I have several hundred thousand (or million? Haven't counted) hs descriptors saved on my hard disk from a data collection experiment (from 70k HSes). I'm a bit nervous about sharing these en masse as whilst not confidential they're supposed to be difficult to obtain in this quantity. However, if someone wants to write a quick script that goes through all of them and counts the number of authenticated vs nonauthed then I do not mind running it on the dataset and publishing the results. I have a directory where each file is a hs descriptor.
The introduction point data is base64 encoded plaibtext when unauthed or has high entropy otherwise. Best Gareth On 19:06, 9 Nov 2014, at 19:06, grarpamp <grarp...@gmail.com> wrote: >> George K: >> I suspect that HS authorization is very rare in the current network, >> and if we believe it's a useful tool, it might be worthwhile to make >> it more useable by people. > >Is anyone making their HSDir onion descriptor scraping patches >available somewhere? I'd suspect the rarity of HS authorization >could also be determined with that since some fields would be >obfuscated and thus not match patterns. > >s/scraping/logging/ > >rend--spec.txt: >2. Authentication and authorization. >2.1. Service with large-scale client authorization >2.2. Authorization for limited number of clients >2.3. Hidden service configuration >2.4. Client configuration >_______________________________________________ >tor-dev mailing list >tor-dev@lists.torproject.org >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev