[tor-bugs] #33704 [Core Tor/Tor]: Understand code performance of onion services under DoS

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Mar 25 13:46:52 UTC 2020


#33704: Understand code performance of onion services under DoS
-------------------------------------------------+-------------------------
 Reporter:  asn                                  |          Owner:  (none)
     Type:  defect                               |         Status:  new
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  unspecified
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tor-dos tor-hs network-team-         |  Actual Points:
  roadmap-2020Q1                                 |
Parent ID:  #33703                               |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------
Description changed by asn:

Old description:

> We need to do the following experiments to understand more about the
> performance of Tor under simulated DoS conditions:
>
> - Get vanilla profile (for #30221)
> - See effect of DoS on intro and guard (profile them or just monitor CPU
> and logs)
> - Investigate control port experiment (with STREAM events enabled and
> trying to kill circs with CLOSECIRCUIT)
>   - wrt https://lists.torproject.org/pipermail/tor-
> dev/2019-December/014097.html
> - Investigate horizontal scaling with OB
>   - See how load changes when scaled to 2/4/8 instances, extrapolate
> onwards.
> - Investigate size of replay cache (#26294)
> - Investigate capacity of reestablish intro circuit (#26294)
> - Compare intro/rend profiles (value of prop255 / #17254)
> - Investigate pinned paths with HSLayer2Node HSLayer3Node

New description:

 We need to do the following experiments to understand more about the
 performance of Tor under simulated DoS conditions:

 1) Get vanilla profile (for #30221) [VANILLA profile] [Also get with
 INTRO2 rate limiting]

 2) See effect of DoS on intro and guard [VANILLA profile] [Also with
 INTRO2 rate limiting]

 3) Investigate control port experiment (with STREAM events enabled and
 trying to kill circs with CLOSECIRCUIT) [VANILLA profile]
 wrt ​https://lists.torproject.org/pipermail/tor-
 dev/2019-December/014097.html

    NEED: Controller script that logs circuit events and tries to kill some
 circuits  [asn]

 4) Investigate size of replay cache (#26294) [VANILLA profile]   [asn]

 5) Investigate capacity of reestablish intro circuit (#26294) [VANILLA
 profile]

 6) Compare intro/rend profiles (value of prop255 / #17254) [VANILLA
 profile]

 7~) Investigate horizontal scaling with OB (scale to 2/4/8 instances,
 extrapolate onwards.) [OBv3 profile]

 8~) Investigate pinned paths with HSLayer2Node HSLayer3Node [Vanguard
 profile]

--

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33704#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list