Delivery-Date: Wed, 01 Jul 2015 19:49:22 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,URIBL_BLACK autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id B0A411E0EF8;
	Wed,  1 Jul 2015 19:49:20 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9A3E931ED1;
	Wed,  1 Jul 2015 23:49:15 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id EB2BA30657
 for <tor-talk@lists.torproject.org>; Wed,  1 Jul 2015 23:49:11 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 78EVpYkLwCPH for <tor-talk@lists.torproject.org>;
 Wed,  1 Jul 2015 23:49:11 +0000 (UTC)
Received: from outbound.mailhostbox.com (outbound.mailhostbox.com
 [162.222.225.21])
 by eugeni.torproject.org (Postfix) with ESMTP id CD9DD283B2
 for <tor-talk@lists.torproject.org>; Wed,  1 Jul 2015 23:49:11 +0000 (UTC)
Received: from [0.0.0.0] (atlantic480.us.unmetered.com [188.138.9.49])
 (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits))
 (No client certificate requested)
 (Authenticated sender: s7r@sky-ip.org)
 by outbound.mailhostbox.com (Postfix) with ESMTPSA id 0A64E782A08
 for <tor-talk@lists.torproject.org>; Wed,  1 Jul 2015 23:49:07 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sky-ip.org;
 s=20110108; t=1435794548;
 bh=v6ULTymQKEtSBi8qrRaNBmJHqPTdYglBaHfoTvk2O40=;
 h=Date:From:Reply-To:To:Subject:References:In-Reply-To;
 b=G8XrYNhjDSE8dLz2XgxylRPq4No/kooUst9euZmPjJEmvGOp848p2rCfz+WDVffOG
 JxEqIWZnNCpzIdd/HG3klg6NtnAbWZJgcy9r+6wEuOVyVgpGP3+6KUWXlGQwOmdqd7
 FjF+Jq08KMk1JOGkfvSXMDwryfaW8yh1hyaSgJeA=
Message-ID: <55947C71.9030808@sky-ip.org>
Date: Thu, 02 Jul 2015 02:49:05 +0300
From: s7r <s7r@sky-ip.org>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64;
 rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <55943534.6080800@sky-ip.org> <55943CB4.5010206@veloc1ty.de>
 <55944657.5030205@enn.lu>
In-Reply-To: <55944657.5030205@enn.lu>
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.1 cv=I/SYP4Ug c=1 sm=1 tr=0
 a=NjZloPwGIZuZzSMh60GxYg==:117 a=NjZloPwGIZuZzSMh60GxYg==:17
 a=TuC5ikPTAAAA:8 a=-NIMs_s3AAAA:8 a=bvjBBkZ6AAAA:8 a=AGkejYDSTmIA:10
 a=N659UExz7-8A:10 a=NEAV23lmAAAA:8 a=6BwfBBOp_x70QKYmZHMA:9
 a=wswv_xqP6ZjOE3Li:21 a=FY6QgskdG0YwojOs:21 a=pILNOxqGKmIA:10
Subject: Re: [tor-talk] help needed to stress-test an onionbalanced HS -
 everyone is invited
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

It is up. Tested from multiple different places. It could be that you
got an older outdated but yet non-expired descriptor. I had the HS
running for testing before enabling OnionBalance (and OnionBalance
modifies descriptors, but for a while the previous non-expired ones
are still 'alive' in the network).

Should be fixed now. Please re-check and let me know.

On 7/1/2015 10:58 PM, Tyler Durden wrote:
> On 2015-07-01 21:17, Josef Stautner wrote:
>> Hello,
>> 
>> I wrote a litle script[1] to "contribute", but after a few tries
>> I get the following log lines.
>> 
>> Jul 01 21:11:07.000 [notice] Have tried resolving or connecting
>> to address '[scrubbed]' at 3 different places. Giving up. Jul 01
>> 21:11:24.000 [notice] Have tried resolving or connecting to 
>> address '[scrubbed]' at 3 different places. Giving up. Jul 01
>> 21:11:44.000 [notice] Closing stream for '[scrubbed].onion': 
>> hidden service is unavailable (try again later). Jul 01
>> 21:11:44.000 [notice] Closing stream for '[scrubbed].onion': 
>> hidden service is unavailable (try again later).
>> 
>> scrubbed is your mentioned hidden service. Is that a temporary
>> probleme?
>> 
>> ~Josef
>> 
>> [1] = https://gist.github.com/vlcty/d502111157fd1b8464e2
>> 
>> Am 01.07.2015 um 20:45 schrieb s7r:
>>> Hi,
>>> 
>>> Following the alpha release of OnionBlanace, I played with it
>>> today. It is easy to install and use, no advanced skills
>>> required. I will try to write tutorials and publish them, but
>>> it's pretty easy, basically it's just editing few config files.
>>> The existing documentation is neat and easy to understand.
>>> 
>>> Using OnionBalance 0.1.1 Alpha and Tor 0.2.7.1-alpha-dev, I
>>> have configured a hidden service (web site) running
>>> OnionBalance with 5 failback servers (different Tor processes,
>>> different servers, etc.).
>>> 
>>> What I want is to stress test it, and see how does OnionBalance
>>> spread the load between the failback servers (will count the
>>> hits on each server and make an average, see how they are
>>> rotated).
>>> 
>>> For anyone who wants to help, please request/load the hidden
>>> service as much as possible and spread it around. For users who
>>> can, it might be helpful to add a cronjob under an unprivileged
>>> user to fetch the page via torified wget and send it to >
>>> dev/null or automate the process by other means. Simply stress
>>> test this hidden service like you hate it ;)
>>> 
>>> The page is just some random generated text, plain static html
>>> (no javascript, no flash, other naughty stuff) and it's about
>>> 140KB.
>>> 
>>> http://eujuuws2nacz4xw4.onion/
>>> 
>>> The OnionBalance hidden service will stay up for 15 days.
>>> During this time I will analyze the logs and count the hits on
>>> each server. I don't see what else I can count besides page
>>> hits - any other application optimizations behind a hidden
>>> service are not related to Tor. Results will be made public on
>>> the mail list. Hope this will help us understand better hidden
>>> service scalability and implement prop 224 in the best possible
>>> way, considering all aspects.
>>> 
>>> Counting starts July 1st 2015 18:00 UTC.
>>> 
>>> 
>>> Thanks!
> 
> Yes looks down from here
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBCAAGBQJVlHxxAAoJEIN/pSyBJlsRi7UIAMzXHo+CaPSgyv6fEbo7KKfr
Vz6ldg1DFwQsS1IxoJr0HoKQQKG5DI27DQ5uX/4x6EHha+D08DjxuaI8AHx5ueQ7
71KmKkwngZ9AEAQsmAVk+WMTfaOkTWRAR6nbCDHnlXl/XvsJh5Iu4Zoey3H2RqTW
HvaEEXiYnrcw1OB6BvBnCw2VOgOoOM+4gorW0Yjo0geTmrHylcFz2WRQaZomj8HW
fPnrhtlLap3PeF0wxSC4sIjEoGtHFRUPGm4W/wF6/tmw5/jyzq7x5m8w7CHYl3Ah
9L6vPqKATOEocOVCbcIIGuGxL2ZRMvJHfIjO4rthpzzrqdFklXjjV3h/rmW6V0A=
=/xg7
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

