Running a Tor exit node on an academic network?
Michael J Freedman
mfreed at cs.nyu.edu
Sat Jan 28 19:36:16 UTC 2006
Hi Joe,
> * The Library has electronic subscriptions to certain services that
> are based on IP addresses only. Proposal: block exit connections to
> those IP addresses given a list or build a list as needed. The
> eventual list could be thousands of IP addresses long which would have
> a undetermined impact on Tor's performance.
I run CoralCDN (http://www.coralcdn.org/), although I also used to work
with Roger on the Free Haven Project. We have many of the same issues with
running CoralCDN, which is deployed at ~150 PlanetLab sites, most at
universities. We push out a bit over 2 TB per day in web traffic to > 1
million clients.
Part of our solution for handling some of these issues to to limit
bandwidth consumption, part is to enforce blacklists for websites that
send abuse complaints (although operating at the HTTP layer this is a bit
easier for us), and part is to make sure we add all the appropriate HTTP
headers.
HTTP headers like X-Forwarded-For, Via, and Proxy-Connection all
communicate to the third-party services performing address authentication
(such as the ACM or IEEE digital library) that the communication is from
elsewhere. While you certainly won't be able to / don't want to identify
the correct X-Forwarded-For address, you can at least synthesize some fake
one (perhaps just a 10.x.x.x address). But again, this operates at the
application layer.
> * They're not confident that Tor will obey its exit policies.
> Proposal: include kernel-level software firewall and possibly a
> hardware-based firewall device on the Tor box.
>
> * They're concerned about bandwidth (although this one is not a
> biggie). Proposal: limit to 5% of my departments bandwidth (5MBit/s)
> and then explore burst settings and see how this impacts our
> department.
Our experience is that universities don't care as much about peak
bandwidth as they do about steady-state traffic: 5 Mbit/s at steady state
translates to over 50 GB / day. We've found many universities get
uncomfortable around 15-20 GB / day. In CoralCDN, we employ
application-level bandwidth tracking that allows higher burst rates, but
ensure that steady-state consumption over the long period stays below this
high water mark.
Good luck,
--mike
-----
www.michaelfreedman.org www.coralcdn.org
More information about the tor-talk
mailing list