[tor-dev] Proposal XXX: FlashFlow: A Secure Speed Test for Tor (Parent Proposal)

teor teor at riseup.net
Fri Apr 24 01:05:14 UTC 2020


Hi,

Thanks for this proposal!

I'm looking forward to more secure bandwidth measurements on the Tor
network.

Overall, this proposal looks good.

But I'm particularly concerned about any communication between
bandwidth coordinators. Our general principle is that directory
authorities should be independent, and we should minimise their
communication and dependencies. This principle also extends to
bandwidth authorities.

For FlashFlow, here are some specific reasons to avoid bandwidth
coordinator communication:
* it adds complexity to the protocol
* it adds an additional failure mode: failure of coordinator
  communication
  * if the communication is required, this failure mode becomes a
    denial of service vulnerability
  * if the communication is optional, the failure could activate a
    less-tested fallback mode, and change coordinator behaviour
* it adds a class of additional bugs: coordinator miscommunication,
  including race conditions
* it adds a class of additional security vulnerabilities, via
  coordinator communication
* it adds additional coordinator configuration, which must stay
  synchronised. There's two ways to sync config:
  * in the consensus: the coordinator IP addresses are public, or
  * privately: the configs easily get out of sync

There's also some information missing from the proposal, I'll point it
out as part of this review.

> On 24 Apr 2020, at 04:48, Matt Traudt <pastly at torproject.org> wrote:
> 
> Filename: xxx-flashflow.txt
> Title: FlashFlow: A Secure Speed Test for Tor (Parent Proposal)
> Author: Matthew Traudt, Aaron Johnson, Rob Jansen, Mike Perry
> Created: 23 April 2020
> Status: Draft
> 
> ...
> 
> 3.1.2 New Cell Types
> 
> FlashFlow will introduce a new cell command MEASURE.
> 
> The payload of each MEASURE cell consists of:
> 
>  Measure command [1 byte]
>  Length          [2 bytes]
>  Data            [Length-3 bytes]
> 
> The measure commands are:
> 
>  0 -- MSM_PARAMS    [forward]
>  1 -- MSM_PARAMS_OK [backward]
>  2 -- MSM_ECHO      [forward and backward]
>  3 -- MSM_BG        [backward]
>  4 -- MSM_ERR       [forward and backward]

Readability note:

"MSM" is a standard abbreviation for "mainstream media".

A standard abbreviation for measurement is "MEAS":
https://www.abbreviations.com/abbreviation/MEASurement

> ...
> 
> 3.1.3 Pre-Measurement Handshaking/Starting a Measurement
> 
> The coordinator connects to the target relay and sends it a MSM_PARAMS
> cell.

How much of the tor link protocol does the coordinator implement?

Currently, tor requires the following cells:
* VERSIONS
* NETINFO

https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n542

> If the target is unwilling to be measured at this time or if the
> coordinator didn't use a TLS certificate that the target trusts, it
> responds with an error cell and closes the connection. Otherwise it
> checks that the parameters of the measurement are acceptable (e.g. the
> version is acceptable, the duration isn't too long, etc.). If the
> target is happy, it sends a MSM_PARAMS_OK, otherwise it sends a MSM_ERR
> and closes the connection.
> 
> Upon learning the IP addresses of the measurers from the coordinator in
> the MSM_PARAMS cell, the target whitelists their IPs in its DoS
> detection subsystem until the measurement ends (successfully or
> otherwise), at which point the whitelist is cleared.
> 
> Upon receiving a MSM_PARAMS_OK from the target, the coordinator will
> instruct the measurers to open their TCP connections with the target. If
> the coordinator or any measurer receives a MSM_ERR, it reports the error
> to the coordinator and considers the measurement a failure. It is also a
> failure if any measurer is unable to open at least half of its TCP
> connections with the target.
> 
> The payload of MSM_PARAMS cells [XXX more may need to be added]:
> 
>  - version       [1 byte]

What are the minimum and maximum valid values for this field?
0..255 ?
1..255 ?

Tor uses a standard ext-type-length-value format for new cell
fields, rather than parsing them based on a version field.

It may still be useful to have a version field for information
purposes. (And to workaround bugs in older versions.) Normally, we'd use
Tor Relay protocol versions, but the coordinators and measurers aren't in
the consensus.

Here's an example of the ext-type-length-value format:

     N_EXTENSIONS     [1 byte]
     N_EXTENSIONS times:
        EXT_FIELD_TYPE [1 byte]
        EXT_FIELD_LEN  [1 byte]
        EXT_FIELD      [EXT_FIELD_LEN bytes]

https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt#n1518

You'd want an extension in each measurer info, and also one at the end
of the cell, for any new general fields.

Tor already knows how to parse these fields, because they are used for
v3 onion services.

>  - msm_duration  [1 byte]

What are the minimum and maximum valid values for this field?
1..255 ?

Do we want to limit measurements to 4 minutes at a protocol level?

In general, protocols should make invalid states impossible to represent.
But do we want a 4 minute hard limit here?

>  - num_measurers [1 byte]

What are the minimum and maximum valid values for this field?
1..255 ?
1..17 ?

If you're using a standard 509 byte payload, then the practical limits
are:
  * 84 in the original format
  * 50 with link specifiers, extensions, and IPv4 addresses
  * 17 with link specifiers, extensions, IPv4, and IPv6 addresses

>  - measurer_info [num_measurers times]
>    - ipv4_addr   [4 bytes]

What about IPv6 ?
* 30% of tor relays support IPv6
* proposal 311 introduces IPv6 connections between relays, and we're
  implementing it right now
* IPv4 and IPv6 routing can be different, so their bandwidths
  can also be different

Instead of a hard-coded IPv4 field, you could use the IPv4 and
IPv6 link specifiers, which tor already knows how to parse:

       NSPEC      (Number of link specifiers)     [1 byte]
         NSPEC times:
           LSTYPE (Link specifier type)           [1 byte]
           LSLEN  (Link specifier length)         [1 byte]
           LSPEC  (Link specifier)                [LSLEN bytes]

https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n1001

As an example, the v3 onion service spec re-uses link specifiers here:
https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt#n227

>    - num_conns   [2 bytes]

This field should probably go before the link specifiers.

What are the minimum and maximum valid values for this field?
1..65535 ?

Do we really need to allow more than 255 connections?
Most relays can only handle around 10,000 - 20,000 connections.

> version dictates how this MSM_PARAMS cell shall be parsed. msm_duration
> is the duration, in seconds, that the actual measurement will last.
> num_measurers is how many measurer_info structs follow. For each
> measurer, the ipv4_addr it will use when connecting to the target is
> provided, as is num_conns, the number of TCP connections that measurer
> will open with the target. Future versions of FlashFlow and MSM_PARAMS
> will use TLS certificates instead of IP addresses.

FlashFlow won't be able to measure relays behind a NAT, if it
authenticates using IP addresses. Relays see the IP address of the NAT
device, rather than the IP address of the remote measurer.

For a similar reason, the DOS defences reduce the number of client
connections to a relay behind a NAT. So we can safely ignore those
relays for the moment.

But it would still be useful to talk about the IP address and NAT issue
in this proposal.

> MSM_PARAMS_OK has no payload: it's just padding bytes to make the cell
> 514 bytes long.

Should we add ext-type-length-value fields to this cell?

For example, the MSM_PARAMS_OK cell could be used to communicate the
relay's recent CPU load and connection load.

> The payload of MSM_ECHO cells:
> 
>  - arbitrary bytes [max to fill up 514 byte cell]

Note:

Link protocol 3 is still supported, so cells can be 512 or 514 bytes:
https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n2094

Let's say "PAYLOAD_LEN payload (509 bytes)" instead.

If FlashFlow requires link protocol version 4, let's explain why in
this proposal.

> The payload of MSM_BG cells:
> 
>  - second        [1 byte]

What are the minimum and maximum valid values for this field?
1..msm_duration ?

>  - sent_bg_bytes [4 bytes]
>  - recv_bg_bytes [4 bytes]

What are the minimum and maximum valid values for these fields?

Should we add ext-type-length-value fields to this cell?

For example, the MSM_BG cell could be used to communicate the
relay's current CPU load and connection load.

> second is the number of seconds since the measurement began. MSM_BG
> cells are sent once per second from the relay to the FlashFlow
> coordinator. The first cell will have this set to 1, and each
> subsequent cell will increment it by one. sent_bg_bytes is the number of
> background traffic bytes sent in the last second (since the last MSM_BG
> cell). recv_bg_bytes is the same but for received bytes.
> 
> The payload of MSM_ERR cells:
> 
>  - err_code [1 byte]
>  - err_str  [possibly zero-len null-terminated string]

We don't have strings in any other tor protocol cells.

If you need extensible error information, can I suggest using
ext-type-length-value fields:

     N_EXTENSIONS     [1 byte]
     N_EXTENSIONS times:
        EXT_FIELD_TYPE [1 byte]
        EXT_FIELD_LEN  [1 byte]
        EXT_FIELD      [EXT_FIELD_LEN bytes]

https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.txt#n1518

If strings are necessary, please specify a character encoding
(ASCII or UTF-8), and an allowed set of characters.

If we don't whitelist characters, we risk logging terminal escape
sequences, or other arbitrary data.

> The error code is one of:
> 
>  [... XXX TODO ...]
>  255 -- OTHER
> 
> The error string is optional in all cases. It isn't present if the first
> byte of err_str is null, otherwise it is present. It ends at the first
> null byte or the end of the cell, whichever comes first.
> 
> 3.1.4 Measurement Mode
> 
> The relay considers the measurement to have started the moment it
> receives the first MSM_ECHO cell from any measurer.

What happens if the relay never receives a MSM_ECHO cell?

Do MSM_ECHO cells from invalid measurers count?

How much of the tor link protocol does the measurer implement?
Currently, tor requires the following cells:
* VERSIONS
* NETINFO
https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n542

> At this point, the
> relay
> 
>  - Starts a repeating 1s timer on which it will report the amount of
>    background traffic to the coordinator over the coordinator's
>    connection.
>  - Enters "measurement mode" and limits the amount of background
>    traffic it handles according to the torrc option/consensus
>    parameter.
> 
> The relay decrypts and echos back all MSM_ECHO cells it receives on
> measurement connections

Are MSM_ECHO cells relay cells?
How much of the relay protocol does the measurer implement?

The references to decrypting cells suggest that MSM_ECHO cells are
relay (circuit-level) cells. But earlier sections suggest that they are
link cells.

If they are link cells, what key material is used for decryption?
How do the measurer and relay agree on this key material?

If they are relay cells, do they use the ntor handshake?
https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n1132

> until it has reported its amount of background
> traffic the same number of times as there are seconds in the measurement
> (e.g. 30 per-second reports for a 30 second measurement). After sending
> the last MSM_BG cell, the relay drops all buffered MSM_ECHO cells,
> closes all measurement connections, and exits measurement mode.

To be more precise here, can we say:

"the relay drops all inbound and outbound MSM_ECHO cells from measurers
associated with the completed measurement"

Can we avoid assuming that there is always only one measurement happening
at one time?

> During the measurement the relay targets a ratio of background traffic
> to measurement traffic as specified by a consensus parameter/torrc
> option. For a given ratio r, if the relay has handled x cells of
> measurement traffic recently, Tor then limits itself to y = xr/(1-r)
> cells of non-measurement traffic this scheduling round. The target will
> enforce that a minimum of 10 Mbit/s of measurement traffic is recorded
> since the last background traffic scheduling round to ensure it always
> allows some minimum amount of background traffic.

Do you mean "a maximum of 10 Mbit/s of measurement traffic" ?

> 3.2 FlashFlow Components
> 
> The FF coordinator and measurer code will reside in a FlashFlow
> repository separate from little-t tor.
> 
> There are three notable parameters for which a FF deployment must choose
> values. They are:
> 
>  - The number of sockets, s, the measurers should open, in aggregate,
>    with the target relay. We suggest s=160 based on the FF paper.
>  - The bandwidth multiplier, m. Given an existing capacity estimate for
>    a relay, z, the coordinator will instruct the measurers to, in
>    aggregate, send m*z Mbit/s to the target relay. We recommend m=2.25.
>  - The measurement duration, d. Based on the FF paper, we recommend
>    d=30 seconds.

Are these parameters per-coordinator, or network-wide?

How are they kept in sync between the coordinator and measurers?

> The rest of this section first discusses notable functions of the
> FlashFlow coordinator, then goes on to discuss FF measurer code that
> will require supporting tor code.
> 
> 3.2.1 FlashFlow Coordinator
> 
> The coordinator is responsible for scheduling measurements, aggregating
> results, and producing v3bw files. It needs continuous access to new
> consensus files, which it can obtain by running an accompanying Tor
> process in client mode.

Recent tor versions go dormant when they haven't built circuits for a
while. There are options that prevent dormancy, but they are only designed
for interactive applications.

Is the FlashFlow coordinator going to use tor to implement the tor link
protocol?

If the coordinator uses tor, then it can use the same tor client instance
that's downloading its consensuses.

Otherwise, you might just be better using a small stem script, and a
download timer.

If you use a timer, you can download each new consensus, shortly after
it is created. (Clients often have consensuses that are 1-2 hours old,
unless specifically configured to fetch from directory authorities.
Even then, they can take up to an hour to download a new consensus.)

> The coordinator has the following functions, which will be described in
> this section:
> 
>  - result aggregation.
>  - schedule measurements.
>  - v3bw file generation.
> 
> 3.2.1.1 Aggregating Results
> 
> Every second during a measurement, the measurers send the amount of
> verified measurement traffic they have received back from the relay.
> Additionally, the relay sends a MSM_BG cell each second to the
> coordinator with amount of non-measurement background traffic it is
> sending and receiving.

What happens if some of these cells is dropped by the relay, due to a
traffic overload?

If these cells are exempt from the [Relay]Bandwidth{Rate,Burst} options,
let's say that in this proposal.

What happens if some of these cells are delayed due to the MSM_ECHO
cells?

How long a delay does the coordinator tolerate?

> For each second's reports, the coordinator sums the measurer's reports.
> The coordinator takes the minimum of the relay's reported sent and
> received background traffic. If, when compared to the measurer's reports
> for this second, the relay's claimed background traffic is more than
> what's allowed by the background/measurement traffic ratio, then the
> coordinator further clamps the relay's report down. The coordinator adds
> this final adjusted amount of background traffic to the sum of the
> measurer's reports.
> 
> Once the coordinator has done the above for each second in the
> measurement (e.g. 30 times for a 30 second measurement), the coordinator
> takes the median of the 30 per-second throughputs and records it as the
> estimated capacity of the target relay.
> 
> 3.2.1.2 Measurement Schedule
> 
> The short term implementation of measurement scheduling will be simpler
> than the long term one due to (1) there only being one FlashFlow
> deployment, and (2) there being very few relays that support being
> measured by FlashFlow. In fact the FF coordinator will maintain a list
> of the relays that have updated to support being measured and have opted
> in to being measured, and it will only measure them.
> 
> The coordinator divides time into a series of 24 hour periods, commonly
> referred to as days. Each period has measurement slots that are longer
> than a measurement lasts (30s), say 60s, to account for pre- and
> post-measurement work. Thus with 60s slots there's 1,440 slots in a
> day.
> 
> At the start of each day the coordinator considers the list of relays
> that have opted in to being measured. From this list of relays, it
> repeatedly takes the relay with the largest existing capacity estimate.
> It selects a random slot. If the slot has existing relays assigned to
> it, the coordinator makes sure there is enough additional measurer
> capacity to handle this relay. If so, it assigns this relay to this
> slot. If not, it keeps picking new random slots until one has sufficient
> additional measurer capacity.

What if the coordinator doesn't have enough capacity to handle all the
relays on the network? (That is, what if all the slots are full?)

What if the capacity is limited at some other point on the internet?

For example:
* an intermediate transit provider between the measurer and all the chosen
  relays
* the chosen relays are all on the same local network

> Relays without existing capacity estimates are assumed to have the 75th
> percentile capacity of the current network.
> 
> If a relay is not online when it's scheduled to be measured, it doesn't
> get measured that day.

Online in the consensus, or listening via its ORPort?
(There's a delay of up to 3 hours here, whenever the relay goes up or
down.)

What bandwidth weight does an offline relay get?
sbws has had issues because it drops offline relays.

> 3.2.1.2.1 Example
> 
> ...
> 
> 3.2.1.3 Generating V3BW files
> 
> Every hour the FF coordinator produces a v3bw file in which it stores
> the latest capacity estimate for every relay it has measured in the last
> week. The coordinator will create this file on the host's local file
> system. Previously-generated v3bw files will not be deleted by the
> coordinator.

Seems risky, we've seen Torflow fail in the past, because it filled up
the disk with bandwidth files.

What's the required disk capacity for a few years of bandwidth files?

> A symbolic link at a static path will always point to the
> latest v3bw file.
> 
>    $ ls -l
>    v3bw -> v3bw.2020-03-01-05-00-00
>    v3bw.2020-03-01-00-00-00
>    v3bw.2020-03-01-01-00-00
>    v3bw.2020-03-01-02-00-00
>    v3bw.2020-03-01-03-00-00
>    v3bw.2020-03-01-04-00-00
>    v3bw.2020-03-01-05-00-00

You might want to reference the v3bw spec here:
https://gitweb.torproject.org/torspec.git/tree/bandwidth-file-spec.txt

> 3.2.2 FlashFlow Measurer
> 
> The measurers take commands from the coordinator

The command protocol is not specified in this proposal.

For example, does the coordinator send the IPv4 and IPv6 addresses of
the relay to the measurers?

Which deployment parameters are sent via the protocol, and which are
hard-coded in configurations?

> connect to target
> relays with many sockets, send them traffic, and verify the received
> traffic is the same as what was sent. Measurers need access to a lot of
> internal tor functionality. One strategy is to house as much logic as
> possible inside an compile-time-optional control port module that calls
> into other parts of tor. Alternatively FlashFlow could link against tor
> and call internal tor functions directly.
> 
> [XXX for now I'll assume that an optional little-t tor control port
> module housing a lot of this code is the best idea.]

Yes, please don't depend on internal, unspecified interfaces.

> Notable new things that internal tor code will need to do on the
> measurer (client) side:
> 
>  1. Open many TLS+TCP connections to the same relay on purpose.
>  2. Verify echo cells.
> 
> 3.2.2.1 Open many connections
> 
> ...
> 
> 3.3 Security
> 
> ...
> 
> 4. FlashFlow measurement system: Medium term
> 
> The medium term deployment stage begins after FlashFlow has been
> implemented and relays are starting to update to a version of Tor that
> supports it.

We avoid using tor versions to detect relay features. Instead, we use
subprotocol versions:

https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n2041

In the first tor release that supports the medium-term FlashFlow, let's
reserve a "Link" protocol version:

https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n2094

If any of the FlashFlow cells are relay cells, let's also reserve a
"Relay" protocol version:

https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt#n2122

(We don't want to pick the exact version numbers yet. Let's wait until
the actual tor release.)

> We plan to host a FlashFlow deployment consisting of a FF coordinator
> and a single FF measurer on a single 1 Gbit/s machine. Data produced by
> this deployment will be made available (semi?) publicly, including both
> v3bw files and intermediate results.

All directory authorities publish v3bw files at a standard URL, so if
you use these files in voting, they will be public.

> Any development changes needed during this time would go through
> separate proposals.
> 
> 5. FlashFlow measurement system: Long term
> 
> In the long term, finishing-touch development work will be done,
> including adding better authentication and measurement scheduling, and
> experiments will be run to determine the best way to integrate FlashFlow
> into the Tor ecosystem.
> 
> Any development changes needed during this time would go through
> separate proposals.
> 
> 5.1 Authentication to Target Relay
> 
> Short term deployment already had FlashFlow coordinators using TLS
> certificates when connecting to relays, but in the long term, directory
> authorities will vote on the consensus parameter for which coordinators
> should be allowed to perform measurements. The voting is done in the
> same way they currently vote on recommended tor versions.
> 
> FlashFlow measurers will be updated to use TLS certificates when
> connecting to relays too. FlashFlow coordinators will update the
> contents of MSM_PARAMS cells to contain measurer TLS certificates
> instead of IP addresses, and relays will update to expect this change.

You'll want another new "Link" protocol version for this feature. And
another type of link specifier.

> 5.2 Measurement Scheduling
> 
> Short term deployment only has one FF deployment running. Long term this
> may no longer be the case because, for example, more than one directory
> authority decides to adopt it and they each want to run their own
> deployment. FF deployments will need to coordinate between themselves
> to not measure the same relay at the same time, and to handle new relays
> as they join during the middle of a measurement period (during the day).
> 
> The following is quoted from Section 4.3 of the FlashFlow paper.
> 
>    To measure all relays in the network, the BWAuths periodically
>    determine the measurement schedule. The schedule determines when and
>    by whom a relay should be measured. We assume that the BWAuths have
>    sufficiently synchronized clocks to facilitate coordinating their
>    schedules. A measurement schedule is created for each measurement
>    period, the length p of which determines how often a relay is
>    measured. We use a measurement period of p = 24 hours.
> 
>    To help avoid active denial-of-service attacks on targeted relays,
>    the measurement schedule is randomized and known only to the
>    BWAuths. Before the next measurement period starts, the BWAuths
>    collectively generate a random seed (e.g. using Tor’s
>    secure-randomness protocol). Each BWAuth can then locally determine
>    the shared schedule using pseudorandom bits extracted from that
>    seed.

As noted above, communication between BWAuths reduces their independence,
and adds additional risk and complexity in the protocol.

Once-Off Shared Secret Exchange

Here's an alternative protocol, that does not require an additional
shared random implementation:

1. The BWAuths manually exchange a shared secret key (SHARED_SECRET)
   out-of-band
2. Every day, the BWAuths independently derive a shared secret seed for
   the measurement protocol, using a hash function (H), and tor's public
   shared random value (SRV):

      DAILY_SECRET = H(SHARED_SECRET | SRV)

We might also want to use the period number here, like the SRV and onion
service hash ring specs.

The shared secret key should be rotated:
  * each time a new BWAuth is added or removed from the network, and
  * 1 year after the last rotation.

The key rotation can be performed over a few days, because:
* each BWAuth has one of two keys: the new key, or the old key,
* overlaps should be rare in practice,
* when there is an overlap, at most two BWAuths will overlap,
  one from each key,
* overlaps have a low impact for most relays.

>    The algorithm to create the schedule considers each
>    measurement period to be divided into a sequence of t-second
>    measurement slots. For each old relay, slots for each BWAuth to
>    measure it are selected uniformly at random without replacement
>    from all slots in the period that have sufficient unallocated
>    measurement capacity to accommodate the measurement. When a new
>    relay appears, it is measured separately by each BWAuth in the first
>    slots with sufficient unallocated capacity. Note that this design
>    ensures that old relays will continue to be measured, with new
>    relays given secondary priority in the order they arrive.

It's unclear whether this protocol is interactive or not.

Here's a protocol that is explicitly non-interactive:

1. Measurers are assigned a daily order, based on each coordinator's
   certificate hash, and the current DAILY_SECRET.
2. For each coordinator, in the daily order:
   a. Relays in a chosen consensus choose a slot at random, based on
      the DAILY_SECRET, the relay key, and the iteration number
   c. If another coordinator is already measuring that relay in that
      slot, increase the iteration number, and repeat from a.
   b. If the slot is full for the current coordinator, increase the
      iteration number, and repeat from a.
   d. Otherwise, allocate that relay to that slot, for that
      coordinator.

We might also want to use other shared data here, like the consensus
timestamp.

To make sure all the coordinators have the same consensus, we
should keep a copy of the most recent shared consensus. Here's how
we can select a shared consensus:
  * if we're using a scheduled fetch, a consensus from at least 1 hour
    ago (usually 2300 UTC),
  * if we're using a tor client to fetch, a consensus from at least 3
    hours ago (usually 2100 UTC).

If there isn't a consensus for that time, we should keep the most
recent consensus before that time.

It doesn't actually matter if the consensus is a little out of sync,
most relays will have the same fingerprints, and end up in the same
slots.

> 5.3 Experiments
> 
>   [XXX todo]
> 
> 5.4 Other Changes/Investigations/Ideas
> 
> ...
> 
> 6. Citations
> 
> [0] F. Thill. Hidden Service Tracking Detection and Bandwidth Cheating
>    in Tor Anonymity Network. Master’s thesis, Univ. Luxembourg, 2014.
> [1] A. Johnson, R. Jansen, N. Hopper, A. Segal, and P. Syverson.
>    PeerFlow: Secure Load Balancing in Tor. Proceedings on Privacy
>    Enhancing Technologies (PoPETs), 2017(2), April 2017.
> [2] Mike Perry: Graph onionperf and consensus information from Rob's
>    experiments https://trac.torproject.org/projects/tor/ticket/33076

T


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20200424/536e9cdd/attachment-0001.sig>


More information about the tor-dev mailing list