[tor-bugs] #16992 [Tor]: "[warn] Failure from drain_fd" in Tor v0.2.7.2-alpha (git-36c0ae6f7834af16) running on Windows XP
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Sep 7 10:20:59 UTC 2015
#16992: "[warn] Failure from drain_fd" in Tor v0.2.7.2-alpha (git-36c0ae6f7834af16)
running on Windows XP
-------------------------+--------------------------------
Reporter: TORques | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.7.x-final
Component: Tor | Version: Tor: 0.2.7.2-alpha
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-------------------------+--------------------------------
Comment (by yawning):
This is rapidly getting to be tech support-ish, but I'll write one more
reply.
Replying to [comment:8 TORques]:
> Thanks for your replay. My router/relay can handle a large number of
simultaneous connections (tcpsys changed to 256 connections). I just built
the latest tor from your github and I see the modified message related to
"Failure from drain_fd"
I hope the 256 isn't the upper limit.
Speaking purely in terms of theory, relays that can't handle having 1
connection open to every single other relay in the Tor network
simultaneously are bad for the network, since at some point a client will
request a circuit that spans that pair of relays. If this connection fails
due to resource limitations (router/os/whatever), that has a impact on the
client's path selection and hurts anonymity.
In practice, the actual number is somewhat lower, but I do not have a good
estimate for it, beyond "I seem to recall hearing a number that was much
higher than 256 for a busy relay" (See #16997 for "we should collect stats
on this number").
> {{{
> Sep 07 12:34:25.000 [notice] Tor 0.2.7.2-alpha-dev opening new log file.
> Sep 07 12:34:25.781 [notice] Tor v0.2.7.2-alpha-dev running on Windows
XP with Libevent 2.0.22-stable, OpenSSL 1.0.2d and Zlib 1.2.8.
> Sep 07 12:34:27.000 [notice] This version of Tor (0.2.7.2-alpha-dev) is
newer than any recommended version, according to the directory
authorities. Recommended versions are:
0.2.4.23,0.2.4.24,0.2.4.25,0.2.4.26,0.2.4.27,0.2.5.8-rc,0.2.5.9-rc,0.2.5.10,0.2.5.11,0.2.5.12,0.2.6.5-rc,0.2.6.6,0.2.6.7,0.2.6.8,0.2.6.9,0.2.6.10,0.2.7.1-alpha,0.2.7.2-alpha
> Sep 07 12:34:42.000 [notice] Now checking whether ORPort
109.103.57.102:9001 and DirPort 109.103.57.102:9030 are reachable... (this
may take up to 20 minutes -- look for log messages indicating success)
> Sep 07 12:34:43.000 [notice] Self-testing indicates your DirPort is
reachable from the outside. Excellent.
>
> Sep 07 12:34:43.000 [warn] Failure from drain_fd: No error
>
> Sep 07 12:34:43.000 [notice] Self-testing indicates your ORPort is
reachable from the outside. Excellent. Publishing server descriptor.
> Sep 07 12:34:47.000 [notice] Performing bandwidth self-test...done.
> }}}
So the actual bug is still present? nickm? Is this still something that
should just be dup-ed?
> Also, I used bench.exe to see the tor performances on my PC but I have
no idea if those values are good or bad for a relay. Can you look into and
write your opinion about?
*shrugs* Doesn't look like you have AES-NI, and the public key crypto
operations are an order of magnitude slower than a mobile Haswell i5.
People do run relays on slower things, so there's nothing wrong with the
fact that all the crypto is slow, but I wouldn't expect amazing
performance.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16992#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list