Server monitoring for Tor exit nodes

Similar documents
Monitoring Java in Docker at CDK

THE COMPLETE FIELD GUIDE TO THE WAN

Balancing the pressures of a healthcare SQL Server DBA

The 9 Tools That Helped. Collect 30,236 s In 6 Months

Real-time Monitoring, Inventory and Change Tracking for. Track. Report. RESOLVE!

Before I show you this month's sites, I need to go over a couple of things, so that we are all on the same page.

Finding a needle in Haystack: Facebook's photo storage

CASE STUDY IT. Albumprinter Adopting Redgate DLM

SaaS Providers. ThousandEyes for. Summary

N-Partner solution. VPN should be able to do AI and Abnormal Analysis, detect problems and solve them

A Step-by-Step Guide to Survey Success

Identifying Workloads for the Cloud

Geeks with... SQL Monitor REDGATE CASE STUDY

Software Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur. Lecture 13 Path Testing

4 Effective Tools for Docker Monitoring. By Ranvijay Jamwal

Datacenter Care HEWLETT PACKARD ENTERPRISE. Key drivers of an exceptional NPS score

DIGITALGLOBE ENHANCES PRODUCTIVITY

6 WAYS Google s First Page

A10 HARMONY CONTROLLER

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

Making Remote Network Visibility Affordable for the Distributed Enterprise

Close Your File Template

CASE STUDY: TRUHOME. TruHome Goes All-In on Cloud Telephony with Bigleaf SD-WAN as the Foundation

Contractors Guide to Search Engine Optimization

WhatsConfigured v3.1 User Guide

IDERA HELPS PPG INDUSTRIES REDUCE SQL SERVER BACKUP STORAGE COSTS BY OVER 70%

How to Optimize Content When You Don t Know Jack about SEO

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

How To Make 3-50 Times The Profits From Your Traffic

Resolving Network Performance Issues with Real-time Monitoring A Series of Case Studies

Keywords. The Foundation of your Internet Business.. By Eric Graudins: TheInternetBloke.com Worldwide Rights Reserved.

Below is another example, taken from a REAL profile on one of the sites in my packet of someone abusing the sites.

Key words: Wikipedia - a non-profit encyclopedia project available online and written collaboratively by volunteers from around the world

WhatsConfigured for WhatsUp Gold 2016 User Guide

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory

Accelerate your SAS analytics to take the gold

The Importance of Data Protection

Getting Started User s Guide

The Journey of a Senior System Center Consultant Implementing BSM

A Guide to Finding the Best WordPress Backup Plugin: 10 Must-Have Features

Education Solutions - Arizona State University - Case Study

TCP Strategies. Keepalive Timer. implementations do not have it as it is occasionally regarded as controversial. between source and destination

Introducing SOR: SSH-based Onion Routing

Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow

OS-caused Long JVM Pauses - Deep Dive and Solutions

CDN TUNING FOR OTT - WHY DOESN T IT ALREADY DO THAT? CDN Tuning for OTT - Why Doesn t It Already Do That?


What about when it s down? An Application for the Enhancement of the SAS Middle Tier User Experience

What is Savvius Insight? Why Savvius Insight?

A PRACTICAL GUIDE TO SHAREPOINT 2013: NO FLUFF! JUST PRACTICAL EXERCISES TO ENHANCE YOUR SHAREPOINT 2013 LEARNING! BY SAIFULLAH SHAFIQ

How can you manage what you can t see?

PERFORMANCE TUNING TECHNIQUES FOR VERITAS VOLUME REPLICATOR

MARKETING STRATEGIES

ThousandEyes for. Application Delivery White Paper

PowerBroker Auditing & Security Suite Version 5.6

Backup and Recovery for Smalland Medium-Sized Businesses

6 TIPS FOR IMPROVING YOUR WEB PRESENCE

Go beyond broadband with BTnet.

MySQL Performance Optimization and Troubleshooting with PMM. Peter Zaitsev, CEO, Percona

10 Online Tools. To Streamline Your Personal Trainer Marketing

WHITEPAPER MOVING TO A NEW BUSINESS PHONE SYSTEM

Moving to a New Business Phone System

Google Analytics. Gain insight into your users. How To Digital Guide 1

The SD-WAN security guide

1 SEO Synergy. Mark Bishop 2014

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved

Top-Down Network Design

VMware vsphere Clusters in Security Zones

Get Twitter Followers in an Easy Way Step by Step Guide

Three OPTIMIZING. Your System for Photoshop. Tuning for Performance

Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network

Practical Anonymity for the Masses with MorphMix

Making the case for SD-WAN

CURZON PR BUYER S GUIDE WEBSITE DEVELOPMENT

vsan Management Cluster First Published On: Last Updated On:

vsan Security Zone Deployment First Published On: Last Updated On:

DB2 is a complex system, with a major impact upon your processing environment. There are substantial performance and instrumentation changes in

NETACEA / WHITE PAPER DNS VS JAVASCRIPT

Moshe Elias, Product Marketing, Allot. Network Intelligence to See, Control & Secure IT

Media-Ready Network Transcript

VANTAGEPOINT. Feb CLOUD SECURITY: THE PROJECT. by Armor

Select Use Cases for VirtualWisdom Applied Analytics

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Accessing CharityMaster data from another location

Service Mesh and Microservices Networking

GOOGLE LAUNCHES BETA VERSION OF BRAND NEW SEARCH CONSOLE YOUTUBE S NEW MONETIZATION POLICY, NOT A BAD DECISION

Easy List Building System

Full Website Audit. Conducted by Mathew McCorry. Digimush.co.uk

UNDERSTAND THE OPPORTUNITY

NETGEAR-FVX Relation. Fabrizio Celli;Fabio Papacchini;Andrea Gozzi

Microsoft Exchange Health Check Steps

ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM

PostgreSQL migration from AWS RDS to EC2

Aerospike Scales with Google Cloud Platform

2010 Web Analytics Progress and Plans in BtoB Organizations: Survey Report

Closing The Application Performance Visibility Gap Inherent To Citrix Environments

How To Use My Alternative High

TURN DATA INTO ACTIONABLE INSIGHTS. Google Analytics Workshop

Transcription:

CASE STUDY Server monitoring for Tor exit nodes We had a chance to catch up with Kenan Sulayman, who runs some of the biggest Tor servers in the world. Read on to learn about server monitoring for highthroughput environments, network visibility, and optimizing application code versus the network.

Monitoring Tor exit nodes Tor is short for The Onion Router (thus the logo) and was initially a worldwide network of servers developed with the U.S. Navy that enabled people to browse the internet anonymously. Now, it's a non-profit organization whose main purpose is the research and development of online privacy tools. The Tor network disguises your identity by moving your traffic across different Tor servers, and encrypting that traffic so it isn't traced back to you. Anyone who tries would see traffic coming from random nodes on the Tor network, rather than your computer. Server Environment & Sysdig discovery Our environment is quite different than most cloud environments out there, notes Kenan. We re co-located in data centers across Europe: primarily the Netherlands, with fail-overs in Romania and France - always colocated with major internet peering points where 10 gigabit uplinks are available. Traffic to our servers regularly hits 150 MB/s and more, which means we re pushing multiple hundreds of terabytes per month. We run the Tor application on multiple servers and use a distributed file system to continuously backup and mitigate unexpected downtime. We also offer an DNS service. Tor servers basically get ranked on reputation, and reputation is based on how effectively we respond to requests and how stable we are in terms of uptime, concurrent connections and overall network capacity. At the scale we operate, even the smallest percentage points in changes to system performance can have a huge overall impact to service performance. I needed a system that would help me monitor this performance at the server level, but also give me insight into the performance of other applications that might impact overall system performance. I originally ran across Sysdig s open source project and was attracted by the kernel module. I wanted a way to see every command executed on my host, detecting any kind of anomalous activity, and sysdig did a great job of giving me that visibility. When I saw that the commercial product gave me the ability to capture, visualize, and alert on that same information across multiple hosts, I was really excited to give it a shot. CASE STUDY Everalbum 2

Monitoring large-scale networks Kenan described his use of Sysdig s monitoring platform: Sysdig in general has done a great job instrumenting everything. Not only can I monitor my servers health, but also my applications, containers and the network performance. We recently got a huge spike of traffic, over 250MB/s on each server, a total of over 800MB/s across all servers. Because we handled it well, we increased our server reputation in the Tor network and then we got even more traffic. Sysdig comfortably handled the load. Kenan continued, It s also powerful to be able monitor server traffic segmented by port. This helps distinguishing between traffic that is forwarded to other Tor nodes and traffic that goes to the clear internet. Being a directory server, my servers can help other servers find out about the network. For example, below I can see traffic coming in from other Tor servers (etlservicemgr, port 9001). Sysdig makes it easy to create dashboards focused on any part of my system. For example, this one shows a network-based view for monitoring one particular Tor server: CASE STUDY Everalbum 3

Improving application processing Response time vs resource usage I have one server on which I m running a database. With Sysdig, I can monitor the database and the Tor nodes separately. This gives me a clear view on my server and allows me to improve overall performance step-by-step. When I was using New Relic it just told me about the latencies to my servers - with Sysdig I can even see how long it took for my servers to process each request. Sysdig makes debugging incredibly easy - I don t need to spend as much time on the server or digging into logs. It s much less often that I have to ssh to the servers themselves. I wanted to be able to relate underlying resource usage with user s performance. There are a lot of complicated things for what we re doing, which can result in processing time ranging from 50ms to multiple seconds. There are usually between 800 and 3000 concurrent connections. And on top of it, the time or traffic per connection can vary greatly. When the request time goes through the roof (open connections) throughput goes down. I also can see that downloading is memory heavy, while managing a higher number of network connections is CPU related. CASE STUDY Everalbum 4

Conclusion Debug less, fewer monitoring tools to manage, and improve more. Kenan reflected on the use of Sysdig, and the value it brings to him. The time that I save with Sysdig through debugging is huge - it means I can spent more time improving the service on a high level and writing code for other projects. It s so much more cost effective than running a bunch of different manual system monitoring and APM tools. It was so easy to dump the other tools and just use Sysdig. CASE STUDY Everalbum 5