Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-03-04 Thread Henning Brauer
* Libertas [2015-01-02 06:25]: > I've tuned PF parameters in the past, but it doesn't seem to be the > issue. My current pfctl and netstat -m outputs suggest that there are > more than enough available resources and no reported failures. just a sidenote, it is safe to bump the default state limit

Re: Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-03 Thread Greg Troxel
teor writes: > Tor 0.2.6.2-alpha (just in the process of being released) has some > changes to queuing behaviour using the KIST algorithm. > > The KIST algorithm keeps the queues inside tor, and makes > prioritisation decisions from there, rather than writing as much as > possible to the OS TCP q

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-03 Thread Stuart Henderson
On 2015-01-01, Miod Vallat wrote: >> > I should have also specified that I didn't just go ahead and enable them >> > because I wasn't sure if they're considered safe. I like abiding by >> > OpenBSD's crypto best practices when possible. >> > >> > Is there any reason why they're disabled by defaul

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Libertas
I've tuned PF parameters in the past, but it doesn't seem to be the issue. My current pfctl and netstat -m outputs suggest that there are more than enough available resources and no reported failures. I remember someone on tor-...@list.nycbug.org suggesting that it could be at least partially due

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Richard Johnson
On 2014-12-31 11:21, Libertas wrote: For those not familiar, a Tor relay will eventually have an open TCP connection for each of the other >6,000 active relays, and (if it allows exit traffic) must make outside TCP connections for the user's requests, so it's pretty file-hungry and crypto-intensi

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Miod Vallat
> > I should have also specified that I didn't just go ahead and enable them > > because I wasn't sure if they're considered safe. I like abiding by > > OpenBSD's crypto best practices when possible. > > > > Is there any reason why they're disabled by default? > > Compiler bugs generate incorrect

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Greg Troxel
Libertas writes: > Some of the people at tor-...@lists.nycbug.org and I are trying to > figure out why Tor relays under-perform when running on OpenBSD. Many > such relays aren't even close to being network-bound, > file-descriptor-bound, memory-bound, or CPU-bound, but relay at least > 33-50% le

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Ted Unangst
On Wed, Dec 31, 2014 at 19:42, Libertas wrote: > Thanks for this! > > I should have also specified that I didn't just go ahead and enable them > because I wasn't sure if they're considered safe. I like abiding by > OpenBSD's crypto best practices when possible. > > Is there any reason why they're

Re: Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2014-12-31 Thread teor
On 1 Jan 2015, at 07:39 , Greg Troxel wrote: > Libertas writes: > >> Some of the people at tor-...@lists.nycbug.org and I are trying to >> figure out why Tor relays under-perform when running on OpenBSD. Many >> such relays aren't even close to being network-bound, >> file-descriptor-bound, memo

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2014-12-31 Thread Libertas
Thanks for this! I should have also specified that I didn't just go ahead and enable them because I wasn't sure if they're considered safe. I like abiding by OpenBSD's crypto best practices when possible. Is there any reason why they're disabled by default? On another note, I was skeptical about

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2014-12-31 Thread Carlin Bingham
On Thu, 1 Jan 2015, at 11:49 AM, Libertas wrote: > I also completely forgot to mention the below warning, which Tor > 0.2.5.10 (the current release) gives when run on OpenBSD 5.6-stable > amd64: > > > We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, > > but with a version of Open

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2014-12-31 Thread Libertas
I also completely forgot to mention the below warning, which Tor 0.2.5.10 (the current release) gives when run on OpenBSD 5.6-stable amd64: > We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, > but with a version of OpenSSL that apparently lacks accelerated > support for the NIST