[tor-relays] relay memory leak?

Fran fatal at mailbox.org
Fri Jul 22 21:28:51 UTC 2022


Hey,

new non-exit relay, Debian 11, tor 0.4.7.8-1~d11.bullseye+1, ~ 1 week 
old (-> no guard)

KVM VM with atm 4 cores, host passthrough AMD EPYC (-> AES HW accel.).

As can be seen at the attached screenshots memory consumption is 
irritating as well as the quite high CPU load.

All was fine when it had ~100 Mbit/s but then onion skins exploded (110 
per second -> up to 4k per second) as well as CPU and memory.


Tor complains:

 > Your computer is too slow to handle this many circuit creation 
requests! Please consider using the MaxAdvertisedBandwidth config option 
or choosing a more restricted exit policy.


And from time to time memory killer takes action


torrc is pretty basic:

Nickname 123
ContactInfo 123
RunAsDaemon 1
Log notice syslog
RelayBandwidthRate 2X MBytes
RelayBandwidthBurst 2X MBytes
SocksPort 0
ControlSocket 0
CookieAuthentication 0
AvoidDiskWrites 1
Address  xxxx
OutboundBindAddress yyyy
ORPort xxxx:yyy
Address  [zzzz]
OutboundBindAddress [zzz]
ORPort [zzz]:xxx
MetricsPort hhhh:sss
MetricsPortPolicy accept fffffff
DirPort yy
Sandbox 1
NoExec 1
CellStatistics 1
ExtraInfoStatistics 1
ConnDirectionStatistics 1
EntryStatistics 1
ExitPortStatistics 1
HiddenServiceStatistics 1


Ideas/suggestions (apart from limiting BW) to fix this?

Thanks

fran
-------------- next part --------------
A non-text attachment was scrubbed...
Name: onion-skins.png
Type: image/png
Size: 79965 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20220722/1089b505/attachment-0002.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: tor-cpu-memory-traffic.png
Type: image/png
Size: 144942 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20220722/1089b505/attachment-0003.png>


More information about the tor-relays mailing list