Proposal 163: Detecting whether a connection comes from a client
Sebastian Hahn
hahn.seb at web.de
Sat Jun 6 00:24:56 UTC 2009
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Next part of the proposal feedback message flood:
On May 22, 2009, at 8:59 AM, Nick Mathewson wrote:
> For these servers, we should attempt to build one or more test
> circuits through them. If enough of the circuits succeed, the
> node is a real relay. If not, it is probably a client.
>
> While we are waiting for the test circuits to succeed, we should
> allow a short grace period in which server privileges are
> permitted. When a test is done, we should remember its outcome
> for a while, so we don't need to do it again.
>
> [snip]
> If we can build circuits starting at a suspect node, but we don't
> have enough information to try extending circuits elsewhere
> through the node, should we conclude that the node is
> "server-like" or not?
imo, that's not a server.
Also:
I think we should wait for servers to appear in the consensus during
the first part of the 48 hours "we accept you as a relay" period
(after we could extend circuits to the node). If they don't appear in
that period, treat them as clients for the rest of the grace period.
Drawback: Bridges won't be listed in the consensus, yet their
bandwidth consumption might be legitimate since they can be serving
many clients. Not sure where to draw the line here.
If we don't do something like that, someone can be act like a relay
for 10 minutes and then stop being one, after two days, start the game
again, etc.
Sebastian
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAkopt1gACgkQCADWu989zuYoZgCglk2XZqF22eT15b7jCmOEPFNO
lpEAn32/OG4KLUiNeiyZa6TKFb7BfKnM
=bKf4
-----END PGP SIGNATURE-----
More information about the tor-dev
mailing list