#31653: Padding cells sent with 0ms delay cause circuit failures -------------------------------------------------+------------------------- Reporter: pulls | Owner: | mikeperry Type: defect | Status: | assigned Priority: Medium | Milestone: Tor: | 0.4.2.x-final Component: Core Tor/Tor | Version: Tor: | 0.4.1.5 Severity: Normal | Resolution: Keywords: wtf-pad circpad-researchers-want | Actual Points: 042-should | Parent ID: | Points: Reviewer: | Sponsor: -------------------------------------------------+-------------------------
Comment (by mikeperry): Bleh. It is unfortunate that clients need more accurate timers than relays. 1. Do you have any sense as to if client-side timing is more important because most test crawls tend to use client-side timings as opposed to guard-side timings (and thus inherently get very high client-side timing resolution and visibility into Firefox delays), or because of something else that is just inherent to the HTTP protocol? 2. If I were to write a patch that allowed either clients or relays to correctly fast-path this 0ms case to insert bursts of back-to-back packets without the circuit failure, would that help? -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31653#comment:16> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs