[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #33704 [Core Tor/Tor]: Understand code performance of onion services under DoS
#33704: Understand code performance of onion services under DoS
-------------------------+-------------------------------------------------
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: unspecified
Component: Core | Version:
Tor/Tor | Keywords: tor-dos tor-hs network-team-
Severity: Normal | roadmap-2020Q1
Actual Points: | Parent ID: #33703
Points: | Reviewer:
Sponsor: |
-------------------------+-------------------------------------------------
We need to do the following experiments to understand more about the
performance of Tor under simulated DoS conditions:
- Get vanilla profile (for #30221)
- Need to get more understanding about CPU vs network saturation
- Investigate control port experiment (with STREAM events enabled and
trying to kill circs with CLOSECIRCUIT)
- wrt https://lists.torproject.org/pipermail/tor-
dev/2019-December/014097.html
- Investigate horizontal scaling with OB
- See how load changes when scaled to 2/4/8 instances, extrapolate
onwards.
- Investigate size of replay cache (#26294)
- Investigate capacity of reestablish intro circuit (#26294)
- Compare intro/rend profiles (value of prop255 / #17254)
- Investigate pinned paths with HSLayer2Node HSLayer3Node
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33704>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs