[tor-bugs] #13222 [Tor]: Clients accessing a hidden service can establish their rend point in parallel to fetching the hsdesc

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Dec 18 22:06:15 UTC 2014


#13222: Clients accessing a hidden service can establish their rend point in
parallel to fetching the hsdesc
-----------------------------+---------------------------------
     Reporter:  arma         |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:  Tor: 0.2.???
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  SponsorR tor-client
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+---------------------------------

Comment (by dgoulet):

 Just finished an experiment on chutney that is relevant to this ticket. If
 the network does not stop and a client request is done to the HS every 10
 seconds requesting a new circuit (torsocks + user/pass), the rendez-vous
 point is 100% of the time cannibalized. See the graph attached "rp-
 time-025.png".

 Few outliers that need investiguation creating two clusters (same behavior
 with IP btw) but apart from that, it's really fast vis-a-vis establishing
 IP where no cannibalization occurs. See graph attached "ip-time-025.png".

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13222#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list