Thus spake Daniel Franganillo (dani...@dilmun.ls.fi.upm.es):
Our ISP wont say nothing about their filters (It seems to be a Top Secret
issue :P). As I said before there's no problem reported at debug.log except
for the frequent:
[debug] TLS error: unexpected close while reading
On 03.12.2010 08:40, Daniel Franganillo wrote:
Well, im not asking for help to run a Tor relay, I did it for more than
a year without problems. Im asking for help to gather intel so I can
make an statement to our ISP (I work at a Dept. in a univeristy) to
unblock Tor.
why don't you ask
El 03/12/10 09:18, Olaf Selke escribió:
On 03.12.2010 08:40, Daniel Franganillo wrote:
Well, im not asking for help to run a Tor relay, I did it for more than
a year without problems. Im asking for help to gather intel so I can
make an statement to our ISP (I work at a Dept. in a univeristy)
Hi,
On 03.12.2010 13:12, Olaf Selke wrote:
At least my relay holds a couple of connections to Cryptolab.
We (torservers) do, too. About the same amount of connections.
Moritz
***
To unsubscribe, send an e-mail to
On Dec 3, 2010, at 3:14 AM, Mike Perry wrote:
[snip]
Nope. Transfer rates are equally ridiculous. Tried in windows, same.
[/snip]
Out of curiosity, how long are you letting these tests run for? My
nodes generally take a full 2 or 3 days to get up to full capacity,
and even then, traffic
El 01/12/10 12:03, Jim escribió:
Daniel Franganillo wrote:
Hi,
still no luck with our bandwidth problems. I even tried to set up a
tor relay under windows (to discard a linux problem) and it does not
work.
Also, if I setup an https server at 9001 or 9030 and download a file
from there it works
Thus spake Daniel Franganillo (dani...@dilmun.ls.fi.upm.es):
El 29/11/10 16:27, Daniel Franganillo escribió:
Hi,
I'm the admin of CriptoLabTorRelays[1][2][3][4]
As you can see at [1][2][3][4] our relays are having almost no transfer
rate (3KB or so)
It started on Monday 14 of November and
El 03/12/10 01:55, Mike Perry escribió:
Thus spake Daniel Franganillo (dani...@dilmun.ls.fi.upm.es):
El 29/11/10 16:27, Daniel Franganillo escribió:
Hi,
I'm the admin of CriptoLabTorRelays[1][2][3][4]
As you can see at [1][2][3][4] our relays are having almost no transfer
rate (3KB or so)
It
El 29/11/10 16:27, Daniel Franganillo escribió:
Hi,
I'm the admin of CriptoLabTorRelays[1][2][3][4]
As you can see at [1][2][3][4] our relays are having almost no transfer
rate (3KB or so)
It started on Monday 14 of November and after some testing we came to a
conclusion... Our Univeristy (our
Daniel Franganillo wrote:
Hi,
still no luck with our bandwidth problems. I even tried to set up a tor
relay under windows (to discard a linux problem) and it does not work.
Also, if I setup an https server at 9001 or 9030 and download a file
from there it works fine.
Can you help me to
Hi,
I'm the admin of CriptoLabTorRelays[1][2][3][4]
As you can see at [1][2][3][4] our relays are having almost no transfer
rate (3KB or so)
It started on Monday 14 of November and after some testing we came to a
conclusion... Our Univeristy (our workplace) somehow filtered Tor
without us
grarpamp wrote:
Excluding bandwidth as that's probably the easiest
to guesstimate [6x each user's use for onion2onion case].
Assuming whatever typical usage patterns exist today,
and expecting a partial shift to include more bandwidth
intensive apps...
What sort of issues exist as each new set
Excluding bandwidth as that's probably the easiest
to guesstimate [6x each user's use for onion2onion case].
Assuming whatever typical usage patterns exist today,
and expecting a partial shift to include more bandwidth
intensive apps...
What sort of issues exist as each new set of say
to
use 4 MB pages instead of 4 KB pages. The benefit to I/O bound processes
will typically be very difficult to detect, but for many CPU-bound processes,
the performance kick can be rather dramatic. For example, my full disk backups
typically were taking in excess of 8 hours with the feature disabled
From Tor Blog
|
Jake, Mike, Karsten, Sebastian, and I attended Hacking at Random last
week in The Netherlands. I did a talk on Tor performance challenges —
basically walking through the key pieces of the Why Tor is Slow
document that we wrote in March.
As usual with European hacking cons
On Wed, Aug 19, 2009 at 05:19:20PM -0400, Ringo wrote:
Jake, Mike, Karsten, Sebastian, and I attended Hacking at Random last
week in The Netherlands. I did a talk on Tor performance challenges ?
basically walking through the key pieces of the Why Tor is Slow
document that we wrote in March
It uses the hidden tracker and should work for Tor users and non-tor
users. It actually appears to be down right now but it'll come up
eventually. It has both the regular .onion and the tor2web url in it.
Yep, we're down right now. Sorry about the inconvenience. We're
expecting to be up and
Well given this, I've added a few other trackers, file at the same spot:
http://www.johntowery.com/har2009_Why_Tor_is_slow.mp4.torrent
Ringo
The Hidden Tracker wrote:
It uses the hidden tracker and should work for Tor users and non-tor
users. It actually appears to be down right now but it'll
On Wed, Feb 25, 2009 at 08:20:48PM -0500, pho...@rootme.org wrote 0.4K bytes in
9 lines about:
: One fine way to find out is to run oprofile and see what tor is doing.
: you'll even find out the most popular calls as it's cranking away.
I took my own advice and ran 'valgrind --tool=callgrind' on
I wrote:
as I understood tor spends most of its cpu time within openssl library aes
crypto.
Which result of openssl speed aes applies to tor? Is it aes-128 cbc 16
bytes?
In this case my old Prestonia P4 Netburst Xeon box's throughput is supposed to
be roughly about 40 MBit/s as
On Wed, 25 Feb 2009 22:59:14 +0100 Olaf Selke olaf.se...@blutmagie.de
wrote:
I wrote:
as I understood tor spends most of its cpu time within openssl library aes
crypto.
Which result of openssl speed aes applies to tor? Is it aes-128 cbc 16
bytes?
In this case my old Prestonia P4
On Wed, Feb 25, 2009 at 10:59:14PM +0100, olaf.se...@blutmagie.de wrote 0.8K
bytes in 17 lines about:
: bits/s network throughput. Now it appears only 10% tor's cpu usage is
: spent within aes crypto. What the heck is tor doing the remaining 90%?
One fine way to find out is to run oprofile and
slush wrote:
Oh, also dont forget that openssl speed runs only on one core!
yes, I know
I tested it on my server 2x dualcore Xeon 3GHz and results:
type 16 bytes 64 bytes256 bytes 1024 bytes 8192
bytes
aes-128 cbc 92860.55k 120028.42k 130562.36k
Tor FAQ: I have more than one CPU. Does this help?
Yes. You can set your NumCpus config option in torrc to the number of CPUs
you have, and Tor will spawn this many cpuworkers to deal with public key
operations in parallel.
nope, just one core is used by tor for aes crypto. So the openssl speed
tor
node.
For the sake of better performance I'm thinking about replacing my tor node's
hardware.
If you're going to replace hardware, hardware assisted encryption may be
an option. Recent VIA CPUs like the C7 and the Nano can do that. Their
clock frequency isn't very high, so something else
100274.74k
Strange to say that my desktop Core2 Duo E8400 @home performs only 33%
better in
openssl aes crypto than one of the old P4 Netburst Xeon cores from my tor
node.
For the sake of better performance I'm thinking about replacing my tor
node's
hardware.
If you're going
John Brooks wrote:
You're mistaken here.
[...]
My point was that the '16 bytes' column was showing significantly worse
results than the other columns. It's because of overhead for more
function calls, setting up keys, setting up initialization vectors, ...
All of that aside, the encryption
On Mon, 23 Feb 2009 16:59:21 +0100 slush sl...@slush.cz wrote without
proper attribution (tsk, tsk):
Tor FAQ: I have more than one CPU. Does this help?
Yes. You can set your NumCpus config option in torrc to the number of CPUs
you have, and Tor will spawn this many cpuworkers to deal with
John Brooks schrieb:
All of that aside, the encryption speed is a non-issue here. Unless
you're using a large portion of a gigabit connection, AES will work far
faster than your line speed on a modern processor.
it depends :-) I supposed cpu encryption speed being the limiting factor
for the
On Mon, Feb 23, 2009 at 8:23 AM, Arjan
n6bc23cpc...@list.nospam.xutrox.com wrote:
...
It would be nice if Tor was using bigger blocks, but I've not looked at
the code yet.
i think you mean buffers (or at least multiples of 16 byte blocks);
and yes the 4096 byte or larger buffers would be nice
coderman wrote:
On Mon, Feb 23, 2009 at 8:23 AM, Arjan
n6bc23cpc...@list.nospam.xutrox.com wrote:
...
It would be nice if Tor was using bigger blocks, but I've not looked at
the code yet.
i think you mean buffers (or at least multiples of 16 byte blocks);
and yes the 4096 byte or larger
On Mon, Feb 23, 2009 at 12:29 PM, Arjan
n6bc23cpc...@list.nospam.xutrox.com wrote:
...
My upload speed is much too slow to run into this problem, but could the
compression be (partially) disabled for middle nodes? I'm assuming that
the data they are relaying has already been compressed +
105361.75k 100274.74k
Strange to say that my desktop Core2 Duo E8400 @home performs only 33% better in
openssl aes crypto than one of the old P4 Netburst Xeon cores from my tor node.
For the sake of better performance I'm thinking about replacing my tor node's
hardware.
Olaf
-256 cbc 69559.47k92221.78k 102006.05k 105361.75k
100274.74k
Strange to say that my desktop Core2 Duo E8400 @home performs only 33%
better in
openssl aes crypto than one of the old P4 Netburst Xeon cores from my tor
node.
For the sake of better performance I'm thinking about
from my tor
node.
For the sake of better performance I'm thinking about replacing my tor
node's
hardware.
Olaf
6cnf6c...@sneakemail.com wrote:
Are there any performance tweaks to limit Tor's CPU consumption?
Compiling the openSSL library source code package with Intel's C compiler icc
instead of using the gcc-precompiled Debian package tor's performance increased
about 25% on my Intel Xeon Linux box
Hi!
On Sat, Dec 20, 2008 at 4:13 AM, 6cnf6c...@sneakemail.com wrote:
I now want to play around with hidden services, and noticed that
Apache takes a very long time to reply, even to local requests.
Do you use this same Apache as a proxy to directory server?
Mitar
to reply, even to local requests.
As I am already using Xen, I thought it might be possible to
share CPU and memory intelligently between two domUs (with the
Tor domU having lower priority), but I didn't find any useful
information how to do that.
Are there any performance tweaks to limit Tor's CPU
On Sat, Dec 20, 2008 at 03:13:00AM -, 6cnf6c...@sneakemail.com wrote 1.1K
bytes in 26 lines about:
: Most of the time, the Tor process maxes out the CPU (85-100%),
: while memory consumption stays at ~10%; until today, this didn't
: pose much of a problem as log files show no errors and the
On Saturday 13 December 2008, Karsten Loesing wrote:
Hi Bernhard,
Bernhard Fischer wrote:
Sorry, I didn't see this before. I'll read your paper and I appreciate
all improvements regarding hidden services.
You might also want to read the documents that are linked from the NLnet
project
True, I did take that into account. I could be mistaken but I think the main
problem lies with the proxy software. I think that Polipo and, especially,
Privoxy are pretty resource intensive, and affect performance more than Tor
itself.
Polipo has been shown to be faster than most browsers
intensive, and affect performance more than Tor
itself.
Polipo has been shown to be faster than most browsers' implementation of
HTTP.
As for resources consumed, people are running Polipo on embedded routers
with 16 MB of memory.
Juliusz
-BEGIN
In tor version Tor-0.2.15-alpha, in the file circuitbuild.c change
'routelen = 3;' to 'routelen = 2;' (at line 1070).
That's it.
Martin
* on the Wed, Oct 22, 2008 at 04:49:35PM +0200, Martin Balvers wrote:
I have changed the route length to 2 hops
How did you manage to do this? I know you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
I have been using tor for about four months.
Tor release - 0.2.0.30 running on an MS Windows XP SP2 system.
Browser
-
1) Sea Monkey (Mozilla)
with Polipo 1.0.4
2) MS IE6
with Privoxy 3.0.8
Using either browser, performance has
You are right, performance usually sucks. You can get lucky sometimes, and
pick a route that actually has low latency, but that doesn't seem to
happen very often.
Keep in mind that latency will always be higher than without tor, you do
have to connect through 3 additional hops to get to your
also selected some nodes that seem to work good for me as entry
nodes.
This has made it a bit more usable.
I noticed that i still have very poor performance sometimes, even with
fast (as in bandwidth) nodes. Some nodes taht i found to have high latency
are blutmagie,chaoscomputerclub23 and kyirong
The main reason why Tor currently has bad performance is that it
multiplexes multiple circuits (and therefore the streams in those
circuits) under the same TLS(TCP) connection. This is very important
from the security perspective, but causes problems when any link in the
circuit that you chosen
* on the Wed, Oct 22, 2008 at 04:49:35PM +0200, Martin Balvers wrote:
I have changed the route length to 2 hops
How did you manage to do this? I know you have to edit the source code, but
what specifically needs changing in it? I remember attempting this a while
ago but haven't looked
Marco Bonetti schrieb:
doesn't changing the CircuitBuildTimeout and the NumEntryGuards give an
advantage to an attacker which is spying on your connections?
IIRC it should be mentioned in the design documents: an attacker which
is reading traffic can isolate clusters of users depending on
Thus spake Marco Bonetti ([EMAIL PROTECTED]):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mike Perry wrote:
The Tor settings are by far the more impactful of the two, I've found.
doesn't changing the CircuitBuildTimeout and the NumEntryGuards give an
advantage to an attacker which is
Thus spake Dominik Schaefer ([EMAIL PROTECTED]):
Marco Bonetti schrieb:
doesn't changing the CircuitBuildTimeout and the NumEntryGuards give an
advantage to an attacker which is spying on your connections?
IIRC it should be mentioned in the design documents: an attacker which
is reading
Apropos to see and deja-vus ... Georgia (and George [on 9/11]):
And
The Kremlin attempted to reach Saakashvili, WHO WAS HIDING, by phone.
Update:
Ukraine opposition to send Georgian leader neckties to chew on
KIEV, August 22 (RIA Novosti) - Ukraine's opposition party has pledged
Do you see the implications [cherries-like: Madrid, 7/7, ..., Georgia right
now] of that?
Apropos to see and deja-vus ... Georgia (and George [on 9/11]):
...
The Georgian air force and artillery struck the sleeping town at midnight.
More than 1,500 civilians perished in the very
Am 20.08.2008 um 05:49 schrieb Roy Lanek:
9/11 has been planned much earlier than 2001.
Dear Mr Fletcher (sic!),
I don't think that this mailing-list is the appropriate place to
propagate your FUD based conspiracy theories as if they were facts. So
would you mind to stop it?
Beside
mplsfox02,
This study was performed by Privacy International,
as far as I am aware. I think it best to forget how
they decided to color code the map, and just look
at the numbers inside the columns.
It would also be of interest in how they went about
acquiring their data, and what the standards
On Tue, 19 Aug 2008 11:45:52 +0700 Roy Lanek [EMAIL PROTECTED]
wrote, quoting me without attribution:
Why, to the administration at the university (or the bosses at the
company) one works for or to one's ISP, of course. Perhaps also to a judge.
Wasn't that obvious?
No, it was not
Roy,
Free, no strings attached. Naturally I cannot disclose what specific
organizations we work with, as that would be counter-intuitive to
privacy protection. Here is one offer, currently, just take a look
for yourself: http://xerobank.com/olympics.php
We'll consider others on a case
any country scoring above 40 on the Press Freedom Index.
8-)
RWB [Reporters sans Frontieres], I was thinking that. Thank you.
/Roy
--
S buruk muka cermin dibelah
S . s l a c k w a r e SS ugly face, the mirror is split [blaming
S +
On 2008-08-19 Scott Bennett wrote:
On Tue, 19 Aug 2008 13:17:58 +0200 Ansgar Wiechers wrote:
On 2008-08-19 Scott Bennett, persistently sending his mails without
In-Reply-To- or References-headers, thus continually breaking threads
for everyone else, complained:
On Tue, 19 Aug 2008
On Tue, 19 Aug 2008 15:23:08 +0200 Ansgar Wiechers [EMAIL PROTECTED]
wrote:
On 2008-08-19 Scott Bennett wrote:
On Tue, 19 Aug 2008 13:17:58 +0200 Ansgar Wiechers wrote:
On 2008-08-19 Scott Bennett, persistently sending his mails without
In-Reply-To- or References-headers, thus continually
A lot easier to sell to WHOM? (Let's say you are Novartis ... who are those
which you are--implicitly or not, and slip of the tongue or not--mentioning as
a destination for selling attested, proven sneak-oil ... a lot easier?)
Management.
When I approached the higher-ups about doing a TOR
On Mon, 18 Aug 2008 19:30:25 +0200 Christian Wilms
[EMAIL PROTECTED] wrote:
I've written a a short project report about my Summer of Code project to
improve the performance of hidden services.
It can be found under http://www.ununoctium.de/gsoc08/gsoc_report.pdf
The directory also includes
Ouch. Sorry to hear it. :-(
Scott Bennett, Comm. ASMELG, CFIAG
In-Reply-To: [EMAIL PROTECTED]
To: Scott Bennett [EMAIL PROTECTED]
Subject: Re: Paid performance-tor option?
I really cannot parse the above bit of your writing.
I may know better my 1st
Management.
When I ... [Roy: more garbage deleted] ... with it.
Michael Holstein Cleveland State University
Okay, thank you for the live *demo* [keep reading], and for having volunteered.
Please put your regard here:
Faulty Towers of Belief: Part II. Rebuilding the Road to Freedom of
PERFORMANCE and freeness from big-bro-s influent area is a must for tor
and for the world benefiting tor.
JONDONYM, formerly JAP, have just established this.
( https://www.jondos.de/en/ )
If tor is incompetent to find HUGE funding for free, it may be time to
setup an international tor paid
Since you've come to your own conclusions please go see Xerobank
http://www.xerobank.com or one of those other services available.
On Mon, Aug 18, 2008 at 11:20 AM, macintoshzoom
[EMAIL PROTECTED]wrote:
PERFORMANCE and freeness from big-bro-s influent area is a must for tor and
for the world
, you've created
an easily attributable path back to you. TOR from the coffee shop's wifi
is a lot harder to trace.
I guess it depends on *why* you need the performance .. if it's p2p
you're trying to do (which you shouldn't be doing on TOR anyway) I'd
suggest you take a look at what the friendly
:
Since you've come to your own conclusions please go see Xerobank
http://www.xerobank.com or one of those other services available.
On Mon, Aug 18, 2008 at 11:20 AM, macintoshzoom
[EMAIL PROTECTED]wrote:
PERFORMANCE and freeness from big-bro-s influent area is a must for tor and
for the world
provide logs to law enforcement.
Steve
Rochester TOR Admin wrote:
Since you've come to your own conclusions please go see Xerobank
http://www.xerobank.com or one of those other services available.
On Mon, Aug 18, 2008 at 11:20 AM, macintoshzoom
[EMAIL PROTECTED]wrote:
PERFORMANCE
On Mon, 18 Aug 2008 12:44:44 -0600 macintoshzoom
[EMAIL PROTECTED] wrote:
Thank you for your post.
Michael Holstein wrote:
[much text deleted --SB]
TOR from the coffee shop's wifi
is a lot harder to trace.
Probably most if not all coffe shop's wifi are at this time under strict
As per privacyinternational.org (link below), Germany, once a top privacy
rights bastion country, is deceiving progressively.
Top privacy rights bastion country?! ... Yes?!, once when?
On the other hand, and focusing on an other topic slightly, though on the
bastion theme still: Swiss banks'
It seems that they are knees-down to german law-enforcement, opening
their nodes servers to them when required (?), probably even without
required nor informative request, as they seem to have set up a backdoor
system for law-enforcement.
Thinking in advance at the Argentina-Brazil
We offer free service for journalists in areas where there are significant
restrictions on free speech and free press.
And why should you offer free [I am guessing: free as in free beer] service
for journalists--are you recruiting, looking for PR? Detail free speech and
free press [who knows,
Why, to the administration at the university (or the bosses at the
company) one works for or to one's ISP, of course. Perhaps also to a judge.
Wasn't that obvious?
No, it was not obvious. And it STILL is not.
Besides, what are you trying to say, that one--example--as a soldier [I have
Hi,
almost exactly 48 hours ago traffic on my node changed from rather smooth
performance into 'saw blade'. (see attachment)
The time shown is gmt -2 (germany). Tor is continuing to fail to perform the
way it did before. At the time this is sent, a few hours later, there is no
change
Original Message
From: Hans S. [EMAIL PROTECTED]
Apparently from: [EMAIL PROTECTED]
To: or-talk@freehaven.net
Subject: worsening performance
Date: Mon, 17 Sep 2007 08:51:32 -0400
hi
The time shown is gmt - -2 (germany) - is incorrect,
of course it must read gmt + 2. ( - 2
.
regards
Hans
Original Message
From: Hans S. [EMAIL PROTECTED]
Apparently from: [EMAIL PROTECTED]
To: or-talk@freehaven.net
Subject: Re: worsening performance
Date: Mon, 17 Sep 2007 09:40:56 -0400
Original Message
From: Hans S. [EMAIL PROTECTED]
Apparently
I want just to help you out on the time zone thing:
Summer: UTC/GMT +2 (as we have daylight saving time)
Winter: UTC/GMT +1
Currently GMT+2, my linux box says! ;-)
The sawtooth thing is reported often in the past. It is coupled with the
fact not beeing listed at the authority
hi,
time is a tricky thing...
thank you for helping out with all the time mess ;)
The problem obviously still persists.
I checked the files in tordb.
cached-routers.new: 1 entry with the correct IP
cached-status/* : 5 files with 1 correct entry per file
but in:
cached-routers: 6
Hans S. wrote:
but in:
cached-routers: 6 different entries with $mynode
with 5 different IP's,
only the last one correct as of now.
a fixed IP address doesn't change anything regarding this traffic
behavior. Attached you'll find my saw
performance in the Tor network quite significantly.
During the last 90 minutes though, traffic on my node shows again more
normal patterns.
If this is due to the time of day (don't ask, but it is evening here) or
someone with the right time has flushed the right cache, I do not know.
Regards
Hans
A frequently stated problem with Tor is the poor performance and
improving this is the goal of several sub-projects. One of these is to
simply encourage the deployment of more Tor servers. This will
increase the capacity of the network, but the consequent improvement
to users is more difficult
On Wed, Jul 18, 2007 at 07:52:14PM -0700, Mike Perry wrote:
Thus spake Mike Perry ([EMAIL PROTECTED]):
RELAY_EXTEND is the way this is done. I believe clients can and do
send multiple RELAY_EXTENDs in a row, so it's not like its a
Sorry, I'm a moron. I meant to say RELAY_BEGIN. Also,
Thus spake Roger Dingledine ([EMAIL PROTECTED]):
On Wed, Jul 18, 2007 at 07:52:14PM -0700, Mike Perry wrote:
Thus spake Mike Perry ([EMAIL PROTECTED]):
RELAY_EXTEND is the way this is done. I believe clients can and do
send multiple RELAY_EXTENDs in a row, so it's not like its a
They can be issued concurrently. Tor doesn't care.
Indeed; I will see vidalia show a lot of connectings all at once,
followed by all switching to open at once (TCP streams inside a tor
circuit).
The overhead to open a new TCP HTTP connection through a tor circuit
seems to be very long. I know
Dear All,
I put a technical report on why batching and reordering is bad for mixes
at http://www.homepages.dsu.edu/fux/paper/mixPerf_fu07.pdf. Just for fun.
Cheers,
Xinwen Fu
86 matches
Mail list logo