[tor-relays] Simulate High Tor Load

webmaster webmaster at defcon-cc.dyndns.org
Sun Jan 11 13:18:01 UTC 2015


Hi Julien,

thats exactly the setup I'm actually using. I use my relay as a client.

>From my point of view it seems that the relay is used as a entry point
(without guard flag) in this constellation (correct me if I'm wrong).

Torsocks could solve my problem.

My goal is to examine the influence of a high traffic load on my relay
to perhaps adjust my server settings (number of open file descriptors,
...).



Am 11.01.2015 um 13:05 schrieb Julien ROBIN:
> Hi,
> 
> If you are on a dedicated high Bandwidth server you can maybe use your relay as client, an idea could be to open a lot of "wget" commands.
> 
> sudo apt-get install torsocks
> usewithtor wget URL
> 
> But it's not guaranteed that the selected circuits will be super-fast (first reason to open lot of wgets simultaneously)
> 
> Of course, doing that you consume some useful bandwidth for users (but if it's quick, after all you're a Tor user like another!)
> 
> And it's not totally the same that relaying data as server, since it's using the client part of the tor process (but starting from here, I cannot help you anymore since I don't know what is written in the code ;)
> 
> So if anybody have another better idea
> Something that would generate a full customized circuit for example, or reduce the amount of used hop for the test. 
> 
> It already exists "EntryNodes" and "ExitNodes" commands for your torrc file, but no server can be used as EntryNode if it's not Guard already, and I'm not sure that some "MiddleNodes" command exists.
> 
> 
> Last things, you can also make you machine's CPU working hard on a lot of threads simultaneously, and watch if Tor is suffering or not (like "too many circuit creation request!" in the log).
> 
> Or make some tests with Iperf for high bandwidth load in parallel ("iperf -s" on a fast machine, "ipers -c Ip -t TimeInSeconds -p port -P ParallelsTcpConnexions" on the other machine - this one will send data (chains of 1234567890123...) to the server)
> 
> Good luck ! By curiosity, I'm interested also, but I would understand if this kind of easiness in creating bandwidth statistics and degraded path (for analysis, for example) is not really sought by developers.
> 
> Best regards,
> Julien ROBIN
> 
> 
> 
> ----- Mail original -----
> De: "webmaster" <webmaster at defcon-cc.dyndns.org>
> À: tor-relays at lists.torproject.org
> Envoyé: Dimanche 11 Janvier 2015 11:59:12
> Objet: [tor-relays] Simulate High Tor Load
> 
> Hey Folks,
> 
> is there a common procedure for testing a tor server for a high load?
> 
> Thanks in advance
> 
> 

-- 
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.17 (MingW32)

mQENBFHMmT8BCAC0smvU7Bq1ABxAhvBRn7d4ekkk95aCE4TTQo4wy1z/rGLhQfdt
dhiD+Vy61vGrsdK3ei5sW6rBvX2m8+YmBi+8AAgSiZmS0JM3Zz3cmTi5oh0D/yM8
4aDj7wQYfJyzSmYN8InAQ5eA77lwIdqG27kR9wga2szeJwCnWReta0R+7YFkpUW+
zUlf4SWcUx5SmBsaiELQpm+Qcn+fyopo12RX6YVmoNPBvN2nDXDnRhUCKGc+0xhD
UrBpCHrApK6sTnMsD34ClCLTL2L1gckQ0AsQqY3PJlx3R8kIJxlmr6R3WnjPMIG0
lqrukB9PcOrHM1MZXK1gK6AtypHBN98lr8Z9ABEBAAG0KndlYm1hc3RlciA8d2Vi
bWFzdGVyQGRlZmNvbi1jYy5keW5kbnMub3JnPokBPgQTAQIAKAUCUcyZPwIbIwUJ
CWYBgAYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQcN1vxvRQl+0SEwf+KXjf
YtiSUSVS11uqeQ/8g46NwmNa91P3toZvEd7vhLSbjnL9bi/vApzNnUTGT3VP4/NA
dg9SbR4qKlSr8T+YikRMV3tiuiVq8m7g00qM9y8MIomwJTounz8VdO/aJXFSOxAK
Bb6ElREADspCzr2qSZCnozWUzbd+b8owbGeRRq3e33Aa5Nlm/xDRxGDWANbaIA8q
Gkibvy3vWEwrxiwsakvHGaEZnPEtlNm3M1xcmFAuyl73qzUMkLN0u9E/2igo4EB5
EdMb5Ab5hfWdljxBqJr0tsvMfSK4VkzMCbKYkTqHZIRPQnhiSBE6Yo1Q6RCl/Hht
bkvU4RA0J+NkXMZljrkBDQRRzJk/AQgA0HojJnK0uhEkAnbmszYsf477DV+LD02s
ZEAlLGhJlf9qYaDiPMPwaZ3nK8/PYKzPpBWfHgRQP97rLHPIVJYl3BHDa/nWeZ2b
e/HzYhpX0djbK9qe6W/CTfGbXmC/y+4dDGB8dvtTAW3JILm7xEdwiWtywozEVy7V
lnMK4JQvlfOh+3XO6qv71FXyuRkObvkYzqvxUYHewtvvObcVxXHP0C0O6LB44iAW
2boZVVuiHdudnyNAezJajPMUT8SnI0bwL6+0TgnHL4cKNUEPQljIrrvi+9nCkq7V
uBtnsYtyoo2reoxmCbX/Z1zZsxdUcKpeJHlc5AypyN8DUJ+APJ9NnwARAQABiQEl
BBgBAgAPBQJRzJk/AhsMBQkJZgGAAAoJEHDdb8b0UJftOY0H/1TChmQrJC/qzefW
PK7EqFlBg3TIEXdu8JHjF42ZOgzQRfp7E2wWzEx0Y45lNXMs6Yg15hWCEDaUDF6F
5WZKNrP8xIldyR9Aw7fyKqjZ9UuKovqofHsCiaSO7nWzGM6GF3nBDNI9NcFve/wN
wggyjAbohOJrJGal3N0HlG3cakqjEmjBe1gQEMC0ZPlWstb/cqqr49TNPrRmQc4P
SyGffh8Xqhw94m1LDBXFEaYe7AxjNk1sPAVfO1rOdLF6GOun/UwgbhDQX/Rb9C3t
AhjSgyFEiR/gfrUZ7R6SY51qOUf1lN5ZN85C/x27XoZWYlsNaH3Ei6nG+yeswBMk
ZRMbezQ=
=Med3
-----END PGP PUBLIC KEY BLOCK-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0xF45097ED.asc
Type: application/pgp-keys
Size: 1746 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20150111/6cc49548/attachment.key>


More information about the tor-relays mailing list