[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Prebuilding circuits?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Prebuilding circuits?
- From: Kees Vonk <keesvonk@xxxxxxxxx>
- Date: Thu, 13 Mar 2008 06:59:24 +0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 12 Mar 2008 18:59:45 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding; bh=NcgZ7mPnSZLVQsuvW7g3cOJffkf4lze9NrwIUPjsuOQ=; b=a8NmduhBxP43UkeUrMFO4hvjywsw/KrPbRpjXEMDPN1FbUGdJ8Kxw1ugAjZ1ANhvhMexvlaUJ4kiVPsmvTGLA0GVSkryVJYrzEZfUwtRYLsqIDFRKGiL9sPyyAjegjvryuAjLGbHyGKL5i+MixpjGHJl5uadeq4FKNRx0ISpAjc=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding; b=rLGYHbtomBsssTUEj5Y5Hqqr9wf7GRf9fBQ6VpY3AoNVBS9zZ+rQXtkP37+zMJe2AU7OQVytmu3hVpz33OKNAPIY4CfSYzoOMG97KK+f5f2w4N2MyYO/k2jfSCVLMxKlcTuCpgQI2UVwHzwXmq/Uv2fa7H88HvUbqRIzA/MnFfE=
- In-reply-to: <47D8401B.7000007@xxxxxxxxx>
- References: <47D79058.1030400@xxxxxxxxx> <47D8401B.7000007@xxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 188.8.131.52 (X11/20080227)
F. Fox wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Kees Vonk wrote:
I have found that while using Tor the first connection to a site always
times out. As I understand it, this is because Tor is still building a
circuit to the site in question.
First, a bit about Tor's circuitry:
Tor doesn't build circuits to sites - it builds circuits from a user to
an exit node. That exit node then makes "normal" (i.e., unencrypted)
connections to sites on the user's behalf (along with many other users).
(The exception to this are hidden services, which connect two circuits
together at a rendezvous point.)
I'm assuming that the site you mention is a "normal," unencrypted Web
site - i.e., port 80; let's call that site, Site X.
It is an encrypted site on a none standard port, would that make a
For a fixed amount of time - by default, 10 minutes - Tor will re-use
circuits. So, if you go to Site X, and then go to another site - let's
call it Site Y - before that time is up, then Site X and Site Y will use
the same circuit, come out the same exit, and have the same "virtual
identity" (the IP you take on from the point of view of the sites).
Next, a plausible explanation of what's going on:
Depending on the nodes that Tor chooses to build a circuit through -
usually chosen randomly - it may take a bit to build them. Overloaded or
slow nodes might be part of the cause of this.
If it's really a problem - or if you want to get some extra speed - you
might add this to your torrc:
That tends to favor fast nodes that aren't overloaded, at the tradeoff
of some of the added anonymity that an unlimited "Tor cloud" would provide.
That seems to improve things a little, but how bad would this trade off
be (I mean what percentage of Tor servers would be ignored because of this).