Understand code performance of onion services under DoS
We need to do the following experiments to understand more about the performance of Tor under simulated DoS conditions: 1) Get vanilla profile (for legacy/trac#30221) [VANILLA profile] [Also get with INTRO2 rate limiting] 2) See effect of DoS on intro and guard [VANILLA profile] [Also with INTRO2 rate limiting] 3) Investigate control port experiment (with STREAM events enabled and trying to kill circs with CLOSECIRCUIT) [VANILLA profile] wrt ​https://lists.torproject.org/pipermail/tor-dev/2019-December/014097.html NEED: Controller script that logs circuit events and tries to kill some circuits [asn] 4) Investigate size of replay cache (legacy/trac#26294) [VANILLA profile] [asn] 5) Investigate capacity of reestablish intro circuit (legacy/trac#26294) [VANILLA profile] 6) Compare intro/rend profiles (value of prop255 / legacy/trac#17254) [VANILLA profile] 7~) Investigate horizontal scaling with OB (scale to 2/4/8 instances, extrapolate onwards.) [OBv3 profile] 8~) Investigate pinned paths with HSLayer2Node HSLayer3Node [Vanguard profile]
issue