[tor-relays] How many PK operations does a typical home-run relay or bridge do in 24 hours?

kupo at damnfbi.tk kupo at damnfbi.tk
Wed Jul 18 03:01:19 UTC 2012


Loki 
<https://atlas.torproject.org/#details/088ADAB38DA02BD83286872120F85259D44DED88>
088A
Wed Jul 18 02:58:22 GMT 2012
3620058 onionskins decrypted
1258679 server-side TLS handshakes
544478 client-side TLS handshakes

(lil late, sorry)
-kupo

On 07/13/2012 11:39 AM, Karsten Loesing wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi relay and bridge operators,
>
> want to help us design hardware capabilities of a Torouter device?
>
> At the Florence hackfest I was asked for the typical number of RSA
> operations performed by a relay or bridge, say, per day.  We're mostly
> interested in home-run relays and bridges on DSL lines and similar,
> because that's where Torouter devices will be deployed, too.  So,
> Amunet and TorServers are out here. :)
>
> Tor has a built-in feature to count PK operations.  If one sends a
> USR1 signal to the tor process, it writes a line like this to its log
> file (though this line comes from a client):
>
> Jul 10 18:31:22.904 [info] PK operations: 0 directory objects signed,
> 0 directory objects verified, 0 routerdescs signed, 2968 routerdescs
> verified, 216 onionskins encrypted, 0 onionskins decrypted, 30
> client-side TLS handshakes, 0 server-side TLS handshakes, 0 rendezvous
> client operations, 0 rendezvous middle operations, 0 rendezvous server
> operations.
>
> The number we're most interested in is "onionskins decrypted," but
> maybe there are other high numbers that are worth considering.
>
> If you run a relay or bridge at home, run these four steps:
>
>   1. Make sure the relay or bridge is running for at least 24 hours
> (longer is fine, shorter may skew results)
>
>   2. Send the process a USR1 signal, e.g., kill -USR1 $pid
>
>   3. Look for the log line above
>
>   4. Reply to this email with
>     a) the relay's or bridge's nickname,
>     b) the first four hex characters of its fingerprint,
>     c) the log time and timezone,
>     d) the top-3 PK operations by numbers.
>
> An example result could be:
>
> gabelmoo
> F204
> Jul 10 18:31:22.904 CEST
> 12345 onionskins decrypted
> 2968 routerdescs verified
> 216 onionskins encrypted
>
> Thanks for your help!
>
> Once I have some results, I'll look up relays and bridges in the
> descriptor archive and post results to this list.
>
> Of course, if someone has more thoughts on measuring how many PK ops a
> relay or bridge does, please say so! :)
>
> Thanks,
> Karsten
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iQEcBAEBAgAGBQJQAAjVAAoJEEk5d4GsWvIjWbMH/ilEf4dQrWqdFuZ5lYlWBnSb
> PAd/ru2ygGFswW4CeWWNKNnkxVd+Dcd9smVjVcpUIxlrEeMXzrZqsICre992Cjsd
> RjyXBnKIdwInwdVOi5ZyuWbmozCTbn5Oh3Bd47XFMDLNZIgC9itCdlGkU9Mw6bKB
> KO7QfbtQCTjlBEe/4mYmpW4/H+NaG5V8b3ByWtuAJz614cxckPgR2UxnEtYQXm7p
> TCRh/FC2jnc+7MrQZxBd6V6zLrudtdLCNLwdchGt7YBPMV3tyryvV6q/8v9ZY5jP
> VQTW6pKb5kVH1drL4M7oCJtt7bDnxhOGg76C7uBjWiXoaYUp4zyfeTdc57FkreM=
> =4Ex+
> -----END PGP SIGNATURE-----
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20120718/6bb4615a/attachment.html>


More information about the tor-relays mailing list