Fridolin 7C85 Jul 14 16:29:08 CEST 128821 server-side TLS handshakes 100821 onionskins decrypted 42149 routerdescs verified > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Hi relay and bridge operators, > > want to help us design hardware capabilities of a Torouter device? > > At the Florence hackfest I was asked for the typical number of RSA > operations performed by a relay or bridge, say, per day. We're mostly > interested in home-run relays and bridges on DSL lines and similar, > because that's where Torouter devices will be deployed, too. So, > Amunet and TorServers are out here. :) > > Tor has a built-in feature to count PK operations. If one sends a > USR1 signal to the tor process, it writes a line like this to its log > file (though this line comes from a client): > > Jul 10 18:31:22.904 [info] PK operations: 0 directory objects signed, > 0 directory objects verified, 0 routerdescs signed, 2968 routerdescs > verified, 216 onionskins encrypted, 0 onionskins decrypted, 30 > client-side TLS handshakes, 0 server-side TLS handshakes, 0 rendezvous > client operations, 0 rendezvous middle operations, 0 rendezvous server > operations. > > The number we're most interested in is "onionskins decrypted," but > maybe there are other high numbers that are worth considering. > > If you run a relay or bridge at home, run these four steps: > > 1. Make sure the relay or bridge is running for at least 24 hours > (longer is fine, shorter may skew results) > > 2. Send the process a USR1 signal, e.g., kill -USR1 $pid > > 3. Look for the log line above > > 4. Reply to this email with > a) the relay's or bridge's nickname, > b) the first four hex characters of its fingerprint, > c) the log time and timezone, > d) the top-3 PK operations by numbers. > > An example result could be: > > gabelmoo > F204 > Jul 10 18:31:22.904 CEST > 12345 onionskins decrypted > 2968 routerdescs verified > 216 onionskins encrypted > > Thanks for your help! > > Once I have some results, I'll look up relays and bridges in the > descriptor archive and post results to this list. > > Of course, if someone has more thoughts on measuring how many PK ops a > relay or bridge does, please say so! :) > > Thanks, > Karsten > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.12 (Darwin) > Comment: GPGTools - http://gpgtools.org > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iQEcBAEBAgAGBQJQAAjVAAoJEEk5d4GsWvIjWbMH/ilEf4dQrWqdFuZ5lYlWBnSb > PAd/ru2ygGFswW4CeWWNKNnkxVd+Dcd9smVjVcpUIxlrEeMXzrZqsICre992Cjsd > RjyXBnKIdwInwdVOi5ZyuWbmozCTbn5Oh3Bd47XFMDLNZIgC9itCdlGkU9Mw6bKB > KO7QfbtQCTjlBEe/4mYmpW4/H+NaG5V8b3ByWtuAJz614cxckPgR2UxnEtYQXm7p > TCRh/FC2jnc+7MrQZxBd6V6zLrudtdLCNLwdchGt7YBPMV3tyryvV6q/8v9ZY5jP > VQTW6pKb5kVH1drL4M7oCJtt7bDnxhOGg76C7uBjWiXoaYUp4zyfeTdc57FkreM= > =4Ex+ > -----END PGP SIGNATURE----- > _______________________________________________ > tor-relays mailing list > tor-relays@xxxxxxxxxxxxxxxxxxxx > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Attachment:
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays