Hello Roger, I also made some thoughts about making this test as effective as possible. I thought about HUPing the TOR process every 20 minutes. Do you think this will help? ~Josef Am 03.07.2015 um 10:56 schrieb Roger Dingledine: > On Thu, Jul 02, 2015 at 11:10:03PM +0200, Frédéric CORNU wrote: >> running : >> watch -n 20 wget -O /dev/null http://eujuuws2nacz4xw4.onion/ > I should point out that this approach should do one rendezvous with the > onion service, and then re-use that circuit for each following request, > until the circuit fails at which point it builds one more and repeats. > > While normal Tor circuits expire 10 minutes after the activity started, > circuits to onion services expire after 10 minutes of inactivity. We > chose that difference because the rendezvous process is so expensive > relative to normal Tor circuits. > > A better approach here would be to flush the circuits and hidden service > descriptor between fetches -- the onionperf tools that various folks > are working on has code for this I think. But it would indeed be more > complex than what you are doing here. :) > > --Roger >
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk