aboutsummaryrefslogtreecommitdiff
path: root/spec/path-spec/detecting-route-manipulation.md
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2023-11-06 09:47:20 -0500
committerNick Mathewson <nickm@torproject.org>2023-11-06 09:47:20 -0500
commit8a37a5e8b1b823f789043ed171f5164d3d31466a (patch)
tree0677053b97f5211cde79d48c07bbdd94ac974160 /spec/path-spec/detecting-route-manipulation.md
parent0aac4f216ce3a5f9a0064b7f71a6bd78deb7b270 (diff)
downloadtorspec-8a37a5e8b1b823f789043ed171f5164d3d31466a.tar.gz
torspec-8a37a5e8b1b823f789043ed171f5164d3d31466a.zip
path-spec: replace most section-number-based links.
Diffstat (limited to 'spec/path-spec/detecting-route-manipulation.md')
-rw-r--r--spec/path-spec/detecting-route-manipulation.md18
1 files changed, 11 insertions, 7 deletions
diff --git a/spec/path-spec/detecting-route-manipulation.md b/spec/path-spec/detecting-route-manipulation.md
index 48cf4f7..76be4d1 100644
--- a/spec/path-spec/detecting-route-manipulation.md
+++ b/spec/path-spec/detecting-route-manipulation.md
@@ -29,9 +29,10 @@ and one during circuit usage.
The intended behavior is for clients to ultimately disable the use
of Guards responsible for excessive circuit failure of either type
-(see section 7.4); however known issues with the Tor network currently
-restrict the defense to being informational only at this stage (see
-section 7.5).
+(for the parameters to do this, see ["Parameterization"](#parameters) below);
+however known issues with the Tor network currently
+restrict the defense to being informational only at this stage
+(see ["Known barriers to enforcement"](#barriers)).
<a id="path-spec.txt-7.1"></a>
@@ -43,9 +44,10 @@ guard, and a count of the number of circuits that successfully complete
through that guard. The ratio of these two numbers is used to determine
a circuit success rate for that Guard.
-Circuit build timeouts are counted as construction failures if the
+[Circuit build timeouts](./learning-timeouts.md)
+are counted as construction failures if the
circuit fails to complete before the 95% "right-censored" timeout
-interval, not the 80% timeout condition (see section 2.4).
+interval, not the 80% timeout condition.
If a circuit closes prematurely after construction but before being
requested to close by the client, this is counted as a failure.
@@ -151,7 +153,8 @@ defense.
Default: 300
Min: 10
Effect: After this many circuits have completed at least two hops,
- Tor performs the scaling described in Section 7.3.
+ Tor performs the scaling described in
+ ["Scaling success counts"](#scaling).
pb_multfactor and pb_scalefactor
Default: 1/2
@@ -184,7 +187,8 @@ defense.
Default: 100
Min: 10
Effect: After we have attempted to use this many circuits,
- Tor performs the scaling described in Section 7.3.
+ Tor performs the scaling described in
+ ["Scaling success counts"](#scaling).
```
<a id="path-spec.txt-7.5"></a>