[tor-bugs] #23722 [Core Tor/Tor]: Somebody should profile a Tor 0.3.1.7 relay

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Oct 7 03:11:19 UTC 2017


#23722: Somebody should profile a Tor 0.3.1.7 relay
--------------------------+------------------------------------
 Reporter:  arma          |          Owner:  (none)
     Type:  enhancement   |         Status:  new
 Priority:  Medium        |      Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------------------

Comment (by Hello71):

 Replying to [comment:5 nickm]:
 > Weird! Was the server seeing much traffic at the time? I'm surprised
 that none of the compression algorithms, digest algorithms, or AES
 appeared on profile.

 well, consensus updates are uncommon, and AES-NI is very fast. suppose
 that you get https://calomel.org/aesni_ssl_performance.html performance,
 then if your relay is 100 megabit/sec and you can do 1700 megabyte/sec
 AES, then by my calculations, you should spend about 0.7% CPU time in AES.
 coincidentally, we have symbols in libcrypto.so at 0.60% and 0.54%.
 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1598529 is probably
 relevant, upgrading your kernel will probably help.

 as I said on IRC, KIST incidentally moderately improves CPU usage by
 calling epoll_ctl at a reasonable rate instead of the ridiculousness that
 was before.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23722#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list