[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #23512 [Core Tor/Tor]: Bandwidth stats watermark can be induced using OOM killer
#23512: Bandwidth stats watermark can be induced using OOM killer
-------------------------------------------------+-------------------------
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-bug-bounty, congestion-attack, | Actual Points:
research, watermark, tor-stats, guard- |
discovery-stats, 034-triage-20180328, |
034-removed-20180328 |
Parent ID: | Points:
Reviewer: | Sponsor:
| SponsorQ
-------------------------------------------------+-------------------------
Comment (by mikeperry):
So, for reference, the final version of the paper, at
https://petsymposium.org/2018/files/papers/issue2/popets-2018-0011.pdf,
says this on page 7, Section 4.3.1:
{{{
This buffering fills the memory until circuit_handle_oom () is called to
kill the circuits and recover the memory from its queues. In the mean-
time, the cell payload is counted in the read statistics and ignored in
the write statistics.
}}}
This makes it sound like asn's proposed fix in the description should
actually be correct, and that arma's comment may have been based on an
earlier paper revision.
Sure would be nice to get that github url back to actually reproduce some
science here..
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23512#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs