Yawning: The futueproof thing would be to warn if the selected protocol limits the number of guards to < N% probably?
Using what a dual stack host can reach as the baseline.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
It's worth noting that the code to allow IPv6 guards was introduced in a previous tor version.
Trac: Description: ```
Yawning: The futueproof thing would be to warn if the selected protocol limits the number of guards to < N% probably?
Using what a dual stack host can reach as the baseline.
**to** Yawning: The futueproof thing would be to warn if the selected protocol limits the number of guards to < N% probably?Using what a dual stack host can reach as the baseline.
We can use the current proportion of relays on IPv4 ORPort 443 / DirPort 80 as a guide - these relays are accessible from clients with FascistFirewall set.
I think we can defer this, because IPv6 client support is experimental, and requires explicit user action to enable. But I'd happily review a patch for it, or write one if I had the time.
It will be easy to write a patch for this once #17840 (moved) is merged.