[tor-bugs] #16861 [Core Tor/Tor]: Pad Tor connections to collapse netflow records
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Sep 8 06:13:44 UTC 2016
#16861: Pad Tor connections to collapse netflow records
-------------------------------------------------+-------------------------
Reporter: mikeperry | Owner:
| mikeperry
Type: enhancement | Status:
| needs_review
Priority: High | Milestone: Tor:
| 0.2.9.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: 028-triage, 028-triaged, | Actual Points:
pre028-patch, 201511-deferred, |
201512-deferred, tor-guard, TorCoreTeam- |
postponed-201604, nickm-deferred-20160905 |
Parent ID: | Points: 2
Reviewer: nickm | Sponsor:
| SponsorU-can
-------------------------------------------------+-------------------------
Changes (by mikeperry):
* status: needs_revision => needs_review
* milestone: Tor: 0.2.??? => Tor: 0.2.9.x-final
Comment:
Alright. I switched the code over to using the new handle, monotonic
timer, and timer wheel abstractions. All unit tests pass without leaks
from this code (though the unit tests have grown new memory leaks of their
own).
mikeperry/netflow_padding-v6. The commit specific to this bug is
a51a998555b352043437cccbfc2758ab9b737925.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:57>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list