[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] BWAUTH weightings too volatile. . ."twitchy"



At 04:12 6/7/2015 +1000, teor wrote:
>Please let me know how you go - the 0.2.6.x
>series should also be relatively ASAN
>and UBSAN clean, as Tor has been tested
>with them since late 2014.

I've run 0.2.4.x and 0.2.5.x with ASAN
live in production with no problems
when the relay had less bandwidth.
Performance hit is something like
30% extra CPU.  Also had it on
libssl.so and libevent.so, but
was too expensive to run on
libcrypto.so.

UBSAN seems expense and doesn't seem
it would run other than test, but
I didn't work on it long and am not
100% certain.  Was trying ASAN extra
stack checking at the time, which may
have been the culprit.

Did crash out with a good analysis report
the day Heartbleed was announced due to
someone scanning all the nodes for
the vuln.

After a major bandwidth increase, have
held off waiting for the bandwidth
weight to stabilize before trying it.

However the with the insanity of the
BWauths, I haven't done much with it.
Ran it awhile back and the consensus
took a modest hit, but the numbers
are so unreliable I couldn't tell
if it was ASAN overhead or plain
randomness.

The idea is not to use ASAN for a one
off test, but to run it 100% in production
so that an exploit showing up out-of-the
blue might be caught out.

Later this year Intel is releasing new
CPUs with hardware support for
new UBSAN checks.  That's something
I want to try.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays