[tor-bugs] #16723 [Tor]: randomize HH:MM in AccountingStart for a more even distribution of hibernating relay resources

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Aug 6 21:01:16 UTC 2015


#16723: randomize HH:MM in AccountingStart for a more even distribution of
hibernating relay resources
-----------------------------+-------------------------------
     Reporter:  cypherpunks  |      Owner:
         Type:  enhancement  |     Status:  needs_information
     Priority:  normal       |  Milestone:
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-------------------------------

Comment (by cypherpunks):

 Replying to [comment:10 teor]:
 > If the estimate is inaccurate, why not try to fix the estimate, at least
 as a first step?
 > Have we confirmed that the estimate is inaccurate on a consistent basis?
 >
 > Given that the bandwidth authorities are currently thrashing about, that
 could be causing the inaccuracy at the moment.
 >
 > I agree that randomising the lower-order components of the period would
 mitigate the thundering herd wake issue, but 100/5000 relays is not really
 a herd.
 >
 > So we'd have to decide whether the unpredictable behaviour would be
 worthwhile, and outweigh the existing assumption of a 00:00 interval start
 time.
 >
 > When I configured hibernation, I depended on the fact that the
 changeover time was 00:00, as that was the time that the VPS' free quota
 was reset.
 >
 > Changing the behaviour for existing configs would be a really bad idea,
 if it led to people exceeding their quotas due to unpredictable interval
 start times, where those start times overlapped poorly with the charging
 intervals on the VPS.
 >
 > (For example, if 11:39 was chosen at random, I could have had almost two
 periods' worth of usage in the one charging period, if the wake time was
 late one day, and early the next. This would have been expensive for me.)

 When using the suggested method (random value generated by the relay once)
 then this problem does not occur, right?

 Anyway I'll just write a short email to tor-relays and we can close this
 ticket.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16723#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list