[tor-bugs] #2334 [Torouter]: Torouter breaks with large cached-descriptors[.new] files
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Wed Jan 12 13:53:45 UTC 2011
#2334: Torouter breaks with large cached-descriptors[.new] files
----------------------+-----------------------------------------------------
Reporter: karsten | Owner: ioerror
Type: defect | Status: new
Priority: blocker | Milestone:
Component: Torouter | Version: Tor: 0.2.1.26
Keywords: | Parent:
----------------------+-----------------------------------------------------
Comment(by karsten):
Replying to [comment:4 nickm]:
> Do we already store last-time-mentioned information for descriptors? If
not, we could maybe start, and implement a "remember as many as we have
room for, from most recently mentioned to least recently mentioned"
policy.
I spent quite some time reading Tor sources and learned a lot of
interesting stuff. :) But I can't seem to find where we would learn last-
time-mentioned information for descriptors. Do you have a hint?
> Another way to approach this is looking at our current logic for
rebuilding the store. If it is big enough (over 64K), we rebuild it
whenever the journal length is more than half the store length, OR the
number of bytes we know have dropped from the store is at least half the
store length.
I don't understand the 64K constant here. Is that bytes? That's pretty
low and rather meant as a safeguard that we don't rebuild the store after
the first few descriptors, right? With cached-descriptors[.new] files of
17M and 5M, we always end up in the if-case, correct?
From the logs of my directory cache it looks like we're rebuilding our
router store 2 or 3 times a day.
Also, I found that we're storing descriptors for up to 2 days as clients
and up to 5 days as directory caches. Maybe we can reduce this to 2 days
for bridges?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2334#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list