[tor-bugs] #28634 [Core Tor/Tor]: Design a first useful padding machine (hiding client-side intro/rend circuits)
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed May 15 04:42:13 UTC 2019
#28634: Design a first useful padding machine (hiding client-side intro/rend
circuits)
-------------------------------------------------+-------------------------
Reporter: asn | Owner: (none)
Type: defect | Status:
| needs_review
Priority: Very High | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: wtf-pad, tor-relay, tor-cell, | Actual Points:
padding, 041-proposed, network-team- |
roadmap-2019-Q1Q2 |
Parent ID: | Points: 8
Reviewer: mikeperry | Sponsor:
| Sponsor2
-------------------------------------------------+-------------------------
Comment (by mikeperry):
Replying to [comment:26 asn]:
> Looks good to me! I also successfuly tested that the rate limiting rules
apply correctly, and also cannot trigger on the current machines.
>
> One last thing we might want to fix is that I've been getting spammed by
this log message in chutney even for machines were RTT is not enabled
(like these ones):
> {{{
> May 14 12:25:18.162 [notice] Got two cells back to back on a circuit
before estimating RTT.
> }}}
I believe this should be fixed by #29085. While optimizing to avoid
monotime, I added a fast-path that also has the effect of avoiding the
branch that contains this log message if the feature is disabled.
Which chutney tests are you testing with and how are you doing
verification?
Do you think we could add something simple to the chutney tests to check
for any obvious weirdness automatically?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28634#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list