[tor-bugs] #2681 [Tor Client]: brainstorm ways to let Tor clients use yesterday's consensus more safely

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Sep 19 01:42:16 UTC 2012


#2681: brainstorm ways to let Tor clients use yesterday's consensus more safely
-----------------------------------------------------+----------------------
 Reporter:  arma                                     |          Owner:                    
     Type:  enhancement                              |         Status:  new               
 Priority:  normal                                   |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Client                               |        Version:                    
 Keywords:  dirauth-dos-resistance, proposal-needed  |         Parent:  #2664             
   Points:                                           |   Actualpoints:                    
-----------------------------------------------------+----------------------
Changes (by mikeperry):

  * keywords:  => dirauth-dos-resistance, proposal-needed
  * milestone:  Tor: unspecified => Tor: 0.2.4.x-final


Comment:

 With each new dirauth we add into the kool kids klub, it becomes less
 likely we'll be able to contact at least half of them within 25 hours in
 the event of something like the crash in the #2664 description.

 What's the simplest thing we can get done on the 0.2.4.x timescale to
 improve this situation? Can we just bump the consensus and descriptor
 freshness limits?

 In terms of what limit to bump to: I think we need to be able to survive
 at least a 3 day weekend. If someone were to bring down the dirauths on
 xmas, thanksgiving, or NYE, we need to not lose the Tor network because a
 patch couldn't be written in time.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2681#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list