-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Le 03/07/2015 10:56, Roger Dingledine a écrit : > On Thu, Jul 02, 2015 at 11:10:03PM +0200, Frédéric CORNU wrote: >> running : >> watch -n 20 wget -O /dev/null http://eujuuws2nacz4xw4.onion/ > > I should point out that this approach should do one rendezvous with th e > onion service, and then re-use that circuit for each following request , > until the circuit fails at which point it builds one more and repeats. > > While normal Tor circuits expire 10 minutes after the activity started , > circuits to onion services expire after 10 minutes of inactivity. We > chose that difference because the rendezvous process is so expensive > relative to normal Tor circuits. > > A better approach here would be to flush the circuits and hidden servi ce > descriptor between fetches -- the onionperf tools that various folks > are working on has code for this I think. But it would indeed be more > complex than what you are doing here. :) > > --Roger >
Hi, I'm not very familiar with the server-side aspect of HS. Maybe s7r can give us details about how OnionBalance works, related to incomming circuits. So we can tell which one of the approach you describe is best for his tests. Cheers - -- Frédéric CORNU http://wardsback.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iF4EAREIAAYFAlWWUR8ACgkQieXg+ErX/wPPZgD9HYcku3tREdfzHBAW23a188ec I7XfMEAJSV8GgpeNWgsBAIxx5OB0HkKuvnqxrzG1vgjXtYVVqaH7Hi/HEUDTJ5jG =deia -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk