#33018: Dir auths using an unsustainable 400+ mbit/s, need to diagnose and fix ---------------------------------------+----------------------------------- Reporter: arma | Owner: (none) Type: defect | Status: new Priority: Medium | Milestone: Tor: | 0.4.3.x-final Component: Core Tor/Tor | Version: Severity: Normal | Resolution: Keywords: network-health 043-should | Actual Points: Parent ID: | Points: Reviewer: | Sponsor: ---------------------------------------+-----------------------------------
Comment (by Sebastian): Replying to [comment:8 teor]: > Replying to [comment:2 Sebastian]: > > I am not concerned about relays connecting from a wrong IP address. I basically feel like that shouldn't even be possible configuration-wise > > Relays can set different addresses in the Address and OutboundBindAddress options, and their inbound and outbound traffic will be on different addresses. Some operators use these options, others put their Address on a non-default route. > > So we do need to consider this case, particularly when relays are trying to discover their own IP address from an authority. But relays should fall back to discovering their address and getting a consensus from other relays, if all the authorities fail. > > So maybe it will work anyway? We should do a test to make sure. I know these kinds of configurations are possible, but why is that and why are we OK with it. That's my point here, we should IMO change your stance to this being not supported behaviour. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33018#comment:12> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs