[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] OnionBalance Hidden Service has over 1 million successful hits in just 3 days
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello,
If anyone still has scripts to automate requests to
http://eujuuws2nacz4xw4.onion/ (OnionBalance hidden service) it is
time to shut them down. I am sending this notification because I have
turned off the hidden service, and if someone keeps such scripts
running they will just request descriptors which don't exist any more
at the HSDirs.
I was able to test the hidden service better by building many separate
rendezvous circuits for each request regularly. Need some time to
analyze the logs and will send a detailed report.
Thanks.
On 7/14/2015 4:01 AM, Thomas White wrote:
> s7r requested I post the second round of log breakdowns, here it
> is:
>
> HTTP Code: 200 (OK) Bandwidth used (bytes): 1,457,612,885,805 Hits:
> 10,116,575
>
> HTTP Code: 206 (Partial Content RFC 7233) Bandwidth used (bytes):
> 5,751,202 Hits: 73
>
> HTTP Code: 304 (Not Modified) Bandwidth used (bytes): 124,620 Hits:
> 620
>
> HTTP Code: 404 (Not Found) Bandwidth used (bytes): 285,185 Hits:
> 657
>
> HTTP Code: 403 (Forbidden) Bandwidth used (bytes): 2,908 Hits: 7
>
> HTTP Code: 408 (Request Timeout) Bandwidth used (bytes): 0 Hits:
> 11,205
>
> Total bandwidth usage (bytes): 1,457,619,049,720 (1.457 TB) Total
> hits: 10,129,137
>
> The above figures do not match s7r's total due to the first set of
> log files not being in the downloads, but it isn't a huge
> difference and is in proportion to the previous results.
>
> T
>
>
>
>
> On 13/07/2015 23:54, s7r wrote:
>> Hello,
>
>> Here are the latest counts for the OnionBalace hidden service
>> http://eujuuws2nacz4xw4.onion/ :
>
>> Failback instance #1: 2329348 Failback instance #2: 1822384
>> Failback instance #3: 2025677 Failback instance #4: 2109677
>> Failback instance #5: 2202052 ================================
>> *TOTAL: 10489138*
>
>> Uptime is ~2 weeks. We have passed the 10 million threshold, not
>> bad, especially for a ~2 week period of time. Logs are here:
>> https://www.sky-ip.org/onionbalance/
>
>> Each failback instance had 2 introduction points in the master
>> descriptor.
>
>> Thanks to everyone who contributed in this! Please stop the
>> automated scripts which connect to this hidden service now. I am
>> temporarily shutting it down for 1 or 2 days, in order to install
>> a script which will collect rendezvous circuit statistics on
>> each failback instance. We need this info since we can't say how
>> many clients or circuits made the 10 million successful hits
>> from above.
>
>> In the next part of the test we will make sure we use a separate
>> rendezvous circuit for each request, using a modified third
>> party script with -tor-auto-isolate. This is extremely high load
>> on the network and it's VERY RUDE to do it in the wild with
>> Guards (also responsible for other users traffic). For this
>> reason, I have asked TheCthulhu for a high end server where I've
>> setup a non-public bridge to be used for this. This way, at least
>> we won't be hammering on Guards. I want to run it for shorter
>> period of time (max. 72 hours), but at 'full speed'.
>
>> Who is interested and able to help, please email me directly and
>> I'll provide the necessary tools and info.
>
>> Results and logs will be made public immediately after. I want
>> to see how many different rendezvous circuits can be created with
>> a hidden service (failback instance) if it has only 2
>> introduction points in the master descriptor and how many such
>> circuits will each server take. It might be helpful for deciding
>> related to prop 224 (next generation hidden services) - merging
>> HSDirs and IPs - how many of them should a hidden service have by
>> default.
>
>
>> On 7/8/2015 5:07 PM, Thomas White wrote:
>>> Just to expand on s7r's number, I just pulled the latest logs
>>> from the servers and compiled a quick breakdown of the HTTP
>>> codes, bandwidth etc for anyone interested:
>
>>> HTTP Code: 200 (OK) Bandwidth used (bytes): 690,400,220,422
>>> Hits: 4,784,288
>
>
>>> HTTP Code: 206 (Partial Content) Bandwidth used (bytes):
>>> 5,202,918 Hits: 64
>
>
>>> HTTP Code: 304 (Not Modified) Bandwidth used (bytes): 52,059
>>> Hits: 259
>
>
>>> HTTP Code: 404 (Not Found) Bandwidth used (bytes): 266,053
>>> Hits: 611
>
>
>>> HTTP Code: 403 (Forbidden) Bandwidth used (bytes): 2,908 Hits:
>>> 7
>
>
>>> HTTP Code: 408 (Request Timeout) Bandwidth used (bytes): 0
>>> Hits: 5,442
>
>
>>> Total bandwidth usage (bytes): 690,405,744,360 (690 GB)
>
>>> Total hits: 4,790,671
>
>
>>> Not bad for a few days work guys!
>
>>> T
>
>
>
>
>>> On 08/07/2015 03:00, s7r wrote:
>>>> *Numbers look good: Over 4 million hits in 7 days.*
>
>>>> I want again to use this opportunity to say THANK YOU to
>>>> everyone who is contributing and stress testing. 4 million
>>>> requests tell me people are putting quite some effort into
>>>> it. Please continue to stress test as much as you can in the
>>>> next days. After I collect some rendezvous circuit stats
>>>> also, we will stop the test - don't want to overkill the
>>>> network, prefer to leave more bandwidth capacity for users.
>
>>>> I was waiting to have some rendezvous circuit statistics as
>>>> well, to compare them with the hits on the webserver and
>>>> have an overview on the circuits stats and average number of
>>>> requests per circuit. Hopefully this will happen in the next
>>>> days. Since you asked, here are the exact numbers now.
>
>>>> The service was started 1st July 2015. Here are the counts
>>>> today, 8th July (little over 7 days of uptime):
>
>>>> Failback instance #1: 956281 Failback instance #2: 732187
>>>> Failback instance #3: 837818 Failback instance #4: 768636
>>>> Failback instance #5: 911546 =============================
>>>> TOTAL: 4206468
>
>>>> There are no significant warnings or errors - the same
>>>> instances are running since service first started, no reboot
>>>> or application restart. I am happy with how it works. As you
>>>> can see we have *over 4 million hits*. The number of
>>>> requests per failback instance confirms the load is fairly
>>>> spread.
>
>>>> Hidden service http://eujuuws2nacz4xw4.onion/ up and strong!
>
>>>> On 7/8/2015 1:48 AM, tqr2813d376cjozqap1l@xxxxxxxxxxxx
>>>> wrote:
>>>>> 4. Jul 2015 22:57 by s7r@xxxxxxxxxx
>>>>> <mailto:s7r@xxxxxxxxxx>:
>
>>>>> After little over 3 days of uptime, the OnionBalance hidden
>>>>> service http://eujuuws2nacz4xw4.onion
>>>>> <http://eujuuws2nacz4xw4.onion/> was successfully accessed
>>>>> over 1 Million times. There was no complaint in any of the
>>>>> running Tor instance s.
>
>
>
>>>>> Hey s7r, things still looking OK? How are the numbers now?
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
iQEcBAEBCAAGBQJVs5XvAAoJEIN/pSyBJlsRPpUH/0ZDCG9N5mI/DqerU7i4PJpQ
r8lV+AIWd8Dbz/2gfIA4AC983K/ij8riBseqK4au/OLHGnMrUnL2Ib4th+MxGipU
0h6wHY6arSUlSYJCxl0LD5p9Ht4uwaZKtfTchQQPOBdZHcgcqD1SwHrkjfU+TV0B
4YGssMMmW6qiX6lMmQD+hEZ9w6XfxaQBpMXmXawf+OSYpyez6XiBJBm/v6jokD9E
W2KOwjy1E3Z+K8H23/w8AzKbU6KzTw+c6LXHQrt07UK/jf2q7TDz969HpPmZEEYK
ncoQKymgQVhuspOEGVyLLOGJqBjztdzv6DDZT38aEO5O7DR7L1n4Vjfs/xL37N0=
=JuSw
-----END PGP SIGNATURE-----
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk