[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #3804 [Tor Relay]: Bufferevent rate-limiting logic handles filtering badly



#3804: Bufferevent rate-limiting logic handles filtering badly
-----------------------+----------------------------------------------------
 Reporter:  nickm      |          Owner:                    
     Type:  defect     |         Status:  new               
 Priority:  normal     |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:                    
 Keywords:             |         Parent:  #3561             
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------
 When we're doing filtering ssl bufferevents, we want the rate-limits to
 apply to the lowest level of the bufferevent stack, so that we're actually
 limiting bytes sent on the network.  Otherwise, we'll read from the
 network ad libitum.

 Also, we need to set write high-water marks for the lowest-level
 bufferevents in the filtering stack, or else we might prematurely ssl-ify
 data faster than we could write it, which would be silly.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3804>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs