[tor-bugs] #13855 [Tor Messenger]: Use known onions for XMPP servers

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jun 29 22:04:12 UTC 2015


#13855: Use known onions for XMPP servers
-------------------------+-------------------------------------------------
     Reporter:  arlolra  |      Owner:  sukhbir
         Type:  defect   |     Status:  reopened
     Priority:  normal   |  Milestone:
    Component:  Tor      |    Version:
  Messenger              |   Keywords:  TorMessengerPublic, usability,
   Resolution:           |  UI/UX
Actual Points:           |  Parent ID:  #14161
       Points:           |
-------------------------+-------------------------------------------------

Comment (by arlolra):

 These sentences are paraphrased from a discussion on IRC with dgoulet.

 Using the onions by default has the potential to bring these services (or
 their guards) to their knees. Some experiments show HSs as unusable with
 around 60 to 100 client connections with data in transit. ~30% of the
 whole CPU/tor process is crypto at that load, which for the most part
 doesn't make use of multiple cores. Until that's fixed or DonnchaC's HS
 load balancing comes along, maybe we don't want that as the default.

 A better starting point may be to make it easier to configure the onions.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13855#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list