[tor-bugs] #16861 [Core Tor/Tor]: Pad Tor connections to collapse netflow records
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Thu Sep  8 06:13:44 UTC 2016
    
    
  
#16861: Pad Tor connections to collapse netflow records
-------------------------------------------------+-------------------------
 Reporter:  mikeperry                            |          Owner:
                                                 |  mikeperry
     Type:  enhancement                          |         Status:
                                                 |  needs_review
 Priority:  High                                 |      Milestone:  Tor:
                                                 |  0.2.9.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  028-triage, 028-triaged,             |  Actual Points:
  pre028-patch, 201511-deferred,                 |
  201512-deferred, tor-guard, TorCoreTeam-       |
  postponed-201604, nickm-deferred-20160905      |
Parent ID:                                       |         Points:  2
 Reviewer:  nickm                                |        Sponsor:
                                                 |  SponsorU-can
-------------------------------------------------+-------------------------
Changes (by mikeperry):
 * status:  needs_revision => needs_review
 * milestone:  Tor: 0.2.??? => Tor: 0.2.9.x-final
Comment:
 Alright. I switched the code over to using the new handle, monotonic
 timer, and timer wheel abstractions. All unit tests pass without leaks
 from this code (though the unit tests have grown new memory leaks of their
 own).
 mikeperry/netflow_padding-v6. The commit specific to this bug is
 a51a998555b352043437cccbfc2758ab9b737925.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:57>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list