[tor-dev] Proposal: Load-balancing hidden services by splitting	introduction from rendezvous
    Tim Wilson-Brown - teor 
    teor2345 at gmail.com
       
    Fri Oct  2 12:56:35 UTC 2015
    
    
  
> On 2 Oct 2015, at 14:43, Tom van der Woerdt <info at tvdw.eu> wrote:
> 
> Hi Tim,
> 
> Thanks for your great comments, very much appreciated!
> 
> Comments inline.
> 
> 
> 
> Op 30/09/15 om 19:40 schreef Tim Wilson-Brown - teor:
>> 
>>> On 30 Sep 2015, at 17:27, Tom van der Woerdt <info at tvdw.eu
>>> <mailto:info at tvdw.eu>> wrote:
>>> 
>>> ...
>>> 
>>> Filename: xxx-intro-rendezvous-controlsocket.txt
>>> Title: Load-balancing hidden services by splitting introduction from
>>>      rendezvous
>>> Author: Tom van der Woerdt
>>> Created: 2015-09-30
>>> Status: draft
>>> 
>>> 1. Overview and motivation
>>> 
>>> To address scaling concerns with the onion web, we want to be able to
>>> spread the load of hidden services across multiple machines.
>>> OnionBalance is a great stab at this, and it can currently give us 60x
>>> the capacity by publishing 6 separate descriptors, each with 10
>>> introduction points, but more is better. This proposal aims to address
>>> hidden service scaling up to a point where we can handle millions of
>>> concurrent connections.
>>> 
>>> The basic idea involves splitting the 'introduce' from the
>>> 'rendezvous', in the tor implementation, and adding new events and
>>> commands to the control specification to allow intercepting
>>> introductions and transmitting them to different nodes, which will then
>>> take care of the actual rendezvous.
>>> …
> 
>> In general, I’m concerned that we need to think through the
>> implementation of this proposal more carefully, because it will help us
>> decide whether it’s compatible with:
>> * Current Hidden Services
>> * Next-Generation Hidden Services
>> And perhaps make changes to any of these proposals to make them work
>> together.
> 
> Thoughts welcome! I don't think I'm the right person to address those.
> 
>> 
>> I’d also note that it’s definitely not compatible with Single Onion
>> Services as specified in Proposal #252, as there is no rendezvous in
>> that protocol.
> 
> Indeed.
Splitting the introduction and rendezvous is another use case for NAT-punching single-rendezvous-hop onion services.
However, splitting hidden services into multiple different implementations provides less cover for users who really need three-hop hidden services. We’ll need to decide what the tradeoff is here.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20151002/fe649a90/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 873 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20151002/fe649a90/attachment-0001.sig>
    
    
More information about the tor-dev
mailing list