[tor-dev] Hidden Service Scaling
Michael Rogers
michael at briarproject.org
Tue May 6 14:29:03 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hi Christopher,
I'm interested in your work because the hidden service protocol
doesn't seem to perform very well for hidden services running on
mobile devices, which frequently lose network connectivity. I wonder
if the situation can be improved by choosing introduction points
deterministically.
On 30/04/14 22:06, Christopher Baines wrote:
> - multiple connections for one service to an introduction point is
> allowed (previously, existing were closed)
Does this mean that at present, the service builds a new IP circuit
(to a new IP?) every time it receives a connection? If so, is it the
IP or the service that closes the old circuit?
Thanks,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQEcBAEBCAAGBQJTaPGuAAoJEBEET9GfxSfMBr0H/2U2X9nspW17PdcsenxmfLWa
qdDRtqiVYkV96GMyEF7kO+felqHyZXQ/l3PHdkRZIalCwWdJrP2gTtV0NJ1tSIJM
dyLwdtIBybRfi1rWJBXrphBA8GuG5qOIdxMcgO90CixvWNz21BxeQ1JGwKI/etP9
bio/saloYTgX6FX0S8TPzTBs42RW2mZ6PIt98Tdeq3AMOU0EZIw/bNb+vxPo/qpJ
yX9ui/gIB5QA2IPrPLZzT7H1dqPnLSaYUg4E17SiBgsOHpa/7wDtDARgDINT+C3+
kK8T75yIq8ElEVRU+3TU9Rz+y+JCvHKJgKMvLqEOsYMS6w+fFtJCBLT5ZLnS+uI=
=77ga
-----END PGP SIGNATURE-----
More information about the tor-dev
mailing list