[tor-bugs] #6538 [Tor Client]: Use bit-twiddling tricks to make choose-by-bandwith algorithm even more time-invariant

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Aug 22 18:54:49 UTC 2012


#6538: Use bit-twiddling tricks to make choose-by-bandwith algorithm even more
time-invariant
-------------------------+--------------------------------------------------
 Reporter:  nickm        |          Owner:                    
     Type:  enhancement  |         Status:  needs_review      
 Priority:  normal       |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Client   |        Version:                    
 Keywords:               |         Parent:                    
   Points:               |   Actualpoints:                    
-------------------------+--------------------------------------------------

Comment(by rransom):

 Replying to [comment:10 arma]:
 > Replying to [comment:9 nickm]:
 > > Instead of calling the risk "low", do you mean "unproven" or
 something?
 >
 > I mean the risk of applying it. That is, what are the chances it will
 produce strange crashes, strange path selection bugs, or a spew of "Sky is
 falling tell the developers!" warnings that forcce us to rush out a quick
 new release (which may or may not get picked up by distros like Wheezy,
 depending on timing).

 I have been using the patch that I wrote to fix this issue for over a
 month, with not even a scary log message.

 > The slow mobile devices question is a good point though. Do you
 seriously think that setting a variable 1000 times vs 1100 times is going
 to be noticeable to even a local network attacker?

 The current code (after #6537) loops at a different frequency after it
 selects a relay, which will be quite noticeable to someone picking up a
 smartphone's RF emissions.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6538#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list