[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #32688 [Core Tor/Tor]: Make tor_tls_get_buffer_sizes() work again



#32688: Make tor_tls_get_buffer_sizes() work again
------------------------------+------------------------------------
     Reporter:  nickm         |      Owner:  (none)
         Type:  enhancement   |     Status:  new
     Priority:  Low           |  Milestone:  Tor: unspecified
    Component:  Core Tor/Tor  |    Version:
     Severity:  Normal        |   Keywords:  openssl, ram, oom-dos?
Actual Points:                |  Parent ID:
       Points:                |   Reviewer:
      Sponsor:                |
------------------------------+------------------------------------
 Where supported, Tor uses OpenSSL skulduggery to find out how much RAM
 openssl has allocated and/or is using for buffers in each SSL object, and
 .  This information is only used for logging right now (in `dumpstats()`),
 but it has potential use in our OOM/DOS prevention code.

 The tricks that we used up till now no longer actually work with OpenSSL
 1.1.0, however, since the relevant structures are now opaque.  We'll
 either need to find another way to get their sizes, or add some API to
 OpenSSL to expose them.

 This is low-priority, unless we actually have time to use this information
 in OOM calculation.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32688>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs