[tor-bugs] #24640 [Obfuscation/meek]: improve meek behavior when target server is down

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Dec 15 18:52:38 UTC 2017


#24640: improve meek behavior when target server is down
----------------------------------+----------------------
     Reporter:  brade             |      Owner:  dcf
         Type:  defect            |     Status:  assigned
     Priority:  Medium            |  Milestone:
    Component:  Obfuscation/meek  |    Version:
     Severity:  Normal            |   Keywords:
Actual Points:                    |  Parent ID:
       Points:                    |   Reviewer:
      Sponsor:                    |
----------------------------------+----------------------
 As part of our testing of Tor Launcher / Moat functionality, Mark and I
 ran our own meek-server but intentionally stopped the BridgeDB/moat server
 to which it was supposed to talk.  This caused a 5 minute hang within Tor
 Launcher before an error was generated.

 On the meek-client side, we see a series of messages like these:
  status code was 500, not 200; trying again after 30 seconds (9)

 On the meek-server side, we see these messages:
   dial tcp 192.168.1.xx:6790: getsockopt: connection refused

 Because this is part of the Moat client implementation inside Tor
 Launcher, if BridgeDB is down a real person will be waiting a long time
 without receiving any feedback. It does not look like the retry interval
 or count is configurable within meek-client.

 Do you have any suggestions for minimizing or eliminating the 5 minutes?
 We could implement a different maximum timeout inside Tor Launcher,
 although knowing that the underlying error is "connection refused" vs.
 "the network is just really slow" would make things more robust.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24640>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list