[tor-dev] Proposal: Single onion services
David Goulet
dgoulet at ev0ke.net
Sun Sep 6 08:21:13 UTC 2015
On 05 Sep (14:47:41), Mike Perry wrote:
> Yawning Angel:
> > On Fri, 4 Sep 2015 15:31:15 -0600
> > John Brooks <john.brooks at dereferenced.net> wrote:
> >
> > > > Have you considered all the implications?
> > >
> > > Maybe we’ve missed some - what implications are you thinking of, that
> > > aren’t addressed in the proposal?
> >
> > I have two objections to this, one political, one technical:
> >
> > * (The political objection) While this is "cool" and probably(?)
> > "funded", it seems like a poor thing to work on in terms of
> > developmental priority when there are other things Hidden Service
> > related that need a lot of developer attention, primarily in making
> > the existing HSes more resilient against Nation State level
> > adversaries (Eg: Prop. 224).
>
> We should definitely have a Tor roadmapping session at the dev meeting
> to cover this and related concerns.
+9000
>
> I too have been worrying about the drift between what we suspect are the
> most serious problems in the hidden service protocol (and the Tor
> protocol in general) and the current set of Tor deliverables and dev
> plans (or lack thereof).
>
> OTOH, in order to make proper roadmapping, priority, and work-ordering
> decisions, we really do need a good menu of well-written proposals
> and/or tickets to choose from, even if we're likely to decide some of
> them are simply not worth doing yet until other issues are solved first.
>
> Otherwise roadmapping will become a bunch of hand-wavy statements about
> "Well, what about trying to solve $ISSUE_X $SOMEHOW?" without the
> ability to weigh the efficacy of a specific solution and how its
> development effort compares to (or depends upon) the gains from other
> potential improvements.
Last hidden service meeting in July, we were able to come up with a
breakdown of components for 224. See the blog post we did a month ago:
https://blog.torproject.org/blog/hidden-service-hackfest-arlington-accords
More specifically:
Splitting 224 into "modules":
https://people.torproject.org/~asn/hs_hackfest_2015/224modules.txt
and:
Needed code refactor:
https://people.torproject.org/~dgoulet/hs224-refactor.txt
This is clearly not as organised as it could be but I think it's a good
base from which we start on;
If the modules above make sense, having a ticket (or a family of
tickets) for them and proposals (if applicable) is definitely a way to
go forward that I agree on. Good example, proposal #250.
Let's have a session for that in Berlin for sure! Ideally, having an
agenda before we start would be fantastic. I'll try to start tomorrow a
wiki page about it and we can start from there until Berlin.
Thanks!
David
>
> > * (The technical objection) It is overly easy for assholes[0] to censor
> > Single Onion Services due to:
> >
> > it’s possible for the previous relay to guess the service you’re
> > connecting to
> >
> > While such a censor would only be able to deny service to clients as
> > a fraction of their relay(s) consensus weight, it's still something
> > that probably should get consideration.
>
> In addition to this concern, I am also wondering about the second-order
> effects of what happens when we have two classes of internal services:
> the "boring" ones that don't use the full rend protocol, and the
> "interesting" ones that do, especially if we still have not solved the
> circuit setup fingerprinting problem to prevent an observer from easily
> differentiating the two before this (or a similar mechanism) is deployed.
>
>
> --
> Mike Perry
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 603 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150906/33c5a94c/attachment-0001.sig>
More information about the tor-dev
mailing list