[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] help needed to stress-test an onionbalanced HS - everyone is invited



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hi,

Following the alpha release of OnionBlanace, I played with it today.
It is easy to install and use, no advanced skills required. I will try
to write tutorials and publish them, but it's pretty easy, basically
it's just editing few config files. The existing documentation is neat
and easy to understand.

Using OnionBalance 0.1.1 Alpha and Tor 0.2.7.1-alpha-dev, I have
configured a hidden service (web site) running OnionBalance with 5
failback servers (different Tor processes, different servers, etc.).

What I want is to stress test it, and see how does OnionBalance spread
the load between the failback servers (will count the hits on each
server and make an average, see how they are rotated).

For anyone who wants to help, please request/load the hidden service
as much as possible and spread it around. For users who can, it might
be helpful to add a cronjob under an unprivileged user to fetch the
page via torified wget and send it to > dev/null or automate the
process by other means. Simply stress test this hidden service like
you hate it ;)

The page is just some random generated text, plain static html (no
javascript, no flash, other naughty stuff) and it's about 140KB.

http://eujuuws2nacz4xw4.onion/

The OnionBalance hidden service will stay up for 15 days. During this
time I will analyze the logs and count the hits on each server. I
don't see what else I can count besides page hits - any other
application optimizations behind a hidden service are not related to
Tor. Results will be made public on the mail list. Hope this will help
us understand better hidden service scalability and implement prop 224
in the best possible way, considering all aspects.

Counting starts July 1st 2015 18:00 UTC.


Thanks!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBCAAGBQJVlDU0AAoJEIN/pSyBJlsRL1AIAKnO3y0OZ9lgt79e8tPyShsn
a2GsGiGTgb8qZJOoTgprkak5tuwhIS0/464h5nrUj7r6B4eT+Qa0igqK/tm+BKDw
JzrP0K56FZiBz4JVq4sBjs6xVZBR00vxAolB7EF14duZSwLo/Vu+jcRWEqsUhXpG
eTDPWhWCNFgLrDGBi9r3hmyb7qMgFbhJyHzoWwyV1kcg4qitOd05pmcomqfcKhs1
UyV2tf3LSJ9gD/5PMUUgafl6fTZp1vf1pa9IoWQveKLHZ07OmpQn7OzmoUtc+ZIn
lnIY3xViHnbU/CY3RZBtgQAGBVVA+d755nitGc+IsqjwIuhGGeQAm7Ll6WzAmc4=
=6FvT
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk