[tor-bugs] #15251 [Core Tor/Tor]: Make tor support starting with 10.000 Tor Hidden Service

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Nov 30 21:26:18 UTC 2017


#15251: Make tor support starting with 10.000 Tor Hidden Service
------------------------------------------+--------------------------------
 Reporter:  naif                          |          Owner:  (none)
     Type:  task                          |         Status:  new
 Priority:  Low                           |      Milestone:  Tor:
                                          |  unspecified
Component:  Core Tor/Tor                  |        Version:  Tor:
                                          |  unspecified
 Severity:  Normal                        |     Resolution:
 Keywords:  tor-hs, scalability, tor-dos  |  Actual Points:
Parent ID:                                |         Points:  10
 Reviewer:                                |        Sponsor:
------------------------------------------+--------------------------------

Comment (by teor):

 Replying to [comment:14 naif]:
 > Replying to [comment:13 asn]:
 > > It's possible that 10k onion services on a single host will probably
 wreck your guard(s) because of the amount of introduction/HSDir circuits,
 even if mots of them are low/zero traffic.
 >
 > That's a thing, wondering if the Facebook-alike optimisation (where it
 does not require Server Location Anonimity) can help with that setup, or
 if it would require some different kind of of crypto-circuits-related
 aspects?


 Single onion services don't have guards. They do HSDir posts over a 3-hop
 path (but with no set guard) to avoid denial of service, but do intro and
 rendezvous over a single-hop path.

 You should set the 2 options needed to turn single onion services on.
 Check the man page for their exact spellings. You'll probably also need
 "SOCKSPort 0".


 > …
 > > > If someone is going or willing to support Tor debugging to achieve
 that goal, we'll be more than happy.
 > >
 > > I'm interested in helping you with this, so that you achieve your
 goals without damaging the network. Perhaps we can do an IRC meeting or
 something?
 >
 > Perfect, if you can join #globaleaks channel there's evilaliv3 that's
 doing today some preliminary testing with 500 onion address, inserting 10
 onion address every 5 minutes, then trying to see what happen as we create
 a "network blackout" of few minutes.


 Try restarting the tor instance as well. #22210 happens on startup.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15251#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list