Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread teor
Libertas, As I wrote to you earlier today, IPredator on Linux complained of similar issues with excessive calls to time() under the Linux 3.x kernel series, but not 2.6. Let's track these issues in https://trac.torproject.org/projects/tor/ticket/14056 as they appear to be quite similar. I'd

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread Libertas
I wonder if TIME_IS_FAST is being defined as 1 in any of these Linux or BSD builds. I just found that the current OpenBSD release (5.6) has TIME_IS_FAST = 0. Details are in a ticket comment I just posted. Libertas, can you search your tor binary or tor debug symbols for the function

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread Libertas
Also, I can do some testing with chutney on the OpenBSD VM in a few hours. signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread Libertas
To clarify, I used strings /usr/local/bin/tor | grep approx_time. signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread Libertas
I'm working on question #2 now - I'm less well equipped to work on #1 at the moment. It's probably also worth mentioning that the dump with 400,000 calls to gettimeofday() also had 30,714 calls to clock_gettime(). On 01/01/2015 03:47 PM, Nick Mathewson wrote: On Dec 31, 2014 10:38 PM, Yawning

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread Nick Mathewson
On Dec 31, 2014 10:38 PM, Yawning Angel yawn...@schwanenlied.me wrote: I don't think we merged that branch yet, since it's not ready for general use. Additionally, it's not currently functional on the *BSDs. The KIST code last I checked only is used under Linux. This is right; the KIST

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2015-01-01 Thread Libertas
On 01/01/2015 08:07 AM, teor wrote: I'd like to get a sense of how many calls per second this represents. (400,000 would seem to be 100 to 1000 per second, unless you were debugging for a long while.) My kdump suggested that there were almost 7,000 calls a second to gettimeofday(). The

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2014-12-31 Thread teor
On 1 Jan 2015, at 07:39 , Greg Troxel g...@lexort.com wrote: Libertas liber...@mykolab.com writes: Some of the people at tor-...@lists.nycbug.org and I are trying to figure out why Tor relays under-perform when running on OpenBSD. Many such relays aren't even close to being network-bound,

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2014-12-31 Thread Yawning Angel
On Thu, 1 Jan 2015 14:19:08 +1100 teor teor2...@gmail.com wrote: On 1 Jan 2015, at 07:39 , Greg Troxel g...@lexort.com wrote: Tor 0.2.6.2-alpha (just in the process of being released) has some changes to queuing behaviour using the KIST algorithm. The KIST algorithm keeps the queues

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2014-12-31 Thread Libertas
I just ran ktrace/kdump (used for observing system calls) on the Tor process of my exit node, which relays about 800 KB/s. It listed 400,000 calls to gettimeofday(). The list was swamped with them. I think I remember reading somewhere that that sort of system call is way slower in OpenBSD than