Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-03-04 Thread Henning Brauer
* Libertas liber...@mykolab.com [2015-01-02 06:25]: I've tuned PF parameters in the past, but it doesn't seem to be the issue. My current pfctl and netstat -m outputs suggest that there are more than enough available resources and no reported failures. just a sidenote, it is safe to bump the

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-03 Thread Stuart Henderson
On 2015-01-01, Miod Vallat m...@online.fr wrote: I should have also specified that I didn't just go ahead and enable them because I wasn't sure if they're considered safe. I like abiding by OpenBSD's crypto best practices when possible. Is there any reason why they're disabled by

Re: Recognizing Randomness Exhaustion

2015-01-03 Thread Stuart Henderson
On 2014-12-31, Libertas liber...@mykolab.com wrote: One possible explanation is that its randomness store gets exhausted. OpenBSD's RNG subsystem doesn't get exhausted like this.

Re: Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-03 Thread Greg Troxel
teor teor2...@gmail.com writes: Tor 0.2.6.2-alpha (just in the process of being released) has some changes to queuing behaviour using the KIST algorithm. The KIST algorithm keeps the queues inside tor, and makes prioritisation decisions from there, rather than writing as much as possible to

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Greg Troxel
Libertas liber...@mykolab.com writes: Some of the people at tor-...@lists.nycbug.org and I are trying to figure out why Tor relays under-perform when running on OpenBSD. Many such relays aren't even close to being network-bound, file-descriptor-bound, memory-bound, or CPU-bound, but relay at

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Ted Unangst
On Wed, Dec 31, 2014 at 19:42, Libertas wrote: Thanks for this! I should have also specified that I didn't just go ahead and enable them because I wasn't sure if they're considered safe. I like abiding by OpenBSD's crypto best practices when possible. Is there any reason why they're

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Miod Vallat
I should have also specified that I didn't just go ahead and enable them because I wasn't sure if they're considered safe. I like abiding by OpenBSD's crypto best practices when possible. Is there any reason why they're disabled by default? Compiler bugs generate incorrect code for

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Libertas
I've tuned PF parameters in the past, but it doesn't seem to be the issue. My current pfctl and netstat -m outputs suggest that there are more than enough available resources and no reported failures. I remember someone on tor-...@list.nycbug.org suggesting that it could be at least partially due

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2015-01-01 Thread Richard Johnson
On 2014-12-31 11:21, Libertas wrote: For those not familiar, a Tor relay will eventually have an open TCP connection for each of the other 6,000 active relays, and (if it allows exit traffic) must make outside TCP connections for the user's requests, so it's pretty file-hungry and

Recognizing Randomness Exhaustion

2014-12-31 Thread Libertas
Some of the people at tor-...@lists.nycbug.org and I are trying to figure out why Tor relays under-perform when running on OpenBSD. Many such relays aren't even close to being network-bound, file-descriptor-bound, memory-bound, or CPU-bound, but relay at least 33-50% less traffic than would be

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2014-12-31 Thread Libertas
I also completely forgot to mention the below warning, which Tor 0.2.5.10 (the current release) gives when run on OpenBSD 5.6-stable amd64: We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2014-12-31 Thread Carlin Bingham
On Thu, 1 Jan 2015, at 11:49 AM, Libertas wrote: I also completely forgot to mention the below warning, which Tor 0.2.5.10 (the current release) gives when run on OpenBSD 5.6-stable amd64: We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL

Re: [Tor-BSD] Recognizing Randomness Exhaustion

2014-12-31 Thread Libertas
Thanks for this! I should have also specified that I didn't just go ahead and enable them because I wasn't sure if they're considered safe. I like abiding by OpenBSD's crypto best practices when possible. Is there any reason why they're disabled by default? On another note, I was skeptical

Re: Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2014-12-31 Thread teor
On 1 Jan 2015, at 07:39 , Greg Troxel g...@lexort.com wrote: Libertas liber...@mykolab.com writes: Some of the people at tor-...@lists.nycbug.org and I are trying to figure out why Tor relays under-perform when running on OpenBSD. Many such relays aren't even close to being network-bound,