[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #572 [Tor]: fallback-consensus file impractical to use



#572: fallback-consensus file impractical to use
-----------------------------------------------------------------------------+
 Reporter:  arma                                                             |           Type:  enhancement
   Status:  needs_review                                                     |       Priority:  major      
Milestone:  Tor: 0.2.4.x-final                                               |      Component:  Tor        
  Version:  0.2.0.9-alpha                                                    |     Resolution:  None       
 Keywords:  performance bootstrap dirauth-dos-resistance prop206 tor-client  |         Parent:  #2664      
   Points:                                                                   |   Actualpoints:             
-----------------------------------------------------------------------------+

Comment(by andrea):

 Begin code review:

 How will we pick the fallback servers/how long is the list expected to be?
 In 5c51b3f1f0d4c394392aa6fce89bbe0960117771, for example, you're
 introducing router_get_fallback_dirserver_by_digest() that searches a
 smartlist, which was fine for the short list of trusted authorities, but
 in comments further up on this ticket I'm seeing numbers like 500 servers
 being bandied about, which makes me a bit nervous about linear-time
 searches.  Is this going to be so infrequent an operation it isn't worth
 worrying about, though?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/572#comment:38>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs