Understand code performance of onion services under DoS
We need to do the following experiments to understand more about the performance of Tor under simulated DoS conditions:
-
Get vanilla profile (for legacy/trac#30221 (moved)) [VANILLA profile] [Also get with INTRO2 rate limiting]
-
See effect of DoS on intro and guard [VANILLA profile] [Also with INTRO2 rate limiting]
-
Investigate control port experiment (with STREAM events enabled and trying to kill circs with CLOSECIRCUIT) [VANILLA profile] wrt https://lists.torproject.org/pipermail/tor-dev/2019-December/014097.html
NEED: Controller script that logs circuit events and tries to kill some circuits [asn]
-
Investigate size of replay cache (legacy/trac#26294 (moved)) [VANILLA profile] [asn]
-
Investigate capacity of reestablish intro circuit (legacy/trac#26294 (moved)) [VANILLA profile]
-
Compare intro/rend profiles (value of prop255 / legacy/trac#17254 (moved)) [VANILLA profile]
7~) Investigate horizontal scaling with OB (scale to 2/4/8 instances, extrapolate onwards.) [OBv3 profile]
8~) Investigate pinned paths with HSLayer2Node HSLayer3Node [Vanguard profile]