[tor-bugs] #25667 [Core Tor/Tor]: LZMA/ZSTD descriptor compression support
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Mar 29 19:36:14 UTC 2018
#25667: LZMA/ZSTD descriptor compression support
-------------------------------------------------+-------------------------
Reporter: atagar | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor:
| 0.3.3.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: regression? 033-must needs-analysis | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by teor):
Replying to [comment:3 atagar]:
> Hi Nick. Just tried requesting lzma and zstd compressed descriptors from
all present dirauths but they all fell back to plaintext responses as
moria1 did. Do we know if this feature is exercised anywhere in practice?
You can test lzma against any of these relays:
https://metrics.torproject.org/rs.html#search/radia
Unfortunately, they don't have zstd support, because it's not in the
Debian release they are using.
If you ask on tor-relays, you can probably find a few operators who have
only enabled zstd, or who have enabled both lzma and zstd.
The relevant configure options are --enable-lzma and --enable-zstd.
Tor also logs the supported compression methods on startup:
`Tor %s running on %s with Libevent %s, OpenSSL %s, Zlib %s, Liblzma %s,
and Libzstd %s.`
https://gitweb.torproject.org/tor.git/tree/src/or/main.c#n3323
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25667#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list