[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #13855 [Tor Messenger]: Use known onions for XMPP servers



#13855: Use known onions for XMPP servers
-------------------------+-------------------------------------------------
     Reporter:  arlolra  |      Owner:  sukhbir
         Type:  defect   |     Status:  reopened
     Priority:  normal   |  Milestone:
    Component:  Tor      |    Version:
  Messenger              |   Keywords:  TorMessengerPublic, usability,
   Resolution:           |  UI/UX
Actual Points:           |  Parent ID:  #14161
       Points:           |
-------------------------+-------------------------------------------------

Comment (by arlolra):

 These sentences are paraphrased from a discussion on IRC with dgoulet.

 Using the onions by default has the potential to bring these services (or
 their guards) to their knees. Some experiments show HSs as unusable with
 around 60 to 100 client connections with data in transit. ~30% of the
 whole CPU/tor process is crypto at that load, which for the most part
 doesn't make use of multiple cores. Until that's fixed or DonnchaC's HS
 load balancing comes along, maybe we don't want that as the default.

 A better starting point may be to make it easier to configure the onions.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13855#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs