[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #3875 [Firefox Patch Issues]: TBB's Firefox should use optimistic data socks handshake variant
#3875: TBB's Firefox should use optimistic data socks handshake variant
-----------------------------------+----------------------------------------
Reporter: arma | Owner: mikeperry
Type: enhancement | Status: new
Priority: major | Milestone: TorBrowserBundle 2.3.x-stable
Component: Firefox Patch Issues | Version:
Keywords: performance roundtrip | Parent: #3890
Points: | Actualpoints:
-----------------------------------+----------------------------------------
Comment(by t55wang):
Replying to [comment:12 mikeperry]:
> Replying to [comment:11 t55wang]:
> > I've implemented preliminary versions of both. Right now, the "tiny
change to FF" approach works except for the SSL handshake, which is to say
it does not work. The "modifying OP" approach works, but doesn't deal with
some errors very well yet. I will keep you updated when either or both
approaches do in fact work.
>
> How exactly does the SSL handshake fail, and in what cases?
>
> And for the OP case, what does "not dealing with some errors very well"
mean in practice? The user experience for errors is already pretty bad. I
think in practice we can ignore most UX issues with the errors since the
perf benefit for the good case is so clear.
These things have been fixed. For the SSL handshake, I told it to stop
polling after one round and I shouldn't have. For the errors, I meant that
DNS resolution failure returns "connection has been reset" to the Browser,
which seems confusing, so I wrote an error message explaining what
happened (copying from the original "Tor is not an HTTP proxy" message)
for that case.
>
> Also, can you attach patches as well? It will make it easier for us to
make suggestions/decisions.
I have included patches for both the Tor Browser and Tor. Both are
working, but performance measurements are underway and should be done by
tomorrow.
The Tor Browser fix is slightly more involved, as it introduces a new
state to the connect process (marking where the GET request can be sent)
and changes the behavior of the SOCKS handshake. I am not sure if there
are unforeseen consequences of flipping the handshake on its head -
everything I've tried has worked so far. The Tor fix is much simpler (the
core is literally one line), but there are some potential problems. We did
a "hack" where Tor checks if the port we're trying to talk to is port 80,
and only displays the specific HTTP error message (for DNS resolution
failure) in that situation. There's also the problem that Tor is
essentially lying to Firefox by telling it that the socks connect has been
accepted by the end server, when it hasn't been.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3875#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs