[tor-bugs] #16861 [Core Tor/Tor]: Pad Tor connections to collapse netflow records

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Sep 8 06:13:44 UTC 2016


#16861: Pad Tor connections to collapse netflow records
-------------------------------------------------+-------------------------
 Reporter:  mikeperry                            |          Owner:
                                                 |  mikeperry
     Type:  enhancement                          |         Status:
                                                 |  needs_review
 Priority:  High                                 |      Milestone:  Tor:
                                                 |  0.2.9.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  028-triage, 028-triaged,             |  Actual Points:
  pre028-patch, 201511-deferred,                 |
  201512-deferred, tor-guard, TorCoreTeam-       |
  postponed-201604, nickm-deferred-20160905      |
Parent ID:                                       |         Points:  2
 Reviewer:  nickm                                |        Sponsor:
                                                 |  SponsorU-can
-------------------------------------------------+-------------------------
Changes (by mikeperry):

 * status:  needs_revision => needs_review
 * milestone:  Tor: 0.2.??? => Tor: 0.2.9.x-final


Comment:

 Alright. I switched the code over to using the new handle, monotonic
 timer, and timer wheel abstractions. All unit tests pass without leaks
 from this code (though the unit tests have grown new memory leaks of their
 own).

 mikeperry/netflow_padding-v6. The commit specific to this bug is
 a51a998555b352043437cccbfc2758ab9b737925.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:57>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list