AFAIK Optimizations that reduce round trips, including that one, are very desirable for websites accessed over Tor. The communication with a website uses TCP, SSL, and HTTP as normal, TCP acks, etc are still needed and transported over SOCKS. So optimizations there will reduce time to first byte for the website accessed over Tor, and with Tor's increased latency, it's even more pronounced. Win.
But for TLS used in Tor itself, it's not as analogous. The analogous optimization would be looking at the cell protocol and see if cells are small enough to fit in the initial congestion window. I don't know, but what I would look for is something like Alice sending cells to Bob, but Bob can't reply to Alice's cells because Bob needs more data, but Alice needs to hear Bob's ACK before sending the rest of the data.
Hi,
i've been reading the article "Optimizing NGIX TLS time for first byte"
below:
http://www.igvita.com/2013/12/16/optimizing-nginx-tls-time-to-first-byte
I've been thinking whenever that kind of optimization does apply also to
Tor or not?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev