Delivery-Date: Mon, 13 Jul 2015 18:54:38 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,URIBL_BLACK autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 38E201E0E02;
	Mon, 13 Jul 2015 18:54:36 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 14D9D37855;
	Mon, 13 Jul 2015 22:54:31 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B314F377F4
 for <tor-talk@lists.torproject.org>; Mon, 13 Jul 2015 22:54:27 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id mz13kgAC-_Gu for <tor-talk@lists.torproject.org>;
 Mon, 13 Jul 2015 22:54:27 +0000 (UTC)
Received: from outbound.mailhostbox.com (outbound.mailhostbox.com
 [162.222.225.24])
 by eugeni.torproject.org (Postfix) with ESMTP id 96E9B377CF
 for <tor-talk@lists.torproject.org>; Mon, 13 Jul 2015 22:54:27 +0000 (UTC)
Received: from [0.0.0.0] (torsrvu.snydernet.net [109.74.151.149])
 (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits))
 (No client certificate requested)
 (Authenticated sender: s7r@sky-ip.org)
 by outbound.mailhostbox.com (Postfix) with ESMTPSA id 949EE36133A;
 Mon, 13 Jul 2015 22:54:22 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sky-ip.org;
 s=20110108; t=1436828064;
 bh=JJygQfmu19z1b3tcZVaLsvwpvB/p6nq/Wu77jtW3wOs=;
 h=Date:From:Reply-To:To:Subject:References:In-Reply-To;
 b=giNJZOXtHhxJ+xFgeLy8J8D9Z5bhywz11VBHHv9430eBqfxOA1KNiQX6kUUcQudy8
 90q7iUKkjt599P+n+665unoktm4IKudMBtVor3EHfi2ZUwx7NvwCsvcpxzpOYk33hn
 YL7H3i06mpQFRKxBHTqTNTqCw+HvbtroEsUHMmh8=
Message-ID: <55A44199.8070004@sky-ip.org>
Date: Tue, 14 Jul 2015 01:54:17 +0300
From: s7r <s7r@sky-ip.org>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64;
 rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <559864C9.5000608@sky-ip.org> <JtehHbj--3-0@tutanota.com>
 <559C8433.3010502@sky-ip.org> <559D2EB5.4050709@riseup.net>
In-Reply-To: <559D2EB5.4050709@riseup.net>
X-CMAE-Score: 0
X-CMAE-Analysis: v=2.1 cv=Rpo4V3SK c=1 sm=1 tr=0
 a=g91aPchtsxlWYxNwwXpItQ==:117 a=g91aPchtsxlWYxNwwXpItQ==:17
 a=eTHYnnX2AAAA:8 a=-NIMs_s3AAAA:8 a=bvjBBkZ6AAAA:8 a=AGkejYDSTmIA:10
 a=N659UExz7-8A:10 a=mlNn8-T5AAAA:8 a=8xZtxO3vMPHjdHKcKkoA:9
 a=X-m1vXW_S-c7Pj9Z:21 a=TeQZ2_67PycY1wQp:21 a=pILNOxqGKmIA:10
X-Scanned-By: MIMEDefang 2.72 on 172.18.214.93
Subject: Re: [tor-talk] OnionBalance Hidden Service has over 1 million
 successful hits in just 3 days
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

Here are the latest counts for the OnionBalace hidden service
http://eujuuws2nacz4xw4.onion/ :

Failback instance #1: 2329348
Failback instance #2: 1822384
Failback instance #3: 2025677
Failback instance #4: 2109677
Failback instance #5: 2202052
================================
*TOTAL: 10489138*

Uptime is ~2 weeks. We have passed the 10 million threshold, not bad,
especially for a ~2 week period of time. Logs are here:
https://www.sky-ip.org/onionbalance/

Each failback instance had 2 introduction points in the master
descriptor.

Thanks to everyone who contributed in this! Please stop the automated
scripts which connect to this hidden service now. I am temporarily
shutting it down for 1 or 2 days, in order to install a script which
will collect rendezvous circuit statistics on each failback instance.
We need this info since we can't say how many clients or circuits made
the 10 million successful hits from above.

In the next part of the test we will make sure we use a separate
rendezvous circuit for each request, using a modified third party
script with -tor-auto-isolate. This is extremely high load on the
network and it's VERY RUDE to do it in the wild with Guards (also
responsible for other users traffic). For this reason, I have asked
TheCthulhu for a high end server where I've setup a non-public bridge
to be used for this. This way, at least we won't be hammering on
Guards. I want to run it for shorter period of time (max. 72 hours),
but at 'full speed'.

Who is interested and able to help, please email me directly and I'll
provide the necessary tools and info.

Results and logs will be made public immediately after. I want to see
how many different rendezvous circuits can be created with a hidden
service (failback instance) if it has only 2 introduction points in
the master descriptor and how many such circuits will each server
take. It might be helpful for deciding related to prop 224 (next
generation hidden services) - merging HSDirs and IPs - how many of
them should a hidden service have by default.


On 7/8/2015 5:07 PM, Thomas White wrote:
> Just to expand on s7r's number, I just pulled the latest logs from
> the servers and compiled a quick breakdown of the HTTP codes,
> bandwidth etc for anyone interested:
> 
> HTTP Code: 200 (OK) Bandwidth used (bytes): 690,400,220,422 Hits:
> 4,784,288
> 
> 
> HTTP Code: 206 (Partial Content) Bandwidth used (bytes): 5,202,918 
> Hits: 64
> 
> 
> HTTP Code: 304 (Not Modified) Bandwidth used (bytes): 52,059 Hits:
> 259
> 
> 
> HTTP Code: 404 (Not Found) Bandwidth used (bytes): 266,053 Hits:
> 611
> 
> 
> HTTP Code: 403 (Forbidden) Bandwidth used (bytes): 2,908 Hits: 7
> 
> 
> HTTP Code: 408 (Request Timeout) Bandwidth used (bytes): 0 Hits:
> 5,442
> 
> 
> Total bandwidth usage (bytes): 690,405,744,360 (690 GB)
> 
> Total hits: 4,790,671
> 
> 
> Not bad for a few days work guys!
> 
> T
> 
> 
> 
> 
> On 08/07/2015 03:00, s7r wrote:
>> *Numbers look good: Over 4 million hits in 7 days.*
> 
>> I want again to use this opportunity to say THANK YOU to
>> everyone who is contributing and stress testing. 4 million
>> requests tell me people are putting quite some effort into it.
>> Please continue to stress test as much as you can in the next
>> days. After I collect some rendezvous circuit stats also, we will
>> stop the test - don't want to overkill the network, prefer to
>> leave more bandwidth capacity for users.
> 
>> I was waiting to have some rendezvous circuit statistics as
>> well, to compare them with the hits on the webserver and have an
>> overview on the circuits stats and average number of requests per
>> circuit. Hopefully this will happen in the next days. Since you
>> asked, here are the exact numbers now.
> 
>> The service was started 1st July 2015. Here are the counts
>> today, 8th July (little over 7 days of uptime):
> 
>> Failback instance #1: 956281 Failback instance #2: 732187
>> Failback instance #3: 837818 Failback instance #4: 768636
>> Failback instance #5: 911546 ============================= TOTAL:
>> 4206468
> 
>> There are no significant warnings or errors - the same instances 
>> are running since service first started, no reboot or
>> application restart. I am happy with how it works. As you can see
>> we have *over 4 million hits*. The number of requests per
>> failback instance confirms the load is fairly spread.
> 
>> Hidden service http://eujuuws2nacz4xw4.onion/ up and strong!
> 
>> On 7/8/2015 1:48 AM, tqr2813d376cjozqap1l@tutanota.com wrote:
>>> 4. Jul 2015 22:57 by s7r@sky-ip.org <mailto:s7r@sky-ip.org>:
> 
>>> After little over 3 days of uptime, the OnionBalance hidden 
>>> service http://eujuuws2nacz4xw4.onion 
>>> <http://eujuuws2nacz4xw4.onion/> was successfully accessed over
>>> 1 Million times. There was no complaint in any of the running
>>> Tor instance s.
> 
> 
> 
>>> Hey s7r, things still looking OK? How are the numbers now?
> 
> 
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBCAAGBQJVpEGZAAoJEIN/pSyBJlsRipcIALtq712Evuaf3MfP3Y1NkEz4
gXdHqVSA4nZjW3n7uyYJPOH2YHUxvB2Bu7n0RZMOQa0LNdhb0msfYT5Pw/bqXG66
rqKK6wgaBaFZq68IOUYGjdP9Qf4NVCePjUOa3QPoWkQPOWiQ5m8ciDQ57xBhCmGS
LS0Tuj75rozBH/3QTh0hQKl34ER+ipksRuS3yul/tP3ztQBOwDWYZvboQsvqvPq5
RAr0VTA3UzPEQ4DBUVx3P9YXaQ/nk73HiSoYQpCnpNeKGH+WudZaxyhk+nGlC8Zd
5Hqu5hq6epWsr0LAX6TfTTyPCPkTSb2EmmWTNhnT1n2xVPDjeJ14Et4z/Crc26A=
=4NDL
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

