[tor-bugs] #30553 [Core Tor/Chutney]: chutney: Bump the data size transmitted with the verify command

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue May 21 13:29:34 UTC 2019


#30553: chutney: Bump the data size transmitted with the verify command
----------------------------------+--------------------
     Reporter:  dgoulet           |      Owner:  (none)
         Type:  enhancement       |     Status:  new
     Priority:  Medium            |  Milestone:
    Component:  Core Tor/Chutney  |    Version:
     Severity:  Normal            |   Keywords:
Actual Points:                    |  Parent ID:
       Points:                    |   Reviewer:
      Sponsor:                    |
----------------------------------+--------------------
 With #29263, the SENDMEs can be tested properly but as long as the
 circuits has more than 500KB on it (which is roughly the 512 byte data
 cell size times the circuit window start of 1000).

 To be safe, having let say 600KB of data transmitted with `chutney verify`
 would be a sure test of the circuit flow control feature. And it doesn't
 take much more time at all from what we have right now.

 On slow systems like arm64 for instance, there could be an argument to
 bump the SOCKS timeout from 3 to let say 5 or 10 seconds in order to avoid
 chutney killing the connections before 600KB went through the circuit.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30553>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list