[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] BWAUTH weightings too volatile. . ."twitchy"
At 04:12 6/7/2015 +1000, teor wrote:
>Please let me know how you go - the 0.2.6.x
>series should also be relatively ASAN
>and UBSAN clean, as Tor has been tested
>with them since late 2014.
I've run 0.2.4.x and 0.2.5.x with ASAN
live in production with no problems
when the relay had less bandwidth.
Performance hit is something like
30% extra CPU. Also had it on
libssl.so and libevent.so, but
was too expensive to run on
libcrypto.so.
UBSAN seems expense and doesn't seem
it would run other than test, but
I didn't work on it long and am not
100% certain. Was trying ASAN extra
stack checking at the time, which may
have been the culprit.
Did crash out with a good analysis report
the day Heartbleed was announced due to
someone scanning all the nodes for
the vuln.
After a major bandwidth increase, have
held off waiting for the bandwidth
weight to stabilize before trying it.
However the with the insanity of the
BWauths, I haven't done much with it.
Ran it awhile back and the consensus
took a modest hit, but the numbers
are so unreliable I couldn't tell
if it was ASAN overhead or plain
randomness.
The idea is not to use ASAN for a one
off test, but to run it 100% in production
so that an exploit showing up out-of-the
blue might be caught out.
Later this year Intel is releasing new
CPUs with hardware support for
new UBSAN checks. That's something
I want to try.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays