Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
Trac
Trac
  • Project overview
    • Project overview
    • Details
    • Activity
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Operations
    • Operations
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Create a new issue
  • Issue Boards

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • Legacy
  • TracTrac
  • Issues
  • #24797

Closed (moved)
Open
Opened Jan 04, 2018 by teor@teor

Add an option that makes Tor use fewer connections

Tor is willing all the file descriptors the OS tells it are available for the current user. So to enforce a connection limit, operators need to drop the user file descriptor limit. But if the OS is wrong, or there are multiple tor instances under the user, tor can easily exceed this limit. Or machine hits a kernel, RAM, or CPU limit first, then the user might want to artificially limit connections.

Right now, we have ConnLimit, which looks like it limits connections, but it's actually a minimum. And we have the out of socket check, but DisableOOSCheck is the default.

Does enforcing a connection limit require us to set DisableOOSCheck 0? Then we should move this ticket to 0.3.4, and open one to improve the out of socket check.

To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
Tor: unspecified
Milestone
Tor: unspecified
Assign milestone
Time tracking
None
Due date
None
Reference: legacy/trac#24797