I have several hundred thousand (or million? Haven't counted) hs descriptors saved on my hard disk from a data collection experiment (from 70k HSes). I'm a bit nervous about sharing these en masse as whilst not confidential they're supposed to be difficult to obtain in this quantity. However, if someone wants to write a quick script that goes through all of them and counts the number of authenticated vs nonauthed then I do not mind running it on the dataset and publishing the results. I have a directory where each file is a hs descriptor.
The introduction point data is base64 encoded plaibtext when unauthed or has high entropy otherwise.
Best
Gareth
George K:
I suspect that HS authorization is very rare in the current network,
and if we believe it's a useful tool, it might be worthwhile to make
it more useable by people.
Is anyone making their HSDir onion descriptor scraping patches
available somewhere? I'd suspect the rarity of HS authorization
could also be determined with that since some fields would be
obfuscated and thus not match patterns.
s/scraping/logging/
rend--spec.txt:
2. Authentication and authorization.
2.1. Service with large-scale client authorization
2.2. Authorization for limited number of clients
2.3. Hidden service configuration
2.4. Client configuration
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev