[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #23512 [Core Tor/Tor]: Bandwidth stats watermark can be induced using OOM killer



#23512: Bandwidth stats watermark can be induced using OOM killer
-------------------------------------------------+-------------------------
 Reporter:  asn                                  |          Owner:  (none)
     Type:  defect                               |         Status:
                                                 |  needs_review
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  unspecified
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tor-bug-bounty, congestion-attack,   |  Actual Points:
  research, watermark, tor-stats, guard-         |
  discovery-stats, 034-triage-20180328,          |
  034-removed-20180328                           |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  SponsorQ
-------------------------------------------------+-------------------------
Changes (by mikeperry):

 * status:  new => needs_review
 * cc: dgoulet (added)


Comment:

 Ok what do we think about this: https://github.com/torproject/tor/pull/324

 I made that branch off of 0.3.2, because yesterday dgoulet told me that
 the network is still experiencing continuous OOM attacks, trigging circuit
 oomkiller. This very well could be (one of) the reasons for such attacks.
 So I think we should backport. Certainly plenty of relays are experiencing
 circuit OOMs and reporting asymmetric stats.

 Instead of trying to guess when the bytes arrived and subtract them from
 the appropriate read totals, I just report that we wrote them instead.
 Much simpler, easier to backport, etc.

 Downsides of this fix (and probably any other fix): We don't know how many
 bytes the TLS headers took  up. For this reason, I also didn't bend over
 backwards to count bytes for var cells, wide circ ids, etc. Do we think
 that is sufficient? Should we lie and add ~1 TLS header of bytes per cell?

 Are there other places where we kill circuits like this?

 Dgoulet - what about the DoS/DESTROY queue handling?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23512#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs