[tor-talk] help needed to stress-test an onionbalanced HS - everyone is invited

Frédéric CORNU fcornu at wardsback.org
Fri Jul 3 09:08:51 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Le 03/07/2015 10:56, Roger Dingledine a écrit :
> On Thu, Jul 02, 2015 at 11:10:03PM +0200, Frédéric CORNU wrote:
>> running :
>> watch -n 20 wget -O /dev/null http://eujuuws2nacz4xw4.onion/
> 
> I should point out that this approach should do one rendezvous with th
e
> onion service, and then re-use that circuit for each following request
,
> until the circuit fails at which point it builds one more and repeats.
> 
> While normal Tor circuits expire 10 minutes after the activity started
,
> circuits to onion services expire after 10 minutes of inactivity. We
> chose that difference because the rendezvous process is so expensive
> relative to normal Tor circuits.
> 
> A better approach here would be to flush the circuits and hidden servi
ce
> descriptor between fetches -- the onionperf tools that various folks
> are working on has code for this I think. But it would indeed be more
> complex than what you are doing here. :)
> 
> --Roger
> 

Hi,

I'm not very familiar with the server-side aspect of HS. Maybe s7r can
give us details about how OnionBalance works, related to incomming
circuits. So we can tell which one of the approach you describe is best
for his tests.

Cheers

- -- 
Frédéric CORNU
http://wardsback.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iF4EAREIAAYFAlWWUR8ACgkQieXg+ErX/wPPZgD9HYcku3tREdfzHBAW23a188ec
I7XfMEAJSV8GgpeNWgsBAIxx5OB0HkKuvnqxrzG1vgjXtYVVqaH7Hi/HEUDTJ5jG
=deia
-----END PGP SIGNATURE-----


More information about the tor-talk mailing list