[tor-relays] How many PK operations does a typical home-run relay or bridge do in 24 hours?

Anton Korec anton.korec at tritony.org
Sat Jul 14 14:47:55 UTC 2012


Fridolin
7C85
Jul 14 16:29:08 CEST
128821 server-side TLS handshakes
100821 onionskins decrypted
42149 routerdescs verified

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi relay and bridge operators,
> 
> want to help us design hardware capabilities of a Torouter device?
> 
> At the Florence hackfest I was asked for the typical number of RSA
> operations performed by a relay or bridge, say, per day.  We're mostly
> interested in home-run relays and bridges on DSL lines and similar,
> because that's where Torouter devices will be deployed, too.  So,
> Amunet and TorServers are out here. :)
> 
> Tor has a built-in feature to count PK operations.  If one sends a
> USR1 signal to the tor process, it writes a line like this to its log
> file (though this line comes from a client):
> 
> Jul 10 18:31:22.904 [info] PK operations: 0 directory objects signed,
> 0 directory objects verified, 0 routerdescs signed, 2968 routerdescs
> verified, 216 onionskins encrypted, 0 onionskins decrypted, 30
> client-side TLS handshakes, 0 server-side TLS handshakes, 0 rendezvous
> client operations, 0 rendezvous middle operations, 0 rendezvous server
> operations.
> 
> The number we're most interested in is "onionskins decrypted," but
> maybe there are other high numbers that are worth considering.
> 
> If you run a relay or bridge at home, run these four steps:
> 
>  1. Make sure the relay or bridge is running for at least 24 hours
> (longer is fine, shorter may skew results)
> 
>  2. Send the process a USR1 signal, e.g., kill -USR1 $pid
> 
>  3. Look for the log line above
> 
>  4. Reply to this email with
>    a) the relay's or bridge's nickname,
>    b) the first four hex characters of its fingerprint,
>    c) the log time and timezone,
>    d) the top-3 PK operations by numbers.
> 
> An example result could be:
> 
> gabelmoo
> F204
> Jul 10 18:31:22.904 CEST
> 12345 onionskins decrypted
> 2968 routerdescs verified
> 216 onionskins encrypted
> 
> Thanks for your help!
> 
> Once I have some results, I'll look up relays and bridges in the
> descriptor archive and post results to this list.
> 
> Of course, if someone has more thoughts on measuring how many PK ops a
> relay or bridge does, please say so! :)
> 
> Thanks,
> Karsten
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iQEcBAEBAgAGBQJQAAjVAAoJEEk5d4GsWvIjWbMH/ilEf4dQrWqdFuZ5lYlWBnSb
> PAd/ru2ygGFswW4CeWWNKNnkxVd+Dcd9smVjVcpUIxlrEeMXzrZqsICre992Cjsd
> RjyXBnKIdwInwdVOi5ZyuWbmozCTbn5Oh3Bd47XFMDLNZIgC9itCdlGkU9Mw6bKB
> KO7QfbtQCTjlBEe/4mYmpW4/H+NaG5V8b3ByWtuAJz614cxckPgR2UxnEtYQXm7p
> TCRh/FC2jnc+7MrQZxBd6V6zLrudtdLCNLwdchGt7YBPMV3tyryvV6q/8v9ZY5jP
> VQTW6pKb5kVH1drL4M7oCJtt7bDnxhOGg76C7uBjWiXoaYUp4zyfeTdc57FkreM=
> =4Ex+
> -----END PGP SIGNATURE-----
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20120714/e177e9e5/attachment.pgp>


More information about the tor-relays mailing list