[tor-bugs] #16861 [Tor]: Pad Tor connections to collapse netflow records
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Aug 27 23:51:10 UTC 2015
#16861: Pad Tor connections to collapse netflow records
-----------------------------+----------------------------
Reporter: mikeperry | Owner: mikeperry
Type: enhancement | Status: needs_revision
Priority: normal | Milestone:
Component: Tor | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-----------------------------+----------------------------
Changes (by mikeperry):
* status: needs_review => needs_revision
Comment:
FYI: My questions above still stand, but the following additional issues
make me think that 0.2.8.x is a better target for this:
1. Predictive circuit building is causing otherwise unused connections to
live far longer than I expected in many cases (1.25-1.5 hours). This means
that the overhead is more like 500KB per connection in the worst case, and
even with ReducedConnectionPadding, 330KB in the worst case. I think that
much overhead for mobile is not acceptable without allowing users to opt-
out.
2. This probably also means we want the ability for clients to tell relays
not to pad, or pad less, in case we discover that mobile connections
should still live a long time, but pad less overall.
3. I think all of this does mean we want statistics on average ORconn
lifespan (issue 7 in comment:18), as well as stats on avg per-orconn
padding, as this will help us tune the defense.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:19>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list