[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #33704 [Core Tor/Tor]: Understand code performance of onion services under DoS



#33704: Understand code performance of onion services under DoS
-------------------------+-------------------------------------------------
     Reporter:  asn      |      Owner:  (none)
         Type:  defect   |     Status:  new
     Priority:  Medium   |  Milestone:  Tor: unspecified
    Component:  Core     |    Version:
  Tor/Tor                |   Keywords:  tor-dos tor-hs network-team-
     Severity:  Normal   |  roadmap-2020Q1
Actual Points:           |  Parent ID:  #33703
       Points:           |   Reviewer:
      Sponsor:           |
-------------------------+-------------------------------------------------
 We need to do the following experiments to understand more about the
 performance of Tor under simulated DoS conditions:

 - Get vanilla profile (for #30221)
   - Need to get more understanding about CPU vs network saturation
 - Investigate control port experiment (with STREAM events enabled and
 trying to kill circs with CLOSECIRCUIT)
   - wrt https://lists.torproject.org/pipermail/tor-
 dev/2019-December/014097.html
 - Investigate horizontal scaling with OB
   - See how load changes when scaled to 2/4/8 instances, extrapolate
 onwards.
 - Investigate size of replay cache (#26294)
 - Investigate capacity of reestablish intro circuit (#26294)
 - Compare intro/rend profiles (value of prop255 / #17254)
 - Investigate pinned paths with HSLayer2Node HSLayer3Node

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33704>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs