[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #16861 [Core Tor/Tor]: Pad Tor connections to collapse netflow records
#16861: Pad Tor connections to collapse netflow records
-------------------------------------------------+-------------------------
Reporter: mikeperry | Owner:
| mikeperry
Type: enhancement | Status:
| needs_review
Priority: High | Milestone: Tor:
| 0.2.9.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: 028-triage, 028-triaged, | Actual Points:
pre028-patch, 201511-deferred, |
201512-deferred, tor-guard, TorCoreTeam- |
postponed-201604, nickm-deferred-20160905 |
Parent ID: | Points: 2
Reviewer: nickm | Sponsor:
| SponsorU-can
-------------------------------------------------+-------------------------
Changes (by mikeperry):
* status: needs_revision => needs_review
* milestone: Tor: 0.2.??? => Tor: 0.2.9.x-final
Comment:
Alright. I switched the code over to using the new handle, monotonic
timer, and timer wheel abstractions. All unit tests pass without leaks
from this code (though the unit tests have grown new memory leaks of their
own).
mikeperry/netflow_padding-v6. The commit specific to this bug is
a51a998555b352043437cccbfc2758ab9b737925.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:57>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs