#16861: Pad Tor connections to collapse netflow records -------------------------------------------------+------------------------- Reporter: mikeperry | Owner: | mikeperry Type: enhancement | Status: | needs_review Priority: High | Milestone: Tor: | 0.2.9.x-final Component: Core Tor/Tor | Version: Severity: Normal | Resolution: Keywords: 028-triage, 028-triaged, | Actual Points: pre028-patch, 201511-deferred, | 201512-deferred, tor-guard, TorCoreTeam- | postponed-201604, nickm-deferred-20160905 | Parent ID: | Points: 2 Reviewer: nickm | Sponsor: | SponsorU-can -------------------------------------------------+------------------------- Changes (by mikeperry):
* status: needs_revision => needs_review * milestone: Tor: 0.2.??? => Tor: 0.2.9.x-final Comment: Alright. I switched the code over to using the new handle, monotonic timer, and timer wheel abstractions. All unit tests pass without leaks from this code (though the unit tests have grown new memory leaks of their own). mikeperry/netflow_padding-v6. The commit specific to this bug is a51a998555b352043437cccbfc2758ab9b737925. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16861#comment:57> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online _______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs