[tor-bugs] #19984 [Core Tor/Tor]: Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Aug 25 18:34:33 UTC 2016
#19984: Use a better set of comparison/evaluation functions for deciding which
connections to kill when OOS
------------------------------+--------------------------------
Reporter: nickm | Owner:
Type: defect | Status: new
Priority: Medium | Milestone: Tor: 0.3.0.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Keywords: dos,sockets
Actual Points: | Parent ID:
Points: 1 | Reviewer:
Sponsor: |
------------------------------+--------------------------------
Our existing OOS code kills low-priority OR connections. But really, we
need to look at all connections that an adversary might be able to create
(especially dir and exit connections), or else an adversary will be able
to open a bunch of those, and force us to kill as many OR connections as
they want.
This problem is the reason that DisableOOSCheck is now on-by-default.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19984>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list