[tor-bugs] #19984 [Core Tor/Tor]: Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Aug 25 18:34:33 UTC 2016


#19984: Use a better set of comparison/evaluation functions for deciding which
connections to kill when OOS
------------------------------+--------------------------------
     Reporter:  nickm         |      Owner:
         Type:  defect        |     Status:  new
     Priority:  Medium        |  Milestone:  Tor: 0.3.0.x-final
    Component:  Core Tor/Tor  |    Version:
     Severity:  Normal        |   Keywords:  dos,sockets
Actual Points:                |  Parent ID:
       Points:  1             |   Reviewer:
      Sponsor:                |
------------------------------+--------------------------------
 Our existing OOS code kills low-priority OR connections. But really, we
 need to look at all connections that an adversary might be able to create
 (especially dir and exit connections), or else an adversary will be able
 to open a bunch of those, and force us to kill as many OR connections as
 they want.

 This problem is the reason that DisableOOSCheck is now on-by-default.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19984>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list