[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #3804 [Tor Relay]: Bufferevent rate-limiting logic handles filtering badly
#3804: Bufferevent rate-limiting logic handles filtering badly
-----------------------+----------------------------------------------------
Reporter: nickm | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version:
Keywords: | Parent: #3561
Points: | Actualpoints:
-----------------------+----------------------------------------------------
When we're doing filtering ssl bufferevents, we want the rate-limits to
apply to the lowest level of the bufferevent stack, so that we're actually
limiting bytes sent on the network. Otherwise, we'll read from the
network ad libitum.
Also, we need to set write high-water marks for the lowest-level
bufferevents in the filtering stack, or else we might prematurely ssl-ify
data faster than we could write it, which would be silly.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3804>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs