugged in.
Hm! I think our definition of 100% bootstrapped is that we made a circuit. Is that so terrible a definition?
It's an excellent definition. But we require 100% bootstrapped to make circuits in some configs, so it's a circular dependency (on hidden/onion services, and without predicted circuits). Perhaps a solution is to make introduction point connections dependent on 80%, not 100%? (This would also fix the scenario where each type of predicted circuit is disabled individually by a specific option.)
What situation is causing us to set DisablePredictedCircuits without a controller generating its own circuits? That is, is this just a pathological config, or is it actually a thing that somebody wants to do?
It's useful for load-balancing hidden/onion service configurations like (Rendezvous) Single Onion Services (RSOS - #17178 (moved), SOS - prop#252), where (almost) every connection is one-hop, and several hundred tor instances might be running. In this case, predicted circuits will never be used (except for descriptor uploads, and not every instance uploads descriptors due to OnionBalance). Predicted circuits represent unnecessary load on the server and network in this case.
And lastly, be aware that "80% connecting to tor network" is the initial bootstrap message if you start Tor with enough cached dir info. That is, seeing 80% doesn't mean anything at all in this case about whether the network is plugged in.
Indeed. I was using chutney on localhost, and it worked without !__DisablePredictedCircuits set, so I know the network was plugged in and chutney was working.
It is impossible that we will fix all 226 currently open 028 tickets before 028 releases. Time to move some out. This is my second pass through the "new" and tickets, looking for things to move to 0.2.9.
Trac: Milestone: Tor: 0.2.8.x-final to Tor: 0.2.9.x-final
This is related to #21073 (moved), where PredictedPortsRelevanceTime 0 eventually causes a tor hidden service to stop updating its descriptor. The root cause is that tor relies on predicted circuits to generate network activity, and network activity causes tor to perform certain actions on a regular basis.
LongLivedPortsPredictedPortsRelevanceTime 0 secondsLearnCircuitBuildTimeout 0}}}But there's no option to reduce the number of hidden service server preemptive circuits (see #17360).
In #17592 (moved) in Tor 0.3.1.1-alpha, we replaced PredictedPortsRelevanceTime and CircuitIdleTimeout with CircuitsAvailableTimeout.
So the current workaround is:
{{{
LongLivedPorts
LearnCircuitBuildTimeout 0
and
PredictedPortsRelevanceTime 0 seconds
or
CircuitsAvailableTimeout (a small timeout? a large timeout?)
We can't disable predicted ports separately any more, which is annoying.
My first thought is that we should distinguish between "predicted" circuits, meaning circuits that are made for the purpose of having extra clean circuits sitting around if we need them, and other kinds of circuits, such as the ones we use to see if we can connect to the network.
And we should do all of the other things that we need circuits for, even if 'predicted' circuits are disabled.