I have several hundred thousand (or million? Haven't counted) hs descriptors 
saved on my hard disk from a data collection experiment (from 70k HSes).  I'm a 
bit nervous about sharing these en masse as whilst not confidential they're 
supposed to be difficult to obtain in this quantity.  However, if someone wants 
to write a quick script that goes through all of them and counts the number of 
authenticated vs nonauthed then I do not mind running it on the dataset and 
publishing the results.  I have a directory where each file is a hs descriptor.

The introduction point data is base64 encoded plaibtext when unauthed or has 
high entropy otherwise.

Best
Gareth



On 19:06, 9 Nov 2014, at 19:06, grarpamp <grarp...@gmail.com> wrote:
>> George K:
>> I suspect that HS authorization is very rare in the current network,
>> and if we believe it's a useful tool, it might be worthwhile to make
>> it more useable by people.
>
>Is anyone making their HSDir onion descriptor scraping patches
>available somewhere? I'd suspect the rarity of HS authorization
>could also be determined with that since some fields would be
>obfuscated and thus not match patterns.
>
>s/scraping/logging/
>
>rend--spec.txt:
>2. Authentication and authorization.
>2.1. Service with large-scale client authorization
>2.2. Authorization for limited number of clients
>2.3. Hidden service configuration
>2.4. Client configuration
>_______________________________________________
>tor-dev mailing list
>tor-dev@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to