Delivery-Date: Wed, 08 Jul 2015 10:08:15 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,UNPARSEABLE_RELAY,
	URIBL_BLACK autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 5E6461E0434;
	Wed,  8 Jul 2015 10:08:10 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3635D3649C;
	Wed,  8 Jul 2015 14:08:01 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E642936452
 for <tor-talk@lists.torproject.org>; Wed,  8 Jul 2015 14:07:57 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 6Y_nM27YCHvp for <tor-talk@lists.torproject.org>;
 Wed,  8 Jul 2015 14:07:57 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id B3A533624E
 for <tor-talk@lists.torproject.org>; Wed,  8 Jul 2015 14:07:57 +0000 (UTC)
Received: from plantcutter.riseup.net (plantcutter-pn.riseup.net [10.0.1.121])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net",
 Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK))
 by mx1.riseup.net (Postfix) with ESMTPS id B733141FF5
 for <tor-talk@lists.torproject.org>; Wed,  8 Jul 2015 14:07:54 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak;
 t=1436364474; bh=DtZSCiVMrtAfnK8QawaZAHp+9vhRSSnJOjPtyr7/Ixc=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=eCwO3KNdP4lJdTqPgQkwUOnKefSJv3cx85NEckmayxQq+LVvTgrWCc7XZ1GMtVK7i
 dReZdNaksq1Fhe+0VVECSxa/gMC7PRAafnGQGo6NbYhOx6w3A4UZKLHXy/JRc2vvNg
 tkxLQ46jDJnY23Ny5C1Gi3NOs3pAqc2pTpn2ikv4=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: thomaswhite) with ESMTPSA id C81751FC11
To: tor-talk@lists.torproject.org
References: <559864C9.5000608@sky-ip.org> <JtehHbj--3-0@tutanota.com>
 <559C8433.3010502@sky-ip.org>
From: Thomas White <thomaswhite@riseup.net>
Message-ID: <559D2EB5.4050709@riseup.net>
Date: Wed, 8 Jul 2015 15:07:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101
 Thunderbird/38.0.1
MIME-Version: 1.0
In-Reply-To: <559C8433.3010502@sky-ip.org>
X-Virus-Scanned: clamav-milter 0.98.7 at mx1
X-Virus-Status: Clean
Subject: Re: [tor-talk] OnionBalance Hidden Service has over 1 million
 successful hits in just 3 days
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Just to expand on s7r's number, I just pulled the latest logs from the
servers and compiled a quick breakdown of the HTTP codes, bandwidth
etc for anyone interested:

HTTP Code: 200 (OK)
Bandwidth used (bytes): 690,400,220,422
Hits: 4,784,288


HTTP Code: 206 (Partial Content)
Bandwidth used (bytes): 5,202,918
Hits: 64


HTTP Code: 304 (Not Modified)
Bandwidth used (bytes): 52,059
Hits: 259


HTTP Code: 404 (Not Found)
Bandwidth used (bytes): 266,053
Hits: 611


HTTP Code: 403 (Forbidden)
Bandwidth used (bytes): 2,908
Hits: 7


HTTP Code: 408 (Request Timeout)
Bandwidth used (bytes): 0
Hits: 5,442


Total bandwidth usage (bytes): 690,405,744,360 (690 GB)

Total hits: 4,790,671


Not bad for a few days work guys!

T




On 08/07/2015 03:00, s7r wrote:
> *Numbers look good: Over 4 million hits in 7 days.*
> 
> I want again to use this opportunity to say THANK YOU to everyone
> who is contributing and stress testing. 4 million requests tell me
> people are putting quite some effort into it. Please continue to
> stress test as much as you can in the next days. After I collect
> some rendezvous circuit stats also, we will stop the test - don't
> want to overkill the network, prefer to leave more bandwidth
> capacity for users.
> 
> I was waiting to have some rendezvous circuit statistics as well,
> to compare them with the hits on the webserver and have an overview
> on the circuits stats and average number of requests per circuit. 
> Hopefully this will happen in the next days. Since you asked, here
> are the exact numbers now.
> 
> The service was started 1st July 2015. Here are the counts today,
> 8th July (little over 7 days of uptime):
> 
> Failback instance #1: 956281 Failback instance #2: 732187 Failback
> instance #3: 837818 Failback instance #4: 768636 Failback instance
> #5: 911546 ============================= TOTAL: 4206468
> 
> There are no significant warnings or errors - the same instances
> are running since service first started, no reboot or application
> restart. I am happy with how it works. As you can see we have *over
> 4 million hits*. The number of requests per failback instance
> confirms the load is fairly spread.
> 
> Hidden service http://eujuuws2nacz4xw4.onion/ up and strong!
> 
> On 7/8/2015 1:48 AM, tqr2813d376cjozqap1l@tutanota.com wrote:
>> 4. Jul 2015 22:57 by s7r@sky-ip.org <mailto:s7r@sky-ip.org>:
> 
>> After little over 3 days of uptime, the OnionBalance hidden 
>> service http://eujuuws2nacz4xw4.onion 
>> <http://eujuuws2nacz4xw4.onion/> was successfully accessed over 1
>>  Million times. There was no complaint in any of the running Tor 
>> instance s.
> 
> 
> 
>> Hey s7r, things still looking OK? How are the numbers now?
> 
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=ZU6g
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

