[tor-bugs] #18749 [Tor]: Consider only including one fallback per operator
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Apr 11 02:57:06 UTC 2016
#18749: Consider only including one fallback per operator
-------------------------+------------------------------
Reporter: teor | Owner:
Type: enhancement | Status: new
Priority: Medium | Milestone: Tor: 0.2.???
Component: Tor | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points: small
Reviewer: | Sponsor:
-------------------------+------------------------------
Comment (by teor):
Replying to [comment:3 tscpd]:
> Proper configured fallbacks should not get excluded from whitelist.
Those who are not lie and not leave empty are most likely those we can
consider to be trustworthy.
Regardless of whether an operator is trustworthy or not, relays operated
by a single operator are more likely to change address or go down at the
same time. And I don't want to paint a target on any one operator by
putting a large number of their relays in the list.
> I think AS, adressrange and country are more important values here. This
could be a great point to add a pile of anonymity and security with a few
amount of effort: Fallbacks in rare countrys could get extra weight. Same
with with unique adressrange or fameless ASes. Here could something like a
diversity weight take place. Some algorithm to rate rarity could possibly
take place in other cases.
I have access to IPv4 and IPv6 addresses, but I don't have access to
country or AS in the python script I'm using. I don't have time to develop
that feature before 0.2.8-rc, please feel free to open a ticket for it in
"0.2.???". (I'm not sure if it will make it into 0.2.9, because we've
already triaged many tickets out.)
Also, a system like this is easy to game: "Want to get a relay on the
fallback list? Put it in a rare country/AS."
I prefer not to have a diversity weighting system, because they are
complex, and mash together many criteria into a single number. It's hard
to reason correctly about complex systems like this.
I propose instead that we limit the number of relays in the list that
share certain attributes, like operator and IP address. This ensures good
uptime, which I believe to be a significant threat to reliability. It also
ensures that no one operator sees too much client traffic, which is also a
significant threat to privacy. (Fortunately, mitigating one of these
threats tends to mitigate the other.)
> But even those who are doing proper description should not get assigned
more than a cap of x% fallback weight.
I agree, see above.
> In cases of fallbacks with same family / contactinfo get in sum over x%
i would tend to blacklist higher-weight fallbacks of those. This would
reduce the cases of blacklisting multiple fallbacks of such a group to get
under x% cap which would increase diversity again.
We are weighting each fallback equally for client selection, because it's
simpler and easier to reason about (#17905). It also allows me to remove
some complex code that down-weighted high weight fallbacks so they didn't
see too much client traffic (and so we don't depend on them being up too
much).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18749#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list