Tools like ab or siege are inadequate for testing sites served by Nginx (or Lighttpd). They both use threads instead of multiple processes. ab is based on the Apache Portable Runtime, hence it uses the same type of request handling at the OS level that Apache uses.
With anyone of them you'll hit OS limitations before you hit Nginx limitations. Hence they're cannot give a true and accurate picture of your Nginx setup.
I've forked http_load by Jef Poskanzer. Fixed some compiling error issues and updated the named ciphers. Removing insecure ciphers, placing it on par with Nginx default HIGH:!ADH:!MD5 SSLv3+ only cipher support.
It's now debianized you can grab the debian package — instructions — or get the source on github.
Try it out.

Comments
Oh, I'll absolutely try it.
Oh, I'll absolutely try it. I've been wondering about it since I read an article about high performance server benchmark. Could you share some of your results (nginx vs someone else) and how much they are different from ones given by ab?
Personally I can reach 10K/s with ab test in a small server, that means 1 billion requests/day. I'm sure I don't need more :P
I'm going to do that
in advance of drupalcon London. I'm going to propose two BoFs on Nginx+Drupal. In the meantime, the examples on the manpage or on the README, can give you an idea of the range.
This is requesting the in memory 1x1 GIF of the Empty GIF module.
Here's also a message on the "nginx ssl slow" thread of July on the Nginx english ML. Quoting.
More to come. There's an accompanying script for generating 1kB/1MB sized files I'll look into it. I haven't tried
absince I've been apache clean for 18+ months. I don't have the apache2-utils package install. I get by with thttp-util for all my needs. But with siege I was unable to reach those figures.PS: Slightly OT. Nginx 1.1.0 supports ECDH based ciphers.