[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #24797 [Core Tor/Tor]: Add an option that makes Tor use fewer connections
#24797: Add an option that makes Tor use fewer connections
------------------------------+----------------------------------------
Reporter: teor | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.3.3.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Keywords: tor-relay, DDoS-resistance
Actual Points: | Parent ID:
Points: 1 | Reviewer:
Sponsor: |
------------------------------+----------------------------------------
Tor is willing all the file descriptors the OS tells it are available for
the current user.
So to enforce a connection limit, operators need to drop the user file
descriptor limit.
But if the OS is wrong, or there are multiple tor instances under the
user, tor can easily exceed this limit.
Or machine hits a kernel, RAM, or CPU limit first, then the user might
want to artificially limit connections.
Right now, we have ConnLimit, which looks like it limits connections, but
it's actually a minimum.
And we have the out of socket check, but DisableOOSCheck is the default.
Does enforcing a connection limit require us to set DisableOOSCheck 0?
Then we should move this ticket to 0.3.4, and open one to improve the out
of socket check.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24797>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs