[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #1948 [Metrics]: Why do we do so many SSL ops?



#1948: Why do we do so many SSL ops?
---------------------+------------------------------------------------------
 Reporter:  arma     |       Owner:  karsten
     Type:  task     |      Status:  new    
 Priority:  normal   |   Milestone:         
Component:  Metrics  |     Version:         
 Keywords:           |      Parent:         
---------------------+------------------------------------------------------
 While we're working on #1749, we should also try to get a better handle on
 why our SSL handshakes are happening.

 Are they happening in bursts? A lot at certain times of day? A lot soon
 after boot and fewer as time goes by? A lot from a small number of
 addresses? Mostly incoming or mostly outgoing?

 We have some infrastructure in place already to notice these calls -- see
 note_crypto_pk_op() and dump_pk_ops(). So maybe a good plan is to expand
 those, and either log interesting points with a timestamp for later
 reconstruction, or add a controller event, depending on how we want to
 drive the stats collection.

 Of course, recording Tor IP addresses that are probably non-relays should
 be done with care. Probably even timestamps plus relay IP addresses is
 sensitive. At the last, we should avoid publishing reports with useful
 addresses in them. I would recommend not wasting too much time building a
 fancy black box combination gizmo though, because it won't be worth it.

 General long-term trends might be useful too. Nick suggested putting those
 in the relay's extra-info descriptors.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1948>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs