[tor-bugs] #13855 [Tor Messenger]: Use known onions for XMPP servers
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jun 29 22:04:12 UTC 2015
#13855: Use known onions for XMPP servers
-------------------------+-------------------------------------------------
Reporter: arlolra | Owner: sukhbir
Type: defect | Status: reopened
Priority: normal | Milestone:
Component: Tor | Version:
Messenger | Keywords: TorMessengerPublic, usability,
Resolution: | UI/UX
Actual Points: | Parent ID: #14161
Points: |
-------------------------+-------------------------------------------------
Comment (by arlolra):
These sentences are paraphrased from a discussion on IRC with dgoulet.
Using the onions by default has the potential to bring these services (or
their guards) to their knees. Some experiments show HSs as unusable with
around 60 to 100 client connections with data in transit. ~30% of the
whole CPU/tor process is crypto at that load, which for the most part
doesn't make use of multiple cores. Until that's fixed or DonnchaC's HS
load balancing comes along, maybe we don't want that as the default.
A better starting point may be to make it easier to configure the onions.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13855#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list