[metrics-bugs] #29448 [Obfuscation/BridgeDB]: Provide a dir-spec implementation that serves sanitised descriptors
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Feb 12 15:12:25 UTC 2019
#29448: Provide a dir-spec implementation that serves sanitised descriptors
----------------------------------+-----------------------------------
Reporter: irl | Owner: sysrqb
Type: project | Status: needs_information
Priority: Low | Milestone:
Component: Obfuscation/BridgeDB | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
----------------------------------+-----------------------------------
Comment (by karsten):
Replying to [comment:2 irl]:
> Is it currently possible for someone to operate their own CollecTor
instance and archive bridge descriptors? The answer is no unless they are
syncing from our CollecTor instance.
That's true, but it's also an okay answer. If we wanted to fix just this,
we could run a separate CollecTor instance with just the bridge descriptor
sanitize on a separate host and have everyone (including us) sync from
that. (I'm not suggesting we do that.)
> We have access to bridge IPs, which is sensitive information, regardless
of whether or not we publish that information. This is a violation of not
handling sensitive information.
While I'd prefer not to handle sensitive information, I don't consider
this a violation of a principle. Of course, if the BridgeDB folks would
run this sanitizing code, that would mean that fewer people have access to
sensitive information. While this is preferable, I wouldn't say that the
current setup is bad per se.
> > So, the goal here is basically to extract the sanitizing code from
CollecTor and put it on the BridgeDB host, probably rewritten in a
different language. Right?
>
> Yes.
>
> > However, I can also see the downsides: code complexity of BridgeDB
will suddenly increase, and whoever runs BridgeDB has one more complex
thing to take care of.
>
> We do get the benefit that we no longer have to handle bridge IPs and
things are more reproducible. It is also easier for people to run testing
BridgeDBs with a testing CollecTor instance. It is also easier for people
to run their own production BridgeDBs that we can see statistics of (which
is a goal that has been previously discussed, to reduce reliance on the
single BridgeDB instance and allow orgs to set up their own).
Agreed on these.
However, in the course of adding more pros and cons, I'd like to add
another aspect: years ago we had to give up on collecting bridge pool
assignments because the BridgeDB folks back then didn't care enough. It
would be sad to lose sanitized bridge descriptors because BridgeDB
suddenly gets less attention than it should. Syncing unsanitized
descriptors seems like a minimal thing that BridgeDB folks can keep up
over a long time. If they need to do more, maybe they'll at some point
stop doing it at all.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29448#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the metrics-bugs
mailing list